node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
4,285 | 4 | Security_hologram:security hologram security holograms labels hologram printed onto sale security reasons holograms security labels difficult forge replicated master hologram requires expensive specialized technologically advanced equipment used widely several banknotes around world particular high denominations also used passports credit bank cards well quality products herman lopata president new york-based automatic toll systems inc. received patent 1987 credit card security hologram part early work high speed highway toll collection—the predecessor modern ez pass type equipment holograms classified different types reference degree level optical security incorporated process master origination different classifications described far common type hologram – fact holograms true sense words term hologram taken secondary meaning due widespread use multilayer image credit cards driver licenses type hologram consists two images stacked way alternately visible depending upon angle perspective viewer technology similar technology used past 50 years make red safety night reflectors bicycles trucks cars holograms therefore artwork holograms may two layers i.e background foreground three layers background middle ground foreground case two-layer holograms matter middle ground usually superimposed matter background hologram holograms display unique multilevel multi-colour effect images one two levels flat graphics “ floating ” surface hologram matter background appears behind hologram giving illusion depth holograms maximum resolution 10 micrometres per optical element produced specialized machines making forgery difficult expensive design optical elements several algorithms used shape scattered radiation patterns flip-flop hologram master origination technique used produce holograms display flip-flop effect produced used 2d/3d master shooting system two channel effect 2d/3d holograms displays two different images different angles holograms often fabricated using supreme quality material final master obtained flip-flop mastering technique used manufacture holograms gives flip-flop effects excellent blend 2d/3d flipping images offers holographic images excellent depth dazzling appeal types hologram created using highly sophisticated expensive electron-beam lithography systems kind technology allows creation surface holograms resolution 0.1 micrometres 254,000 dpi technique requires development various algorithms designing optical elements shapes scattered radiation patterns type hologram offers features like viewing four lasers single point 2d/3d raster text switch effects 3d effects concealed images laser readable text true colour images various kinds features possible security holograms mentioned usually take form thin lines contours concealed images seen large angle light diffraction one particular angle sets thin lines complicated geometry guilloché patterns drawn high resolution technology allows continuous visual changes colour along separated lines seen conditions hologram observations changed turning inclining hologram allows movements certain features image studied dot matrix holograms capable embedding microtext various sizes three types microtexts holograms high contrast microtexts size 50 – 150 micrometres diffractive grating filled microtexts size 50 – 150 micrometres low contrast microtexts microtexts sizes smaller 50 micrometres referred nanotext nanotext sizes less 50 micrometres observed microscope dot matrix holograms also support covert laser readable clr imagery simple laser device may used verify hologram authenticity computing clr images complicated mathematical task involves solving ill-posed problems two types clr dynamic clr multigrade clr dynamic clr set clr fragments produce animated images screen control device moves along hologram surface multigrade clr images produce certain images screen controlling device differ first minus first orders laser light diffraction variant hidden image negative positive plus one minus one order respectively may created recently novel computer-generated holograms proposed working structured light carrying phase singularities optical elements improve security level since encoded information appears input illumination endowed correct intensity phase distribution technology allows 2d 3d images combined security features microtexts concealed images clr etc combination effect achieved using traditional technologies origination 2d/3d hologram masters developed 2d/3d master shooting lab incorporates highly sensitive machines advanced equipment microprocessor-controlled automatic positioning equipment optical table he-cd laser laser power controller silver coatings related technologies final master obtained 2d/3d mastering used manufacture 2d/3d hologram stickers stickers consist multitude two-dimensional layers images placed one behind thereby offering excellent depth stickers colorful images 3d depth different layers true colour images effective decorative pictures synthesized computer may include microtexts hidden images security features yielding attractive high-security holograms true color hologram masters produced using 2d/3d master shooting system final master obtained mastering technique comprises true photographic images like images people animals flags etc type holograms ’ duplicated case ’ obtain original photo true color holograms one best ways prevent counterfeiters duplicating | [
3794,
744
] | Test |
4,286 | 9 | Java_compiler:java compiler java compiler compiler programming language java common form output java compiler java class files containing platform-neutral java bytecode also compilers output optimized native machine code particular hardware/operating system combination java-to-bytecode compilers jikes well known exception virtually optimization leaving run time done jre java virtual machine jvm loads class files either interprets bytecode just-in-time compiles machine code possibly optimizes using dynamic compilation standard interact java compilers programmatically specified jsr 199 2019 following major java compilers | [
1361,
6002,
5571,
6778,
1990,
5190
] | Validation |
4,287 | 9 | Rhino_(JavaScript_engine):rhino javascript engine rhino javascript engine written fully java managed mozilla foundation open source software separate spidermonkey engine also developed mozilla written c++ used mozilla firefox rhino project started netscape 1997 time netscape planning produce version netscape navigator written fully java needed implementation javascript written java netscape stopped work javagator called rhino project finished javascript engine since couple major companies including sun microsystems licensed rhino use products paid netscape allowing work continue originally rhino compiled javascript code java bytecode generated java class files produced best performance often beating c++ implementation javascript run just-in-time compilation jit suffered two faults first compiling time long since generating bytecode loading generated classes resource-intensive process also implementation effectively leaked memory since java virtual machines jvm n't collect unused classes strings interned result loading class file changed later versions java result fall 1998 rhino added interpretive mode classfile generation code moved optional dynamically loaded package compiling faster scripts longer use collected like java object rhino released mozilla foundation april 1998 originally rhino classfile generation held back release however licensors rhino agreed release rhino open source including class file generation since release open source rhino found variety uses increasing number people contributed code project gets name animal cover javascript book o'reilly media version 1.7r11 rhino supports java 8 supports number ecmascript es6/es2015 features rhino converts javascript scripts classes rhino works compiled interpreted mode intended used desktop server-side applications hence built-in support web browser objects commonly associated javascript rhino used debugger using rhino shell javascript shell provides simple way run scripts batch mode within interactive environment exploratory programming used applications embedding rhino slightly modified version rhino 1.6r2 comes bundled sun microsystems release java se version 6 released december 2006 makes easier integrate javascript part java programs access java resources javascript implementations java 6 may differ | [
5015,
6802,
401,
6458,
5408,
54,
4352,
1495,
422,
3663,
7587,
2619,
6156,
445,
1152,
2624,
4755,
6172,
7975,
1190,
2658,
3719,
5506,
3398,
155,
5172,
7687,
5887,
1616,
183,
3077,
893,
5549,
3092,
7347,
562,
5571,
6280,
7734,
2040,
7015,... | Test |
4,288 | 0 | GermaNet:germanet germanet lexical-semantic net german language relates nouns verbs adjectives semantically grouping lexical units express concept synsets defining semantic relations synsets germanet free academic use signing license germanet much common english wordnet viewed on-line thesaurus light-weight ontology germanet developed maintained within various projects research group general computational linguistics university tübingen since 1997 integrated eurowordnet multilingual lexical-semantic database germanet partitions lexical space set concepts interlinked semantic relations semantic concept modeled synset synset set words called lexical units words taken almost meaning.thus synset set synonyms grouped one definition gloss addition gloss synsets labeled syntactic function accompanied example sentences distinct meaning synset wordnet word category semantic space divided number semantic fields closely related major nodes semantic network ort location körper body etc following up-to-date statistics germanet version 11.0 contents release may 2016 germanet data stored relational postgresql 5 database database model follows internal structure germanet tables store synsets lexical units conceptual lexical relations etc distribution format germanet data xml two types files one synsets relations represent data available germanet database several application programming interfaces api available java perl apis distributed freely provide easy access information various versions germanet germanet 11.0 released may 2016 free academic distributed one following types license agreements open-de-wordnet freely available wordnet-compatible alternative germanet germanet used variety applications including semantic analysis shallow recognition implicit document structure compound analysis analyzing sectional preferences word sense disambiguation etc | [
5983,
5303,
7290,
5956
] | Validation |
4,289 | 5 | Karn's_algorithm:karn algorithm karn algorithm addresses problem getting accurate estimates round-trip time messages using transmission control protocol tcp computer networking algorithm also sometimes termed karn-partridge algorithm proposed paper phil karn craig partridge 1987 accurate round trip estimates tcp difficult calculate ambiguity created retransmitted segments round trip time estimated difference time segment sent time acknowledgment returned sender packets re-transmitted ambiguity acknowledgment may response first transmission segment subsequent re-transmission karn algorithm ignores retransmitted segments updating round-trip time estimate round trip time estimation based unambiguous acknowledgments acknowledgments segments sent simplistic implementation karn algorithm lead problems well consider happens tcp sends segment sharp increase delay using prior round-trip time estimate tcp computes timeout retransmits segment tcp ignores round-trip time retransmitted packets round trip estimate never updated tcp continue retransmitting every segment never adjusting increased delay solution problem incorporate transmission timeouts timer backoff strategy timer backoff strategy computes initial timeout timer expires causes retransmission tcp increases timeout generally factor two algorithm proven extremely effective balancing performance efficiency networks high packet loss ideally karn algorithm would needed networks high round-trip time retransmission timeouts investigated using root cause analysis techniques | [
7637,
6016
] | Test |
4,290 | 9 | Clarion_(programming_language):clarion programming language clarion commercial proprietary 4gl multi-paradigm programming language integrated development environment softvelocity used program database applications compatible isam sql ado data access methods reads writes several flat file desktop database formats including ascii csv dos binary foxpro clipper dbase relational databases via odbc ms sql server sybase sql anywhere oracle use accelerated native database drivers xml clarion used output html xml plaintext pdf among others clarion development environment ide sits top clarion programming language ide provides code generation facilities via system templates allow programmers describe program abstract level higher actual code statements generator turns higher level code turn compiled linked using normal compiler linker generation layer sometimes referred 4gl programming.the generation layer required possible create programs completely code level so-called 3gl layer bypassing code generation facilities templates used generate code programmers able inject code generated code alter extend functionality offered template layer process embedding code done viewing surrounding generated code mixing template code generated code allows template settings updated code regenerated without loss embedded code templates code generated provided source form developers free create templates large collection templates written various developers offered commercial add-ons free several clarion products available clarion professional edition clarion enterprise edition clarion.net first release clarion language dos product called clarion 1.0 first released april 1986 clarion created bruce barrington one founders healthcare firm hbo company later acquired mckesson corporation small team developers barrington goal create language would compact expressive would maximize use memory-mapped screen ibm pc creating screen designer version 1 produced pseudocode initial release included screen designer interpreter editor debugger initially supported databases composed dat files clarion ’ proprietary isam file format bruce barrington formed barrington systems released version 1.0 clarion 1.0 required use dongle time industry sentiment turning dongles offset ability create royalty-free applications however dongle removed release 1.1 time even basic version sold called personal developer limited user could adequate basic database applications fraction cost professional developer 1.x version 2.0 released may 1988 known clarion professional developer cpd included component called designer incorporated data dictionary cpd generated clarion code based contents dictionary template called model file model file text file could modified limited ways create custom code model file implemented browse form paradigm data initially displayed user list box updating done via form called via buttons associated list designer created essential crud create read update delete code developers could enhance functionality inserting code specified points generated code hand-coding new procedures clarion professional developer also introduced language extension modules lems could extend clarion language using modules compiled languages built lem format clarion software many third-party tool developers created lems purposes including extension connecting databases dbase clipper paradox cpd 2.x database solution everything required screens reports databases help files version clarion 2.x end-users clarion personal developer also released business user creating personal applications around time period clarion released clarion report writer created stand-alone product end-users clarion personal developer users programs written developers cpd built-in program bundled clarion professional developer version 2.1 released 1989 1991 barrington licensed compiler technology company called jensen partners international jpi jpi founded 1987 niels jensen earlier 1979 1981 one founders borland philippe kahn marketing personnel built borland around 99 turbo pascal compiler niels team working new compiler technology borland philippe kahn decided buy wizard c call turbo c. niels several developers left borland started jpi continued work compiler technology christened topspeed bought borland 1.7 million clarion database developer 3.0 cdd released 1993 revolutionary product adding many features technology could create programs “ windows like ” cua common user access user interface much cdd changes fit well windows programming paradigm laid groundwork future clarion windows product cdd ide completely new based jpi ide included many professional programmer quality tools editor project system compiler linker visual debugger gone p-code cpd jpi compiler clarion language produced true machine code exes libs dlls binaries could compiled protected mode allowing dos programs use extended memory breaking 640kb barrier clarion 3.0 language enhanced many ways e.g new data types cstring pstring date time ushort ulong file driver system e.g btrieve clarion dbase foxpro paradox queues tables enhanced screen processing enhanced cua code generation models replaced “ templates ” features extensible allowed generation much robust complex code new power came complexity many existing users found transition cdd difficult cpd simple easy use attracted many non-programmers could build programs answering questions cdd suited professional programmers programs could still developed easily size vast features ide made appear complex first 5 patch releases cdd buggy point unusable caused many users abandon product nearly complete disaster company clarion kept working cdd version 3.007 usable version 3.1 named clarion dos cfd released 1995 proved much stable time little interest dos development tools significant feature topspeed file driver isam file format allowing indexes multiple data files contained one disk file time relationship clarion software jpi grew closer april 30 1992 clarion merged jpi form entity would eventually called topspeed corporation employees topspeed development centre london went work cdd ironed many bugs topspeed released clarion windows version 1.0 a.k.a cw 1.0 january 1995 final 1.003 release june 1995 ide completely written windows gui could produce win16 exe dll binaries run windows 3.x language featured many enhancements required support event driven windows user interface clarion developer could easily create multithreaded mdi application cw 1.0 continued database flexibility added cdd well adding odbc driver allowing connection sql databases source supported odbc dos monolithic template model significantly enhanced cw 1.0 replaced model allowed window use multiple templates extension control procedure templates example dos screen procedure could support browsing single data table cw 1.0 window could use multiple browse control templates one displaying different table design change major improvement power clarion code generation clarion windows version 1.5 a.k.a cw 1.5 released september 1995 final 1.502 release january 1996 version added support creating native win32 binaries windows 95 windows nt 4 source could target win16 win32 ide remained 16-bit added 32-bit compilers linker debugger clarion windows version 2 a.k.a cw20 released june 1996 final 2.003 release march 1997 cw20 added classic object orientation language including inheritance encapsulation virtual methods overloading cw20 enhanced 32-bit support added activex support enhanced sql support clarion 4 a.k.a c4 released december 1997 final 4.002 release may 1998 topspeed elected skip dreaded version number three official explanation cw 1.5 cw 2.0 cw 2.0 cw 3.0 let ’ call next one version 4 due dos development dead name dropped windows title c4 came new template set class library called application builder classes “ abc ” original template set generated procedural code becoming increasingly complex abc template set generated far less code leveraged class library contained actual logic windows browses forms etc c4 enhanced oop adding constructors destructors without parameters clarion 5 a.k.a c5 released may 1998 final 5.0b release june 1999 product split professional enterprise editions clarion 5.5 a.k.a c55 released august 2000 final 5.507 release january 2002 c55 added interfaces oop clarion 6.0 a.k.a c6 released november 2003 added direct support pre-emptive multi-threading clarion 6.1 released may 2004 clarion 6.2 released may 2005 clarion 6.3 released jan 2006 excluding patches final release 16 bit clarion development environment use 16 bit ide produced problems using current windows technologies activex ocx com doc ... however note series 6.x clarion produces native win32 executables 32-bit exes and/or dlls previous versions produced 16-bit 32-bit executables 16-bit support dropped end-user product version 6.0 clarion april 13 2009 softvelocity released clarion 7 a.k.a c7 new ide look familiar sharpdevelop users softvelocity obtained commercial license sharpdevelop code integrated clarion code generation application generation technology fixed extended basic functionality major new features standard modern ide features lacking c6 include build system based msbuild backward compatibility releases clarion going back clarion windows 1.5 clarion still win32 development environment beta .net version clarion language called clarion available clarion c7 share ide although present shipped separate products unlike clarion 7 later releases clarion yet dictionary editor application generator expected single clarion7+/clarion.net ide would supported win32 .net development however given least 14 years passed since clarion.net announced without gold release clarion.net future unclear best new ide clarion mode retains ability build .net applications vb.net c september 12 2011 softvelocity released clarion 8 continues line clarion 7 latest release c7.3 august 2014 c9.1 gold released november 2015 clarion 10 released october 2018 clarion 11 released c10 re-worked build .net 4 clarion historically notable one first 4gl computer programming tools first developed 1980s trial version edition clarion time writing thus possible produce simple hello world program clarion without purchasing license first clarion documentation varying standard mixture enterprise level .net capabilities intertwined single one-serves-all help source result functionality described help together code snippets functionality specific product used example clarion.net documentation included even clarion.net product installed documentation specific one product though clearly labelled documentation lagged behind product clear completely reviewed every release example numerous references clarion 7 within clarion 9 documentation problem evidenced tutorial sample application level well clarion imperative programming language supports object orientated programming syntax clarion programming language case insensitive line endings treated implicit statement terminators unless explicit line continuation character used data program labels always declared column 1 code always indented column 2 onwards indentation optional code syntax resembles basic pascal structure although language quite different code blocks typically implicit start begin word used either explicit implicit end example period used place end statement code concatenated onto single line using separator case statement note period terminating statement block clarion generates code means templates code generated templates tends reliable especially template use time templates shipped source form edited however editing shipping templates recommended code generated templates augmented altered either creating additional custom templates embedding specific code templates capable generating text based file limited clarion language statements clarion language capable interacting dll produced languages compatible libraries using pascal method c method parameter passing windows api calls made directly language clarion data-centric meaning designed used among wide variety database vendors focused around data focus data starts data dictionary method formally declaring data tables dictionary used extensively templates generating program changes dictionary level cascade program causing automatic changes program data dictionary provides vendor independent method declaring tables turn means changing program one database vendor another relatively straightforward within constraints features chosen database provides clarion supports sql databases non-sql data stores support popular isam file types dbase btrieve etc built two proprietary isam file systems topspeed tps clarion dat also provided program code tables native data type table access provided standard dll interface known database driver separates program chosen data store abstraction allows chosen backend change either minimal changes program clarion natively supports following database formats including limited ascii basic btrieve clarion .dat topspeed .tps clipper dbaseiii dbaseiv dos foxpro/foxbase ms-sql t-sql odbc pervasive sql sqllite mysql oracle ado odbc driver allows access odbc source firebird postgres popular options accessed via odbc addition due ability readily interact .net class library able leverage latest technologies database perspective including asp.net others microsoft makes available including windows communication foundation windows communication foundation windows workflow foundation version clarion simple language resembling basic pascal addition objects classes areas data dictionary data declaration sections namely global data section module-specific data declaration section local data data declaration sections declare simple complex data type variable also declare prompt label mask picture whether read-only whether skipped form foreground background colors transparency whole host attributes ever drop variable form clarion ide adopts properties reflected automatically words data dictionary 'database sql terms contains information data also information represented applications make use database declaration time clarion developer spends defining data-dictionary time save later 4gl application generator produces output typically lists data full crud capabilities validation automatic lookup child tables demonstration hello world program clarion sample code shown hello world example example hand-written code clarion compiler gladly compile however developers write whole programs code level make use templates generate code ability describe program level higher code clarion popular non-programmers programmers limited skills abilities possible non-programmers generate sophisticated data based programs time either writing language code adding minimal amounts code one things clarion includes called global map inside procedure definitions declared including required declarations external dll libraries written non-clarion languages use clarion application clarion also ability generate dll consumed external non-clarion applications taking full advantage clarion 4gl capabilities simply plugging procedures created within map able leverage windows-api declarations using required no-longer documented data types core windows o/s easily clarion based .net version 4 version used develop clarion 10 ide allows developer use .net libraries advantage using clarion directly compilation clarion dll generates lib file compatible clarion windows allows clarion windows program call .net functionality clarion dll manner win32 dlls clarion developer wants use code compiled using languages use unmanaged exports nuget package developed robert gieseck https //www.nuget.org/packages/unmanagedexports unmanaged exports allows developer expose functions developed using .net native languages windows helpful forced maintain clarion product way upgrading third party tools due lack support third party tools rewritten .net ease | [
6181,
3255,
1526,
5852,
2866,
4759,
5571,
7618,
7715
] | Validation |
4,291 | 2 | IBM_PC_DOS:ibm pc dos ibm pc dos acronym ibm personal computer disk operating system discontinued operating system ibm personal computer manufactured sold ibm early 1980s 2000s ibm task force assembled develop pc decided critical components machine including operating system would come outside vendors radical break company tradition in-house development one key decisions made ibm pc industry standard time private company microsoft founded five years earlier bill gates eventually selected operating system ibm wanted microsoft retain ownership whatever software developed wanted nothing helping microsoft making suggestions afar according task force member jack sams reasons internal terrible problem sued people claiming stolen stuff could horribly expensive us programmers look code belonged someone else would come back say stole made money lost series suits n't want product clearly someone else product worked ibm people went microsoft proposition wanted product ibm first contacted microsoft look company july 1980 negotiations continued months followed paperwork officially signed early november although ibm expected customers would use pc dos ibm pc also supported cp/m-86 became available six months pc dos ucsd p-system operating systems ibm expectation proved correct one survey found 96.3 pcs ordered 40 pc dos compared 3.4 240 cp/m-86 history ibm pc dos various versions developed ibm and/or microsoft time pc dos 3.0 completed ibm team developers covering full os point time either ibm microsoft completely developed versions ibm pc dos going forward 1985 joint development agreement jda ibm microsoft development pc dos company giving company completely developed version time branded versions identical however cases companies made minor modifications version dos fall 1984 ibm gave source code documentation internally developed ibm topview dos microsoft microsoft could fully understand develop object-oriented operating environment overlapping windows development windows 2.0 multitasking windows used cooperative method share cpu entire life windows 1.0 millennium microsoft first licensed purchased 86-dos seattle computer products scp modified ibm pc microsoft employee bob o'rear assistance scp later microsoft employee tim paterson o'rear got 86-dos run prototype pc february 1981 86-dos converted 8-inch 5.25-inch floppy disks integrated bios microsoft helping ibm write ibm people writing requirements computer microsoft writing code o'rear often felt overwhelmed number people deal esd entry systems division facility boca raton florida perhaps first public mention operating system july 1981 byte discussed rumors forthcoming personal computer cp/m-like dos ... called simply 'ibm personal computer dos 86-dos rebranded ibm pc dos 1.0 august 1981 release ibm pc initial version dos largely based cp/m-80 1.x architecture function calls file-naming conventions copied directly older os significant difference fact introduced different file system fat12 unlike later dos versions date time commands separate executables rather part command.com single-sided 160 kilobyte kb 5.25 floppies disk format supported late 1981 paterson microsoft began writing pc dos 1.10 debuted may 1982 along revision b ibm pc support new double-sided drives added allowing 320 kb per disk number bugs fixed error messages prompts made less cryptic debug utility able load files greater 64k size later group microsoft programmers primarily paul allen mark zbikowski aaron reynolds began work pc dos 2.0 completely rewritten dos 2.0 added subdirectories hard disk support new ibm xt debuted march 1983 new 9-sector format bumped capacity floppy disks 360 kb unix-inspired kernel featured file handles place cp/m-derivative file control blocks loadable device drivers could used adding hardware beyond ibm pc bios supported basic utilities provided dos substantially upgraded well major undertaking took almost 10 months work dos 2.0 twice big dos 1.x occupying around 28k ram compared 12k predecessor would form basis microsoft consumer-oriented oses 2001 windows xp based windows nt released october 1983 officially november 1 dos 2.1 debuted fixed bugs added support half-height floppy drives new ibm pcjr 1983 compaq released compaq portable first 100 ibm pc compatible licensed oem version dos 1.10 quickly replaced dos 2.00 microsoft pc compatibles followed suit included hardware-specific dos features although generic august 1984 ibm introduced intel 80286-derived ibm pc/at next-generation machine along dos 3.00 despite jumping whole version number proved little incremental upgrade adding nothing substantial support new 1.2 megabyte mb floppy disks planned networking capabilities dos 3.00 judged buggy usable microsoft disabled prior os release case ibm original plans equip proper next-generation os would use extended features never materialized pc dos 3.1 released march 1985 fixed bugs dos 3.00 supported ibm network adapter card ibm pc network pc dos 3.2 added support 3½-inch double-density 720 kb floppy disk drives supporting ibm pc convertible ibm first computer use 3½-inch floppy disks released april 1986 later ibm personal system/2 1987 june 1985 ibm microsoft signed long-term joint development agreement share specified dos code create new operating system scratch known time advanced dos april 2 1987 os/2 announced first product produced agreement time ibm released next generation personal computers ibm personal system/2 ps/2 pc dos 3.3 released ps/2 line added support high density 3½-inch 1.44 megabyte mb floppy disk drives ibm introduced 80286-based higher ps/2 models upgrade dos 3.2 3.3 completely written ibm development effort part microsoft working advanced dos 1.0 dos 3.30 last version designed ibm xt floppy-only systems mind became one popular versions many users preferred buggy successor pc dos 4.0 internally known dos 3.4 originally shipped july 1988 dos 4.0 compatibility issues low-level disk utilities due internal data structure changes dos 4.0 used memory dos 3.30 also glitches newly added ems drivers compatible ibm ems boards common intel ast ones dos 4.0 also notable including first version dos shell full-screen utility designed make command-line os user-friendly microsoft took back control development released bug-fixed dos 4.01 dos 5 debuted june 1991 one biggest upgrades dos history dos 5 supported use high memory area hma upper memory blocks umbs 80286 later systems reduce conventional memory usage also dos commands supported option display command syntax aside ibm pc dos ms-dos version available oem editions vanished since time pcs 100 compatible customizations hardware differences longer necessary last version dos ibm microsoft shared full code dos integrated os/2 2.0 later windows nt virtual dos machine pc dos remained rebranded version ms-dos 1993 ibm microsoft parted ways—ms-dos 6 released march pc dos 6.1 separately developed followed june new features ms-dos 6.0 appeared pc dos 6.1 including new boot menu support new commands choice deltree move qbasic dropped ms-dos editor replaced ibm e editor pc dos 6.1 reports dos 6.00 pc dos 6.3 followed december pc dos 6.3 also used os/2 powerpc pc dos 6.3 also featured superstor disk compression technology addstor pc dos 7 released april 1995 last release dos ibm software development development ibm viavoice moved austin rexx programming language added well support new floppy disk format xdf extended standard 1.44 mb floppy disk 1.86 mb superstor disk compression technology replaced stac electronics stacker algebraic command line calculator utility program load device drivers command line added pc dos 7 also included many optimizations increase performance reduce memory usage recent retail release pc dos 2000 – released austin 1998 – found niche embedded software market elsewhere pc dos 2000 slipstream 7.0 y2k fixes applied applications pc dos 2000 reports ibm pc dos 7.00 revision 1 contrast original pc dos 7 reported ibm pc dos 7.00 revision 0 hitachi used pc dos 2000 legacy drive fitness test 4.15 hitachi feature tool 2.15 2009 thinkpad products copy latest version pc dos rescue recovery partition pc dos 7.1 added support logical block addressing lba fat32 partitions various builds 1999 2003 released retail used products ibm serverguide scripting toolkit build version dos appeared norton ghost symantec version 7.1 indicates support fat32 also ms-dos builds version dos limited kernel files ibmbio.com ibmdos.com command.com updated programs fdisk32 format32 allow one prepare fat32 disks additional utilities taken pc dos 2000 needed 1986 ibm announced pc dos support client access file services defined distributed data management architecture ddm enabled programs pcs create manage access record-oriented files available ibm system/36 ibm system/38 ibm mainframe computers running cics 1988 client support stream-oriented files hierarchical directories added pc dos became available ddm server systems | [
7512,
1442,
7161,
4670,
7172,
5041,
5743,
1435,
402,
3664,
6849,
5784,
1516,
7605,
2983,
2995,
5108,
5480,
126,
6907,
4421,
7996,
839,
4428,
2342,
4827,
3748,
3751,
1992,
1994,
7698,
3431,
6256,
8087,
5571,
5574,
6634,
5232,
5234,
5942,
... | Validation |
4,292 | 4 | WANSecure_Firewall:wansecure firewall wanbound company provides hardware software products small medium-sized offices products include firewalls vpn backup devices content filtering wansecure firewall remotely monitored managed firewall top management services provided secured wanbound services offered wansecure firewall include | [
2789,
2390
] | Validation |
4,293 | 2 | Windows_Virtual_PC:windows virtual pc windows virtual pc successor microsoft virtual pc 2007 microsoft virtual pc 2004 connectix virtual pc virtualization program microsoft windows july 2006 microsoft released windows version free product august 2006 microsoft announced macintosh version would ported intel-based macintosh computers effectively discontinuing product powerpc-based macintosh computers longer manufactured newest release windows virtual pc run versions windows earlier windows 7 officially support ms-dos operating systems earlier windows xp professional sp3 guests older versions support wider range host guest operating systems remain available starting windows 8 hyper-v supersedes windows virtual pc virtual pc virtualizes standard ibm pc compatible device associated hardware supported windows operating systems run inside virtual pc operating systems linux may run officially supported microsoft provide necessary virtual machine additions include essential drivers linux connectix virtual pc microsoft virtual pc 2004 microsoft virtual pc 2007 windows virtual pc successive versions software windows virtual pc runs windows 7 supports running windows xp professional later earlier microsoft versions run older versions windows still available support operating systems older windows xp microsoft replaced hyper-v virtual pc originally developed macintosh application system 7.5 released connectix june 1997 first version virtual pc designed windows-based systems version 4.0 released june 2001 connectix sold versions virtual pc bundled variety guest operating systems including windows os/2 red hat linux virtualization importance enterprise users became clear microsoft took interest sector acquired virtual pc virtual server unreleased time connectix february 2003 virtual pc 4 requires mac os 8.5 later g3 g4 processor running windows windows 2000 red hat linux requires mac os 9.0 later virtual pc 4 first version expandable drive images virtual pc 5 requires mac os 9.1 newer mac os x 10.1 later usb support mac os x recommended run virtual pc 5 mac os x 400 mhz faster processor required earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc agreement connectix innotek gmbh makers virtualbox part oracle ported version 5.0 run os/2 host version also included guest extensions vm additions os/2 guests could run windows os/2 mac os x hosts using virtual pc versions 5 6 7 new version guest extensions later included microsoft virtual pc 2004 july 12 2006 microsoft released virtual pc 2004 sp1 windows free charge mac version made free equivalent version mac version 7 final version virtual pc mac ran mac os x 10.2.8 later powerpc proprietary commercial software product virtual pc 2007 released windows platform public beta testing beginning october 11 2006 production release february 19 2007 added support hardware virtualization viewing virtual machines multiple monitors support windows vista host guest windows aero interface disabled windows vista guests due limitations emulated video hardware however aero effects rendered connecting guest via remote desktop services aero-enabled windows vista host provided guest running windows vista business higher edition may 15 2008 microsoft released virtual pc 2007 service pack 1 added support windows xp sp3 windows vista sp1 guest host oses well windows server 2008 standard guest os hotfix rollup virtual pc 2007 sp1 released february 20 2009 solved networking issues enhanced maximum screen resolution 2048×1920 32-bit enabling 16:9 resolutions 1920×1080 security update released july 14 2009 address elevation privilege vulnerability guest operating systems microsoft virtual pc 2004 2007 work windows 10 64-bit even 32-bit platforms lack internet connectivity due lack vpc driver also impacts windows mobile emulators windows virtual pc entered public beta testing april 30 2009 released alongside windows 7 unlike predecessors version supports windows 7 host operating systems originally required hardware virtualization support march 19 2010 microsoft released update microsoft virtual pc allows run pcs without hardware support windows virtual pc available free charge certain editions windows 7 either pre-installed oems via download microsoft website new features include system requirements windows virtual pc windows xp mode xpm virtual machine package windows virtual pc containing pre-installed licensed copy windows xp professional service pack 3 guest os previously cpu motherboard host support hardware virtualization update early 2010 eliminated requirement pre-installed integration components allow applications running within virtualized environment appear running directly host sharing native desktop start menu windows 7 well participating file type associations windows xp mode applications run terminal services session virtualized windows xp accessed via remote desktop protocol client running windows 7 host applications running windows xp mode compatibility issues actually running inside windows xp virtual machine redirected using rdp windows 7 host windows xp mode may used run 16-bit applications includes ntvdm although might impossible run 16-bit applications require hardware acceleration windows virtual pc hardware acceleration windows xp mode available free charge users windows 7 professional enterprise ultimate users editions windows 7 eligible download use restriction apply windows virtual pc windows xp mode also run vmware player vmware workstation however like virtual pc vmware products import windows xp mode windows 7 professional enterprise ultimate adhere microsoft licensing requirements virtual pc emulates following environments implementation earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc windows virtual pc may enable guest operating systems running inside virtual machines interact host operating system beyond feasible two physical computers sharing physical hardware components exchanging data however integration components must installed guest operating systems integration component installed mean communicating two machines either virtual physical virtual network interface even mouse cursor controlled one operating system either real virtual given time however integration components installed guest operating systems following features automatically activated addition features described guest operating systems may also take advantage following integration features administrator activates windows virtual pc enabling integration features automatically makes virtual machine user account accessible using remote desktop connection virtual pc allows multiple guest operating systems run virtualized single physical host although number popular host guest operating systems lack official microsoft support sometimes technical obstacles impeding installation instead configuration may unsupported due microsoft licensing restrictions decision focus testing support resources elsewhere especially production use legacy product fades program manager microsoft core virtualization team explains official support entails product positioned desktop use virtual pc provides official support different set operating systems server-oriented counterpart microsoft virtual server advanced hyper-v latter products support range server operating systems virtual pc 2007 supports one variety host another guest successor windows virtual pc supports none whereas virtual server hyper-v officially supported select linux guests since 2006 2008 respectively microsoft release virtual pc officially supported linux nonetheless number linux distributions run successfully virtual pc 2007 used virtual machine additions virtual server see lastly 64-bit host support introduced virtual pc 2007 release able virtualize 64-bit guest microsoft thus far reserved functionality hyper-v runs 64-bit x64 editions windows server 2008 windows server 2012 windows server 2012 r2 windows server 2016 windows 8/8.1 pro enterprise windows 10 pro enterprise education following table notes support refers official microsoft support described notes – details microsoft support notes – supported installations installing linux-based guest environment virtual pc possible redhat suse linux guests supported linux additions supported microsoft virtual server additions also work virtual pc linux distributions must installed text mode support microsoft virtual pc emulated graphics chip ubuntu 8.10 intrepid ibex must installed safemode require changes websites specialize listing operating systems run successfully virtual pc guests help users avoid issues installing linux distributions operating systems lacking official microsoft support microsoft announced august 7 2006 virtual pc mac would ported intel mac platform microsoft stated alternative solutions offered apple vendors combined fully packaged retail copy windows satisfy need similar products available announced time parallels desktop vmware fusion | [
2182,
5396,
6110,
3978,
5064,
432,
5794,
444,
788,
447,
448,
458,
4759,
7619,
1547,
3028,
7660,
4453,
5884,
3755,
3761,
3076,
8054,
4845,
5904,
8076,
5563,
4498,
7357,
5571,
6634,
578,
4880,
6294,
5244,
8118,
5970,
263,
5637,
3180,
2472... | Test |
4,294 | 5 | KA9Q:ka9q ka9q also called ka9q nos simply nos popular early implementation tcp/ip associated protocols amateur packet radio systems smaller personal computers connected via serial lines named amateur radio callsign phil karn first wrote software cp/m system ported dos ibm pc ka9q code open-source many radio amateurs modified many different versions available time ka9q later maintained anthony frost callsign g8udv adam goodfellow ported acorn archimedes jonathan naylor g4klx 1995 standard access software provided british dial-up internet service provider demon internet modern operating systems provide built-in implementation tcp/ip protocol linux especially includes necessary kernel functions support utilities tcp/ip amateur radio systems well basic ax.25 net/rom functionality therefore nos regarded obsolete original developer still may uses embedded systems small linux ka9q also name ip-over-ip tunneling protocol | [
1618,
709,
823,
6879,
7588,
3064,
3855
] | Test |
4,295 | 7 | VMware:vmware vmware inc. publicly traded software company listed nyse stock ticker vmw dell technologies majority share holder vmware provides cloud computing virtualization software services one first commercially successful companies virtualize x86 architecture vmware desktop software runs microsoft windows linux macos enterprise software hypervisor servers vmware esxi bare-metal hypervisor runs directly server hardware without requiring additional underlying operating system 1998 vmware founded diane greene mendel rosenblum scott devine ellen wang edouard bugnion greene rosenblum married first met university california berkeley edouard bugnion remained chief architect cto vmware 2005 went found nuova systems part cisco first year vmware operated stealth mode roughly 20 employees end 1998 company launched officially early second year february 1999 demo conference organized chris shipley first product vmware workstation delivered may 1999 company entered server market 2001 vmware gsx server hosted vmware esx server hostless 2003 vmware launched vmware virtual center vmotion virtual smp technology 64-bit support introduced 2004 january 9 2004 terms definitive agreement announced december 15 2003 emc dell emc acquired company 625 million cash august 14 2007 emc sold 15 vmware public via initial public offering shares priced per share closed day july 8 2008 disappointing financial performance board directors fired vmware co-founder president ceo diane greene replaced paul maritz retired 14-year microsoft veteran heading emc cloud computing business unit greene ceo since company founding ten years earlier september 10 2008 mendel rosenblum company co-founder chief scientist husband diane greene resigned september 16 2008 vmware announced collaboration cisco systems one result cisco nexus 1000v distributed virtual software switch integrated option vmware infrastructure april 2011 emc transferred control mozy backup service vmware april 12 2011 vmware released open-source platform-as-a-service system called cloud foundry well hosted version service supported application deployment java ruby rails sinatra node.js scala well database support mysql mongodb redis postgres rabbitmq march 2013 vmware announced corporate spin-off pivotal software general electric making investment company vmware application- developer-oriented products including spring tc server cloud foundry rabbitmq gemfire sqlfire transferred organization may 2013 vmware launched iaas service vcloud hybrid service new palo alto headquarters vcloud hybrid service rebranded vcloud air subsequently sold cloud provider ovh announcing early access program las vegas data center service designed function extension customer existing vsphere installations full compatibility existing virtual machines virtualized vmware software tightly integrated networking service based vcloud director 5.1/vsphere 5.1 september 2013 vmworld san francisco vmware announced general availability vcloud hybrid service expansion sterling virginia santa clara california dallas texas service beta uk announced acquisition desktone october 2013 january 2016 anticipation dell acquisition emc vmware announced restructuring reduce 800 positions executives resigned entire development team behind vmware workstation fusion disbanded us developers immediately fired april 24 2016 maintenance release 12.1.1 released september 8 2016 vmware announced release workstation 12.5 fusion 8.5 free upgrade supporting windows 10 windows server 2016 april 2016 vmware president coo carl eschenbach left vmware join sequoia capital martin casado vmware general manager networking security business left join andreessen horowitz analysts commented cultures dell emc emc vmware different said heard impending corporate cultural collisions potentially radical product overlap pruning would cause many emc vmware personnel leave vmware ceo pat gelsinger following rumours categorically denied would leave august 2016 vmware introduced vmware cloud provider website new branch role funneling cloud related information central source cloud provider technology content thanks “ services first ” approach cloud providers find differentiated monetizable services deliver leveraging vmware ’ platform latest case studies demos blogs architecture toolkits vmware available one place mozy transferred dell 2016 merger dell emc april 2017 according glassdoor vmware ranked 3rd list highest paying companies united states q2 2017 vmware sold vcloud air french cloud service provider ovh march 2015 software freedom conservancy announced funding litigation christoph hellwig hamburg germany vmware alleged violation copyrights esxi product sfc claimed vmware using linux kernel busybox without respecting terms gpl copyright license vmware told journalists believed case without merit expressed disappointment conservancy resorted litigation lawsuit dismissed court july 2016 hellwig announced would file appeal appeal decided february 2019 dismissed german court basis meeting procedural requirements burden proof plaintiff vmware notable products hypervisors vmware became well known first type 2 hypervisor known gsx product since evolved two hypervisor products lines vmware type 1 hypervisors running directly hardware hosted type 2 hypervisors vmware software provides completely virtualized set hardware guest operating system vmware software virtualizes hardware video adapter network adapter hard disk adapters host provides pass-through drivers guest usb serial parallel devices way vmware virtual machines become highly portable computers every host looks nearly identical guest practice system administrator pause operations virtual machine guest move copy guest another physical computer resume execution exactly point suspension alternatively enterprise servers feature called vmotion allows migration operational guest virtual machines similar separate hardware hosts sharing storage vmotion storage separate storage used transitions completely transparent users virtual machine time migrated vmware workstation server esx take optimized path running target operating systems host emulators bochs simulate function cpu instruction target machine one-by-one dynamic recompilation compiles blocks machine-instructions first time execute uses translated code directly code runs subsequently microsoft virtual pc macos takes approach vmware software emulate instruction set different hardware physically present significantly boosts performance cause problems moving virtual machine guests hardware hosts using different instruction sets found 64-bit intel amd cpus hardware hosts differing number cpus software cpu agnostic usually survive transition unless agnostic forking startup case software guest os must stopped moving restarted move vmware products predate virtualization extensions x86 instruction set require virtualization-enabled processors newer processors hypervisor designed take advantage extensions however unlike many hypervisors vmware still supports older processors cases uses cpu run code directly whenever possible example running user-mode virtual 8086 mode code x86 direct execution operate kernel-level real-mode code vmware products use binary translation bt re-write code dynamically translated code gets stored spare memory typically end address space segmentation mechanisms protect make invisible reasons vmware operates dramatically faster emulators running 80 speed virtual guest operating system would run directly hardware one study vmware claims slowdown native ranging 0–6 percent vmware esx server vmware approach avoids difficulties virtualization x86-based platforms virtual machines may deal offending instructions replacing simply running kernel code user mode replacing instructions runs risk code may fail find expected content reads one protect code reading allowing normal execution replacing place becomes complicated running code unmodified user mode also fail instructions read machine state cause exception betray real state program certain instructions silently change behavior user mode one must always rewrite performing simulation current program counter original location necessary notably remapping hardware code breakpoints although vmware virtual machines run user mode vmware workstation requires installation various device drivers host operating system notably dynamically switch global descriptor table gdt interrupt descriptor table idt vmware product line also run different operating systems dual-boot system simultaneously booting one partition natively using guest within vmware workstation vmware esxi enterprise software product deliver greater performance freeware vmware server due lower system computational overhead vmware esxi bare-metal product runs directly server hardware allowing virtual servers also use hardware less directly addition vmware esxi integrates vmware vcenter offers extra services vmware workspace portal self-service app store workspace management vmware storage availability products composed two primary offerings vmware nsx vmware network virtualization product marketed using term software-defined data center sddc technology included acquired 2012 purchase nicira workspace one allows mobile users access apps data vix virtual infrastructure extension api allows automated scripted management computer virtualized using either vmware vsphere workstation player fusion products vix provides bindings programming languages c perl visual basic vbscript c | [
9,
1081,
7534,
4692,
32,
3634,
3973,
2585,
7563,
754,
7203,
3319,
7575,
62,
3661,
2961,
1134,
1505,
6860,
2619,
6502,
88,
4759,
2278,
7969,
6521,
3358,
7979,
1933,
4783,
6906,
4069,
2680,
511,
5865,
7669,
2332,
2342,
6581,
5884,
6954,
... | Test |
4,296 | 9 | PhpStorm:phpstorm jetbrains phpstorm commercial cross-platform ide integrated development environment php built jetbrains intellij idea platform phpstorm provides editor php html javascript on-the-fly code analysis error prevention automated refactorings php javascript code phpstorm code completion supports php 5.3 5.4 5.5 5.6 7.0 7.1 7.2 modern legacy projects including generators coroutines finally keyword list foreach namespaces closures traits short array syntax includes full-fledged sql editor editable query results phpstorm built intellij idea written java users extend ide installing plugins created intellij platform write plugins features available webstorm included phpstorm adds support php databases webstorm ships pre-installed javascript plugins node.js ultimate edition jetbrains polyglot ide intellij idea supports functionality phpstorm plugins november 2015 jetbrains switched licensing phpstorm subscription basis annual subscriptions monthly subscriptions maintained 12 consecutive months also receive perpetual fallback license major version available time purchase phpstorm available individual developers business organizations additional discounted complementary licenses available startups students teachers non-commercial open source projects complementary licenses require approval include perpetual fallback clause i.e expire | [
6791,
3955,
4315,
4352,
7933,
7214,
5433,
4012,
5092,
1155,
4755,
4759,
6172,
7628,
1177,
831,
5137,
3719,
4070,
6221,
7308,
7687,
8035,
1643,
5571,
578,
3463,
5234,
933,
5948,
237,
6660,
5965,
5629,
2451,
6701,
5998,
1737,
313,
6737,
1... | Validation |
4,297 | 2 | MS/8:ms/8 ms/8 rl monitor system discontinued operating system developed digital equipment corporation pdp-8 1966 richard f. lary submitted decus 1970 disk oriented system faster predecessor 4k disk monitor system tricks make run quickly dectape based systems ms/8 since replaced p s/8 cos-310 | [
1522,
7325,
7605,
280,
2818,
4759,
190,
4670,
5021,
8066,
8167,
4397,
13,
5644,
3271,
5116,
6984,
299,
3626,
7142,
5571,
2300,
5041,
7827,
4786,
578,
7550,
4244,
5232,
1992,
405,
6367,
6922,
8115,
5161,
5865,
7396,
65,
861,
5962,
5783,
... | Test |
4,298 | 1 | Cockroach_Labs:cockroach labs cockroach labs computer software company develops commercial database management systems best known cockroachdb compared google spanner cockroachdb project designed store copies data multiple locations order deliver speed access described scalable consistently-replicated transactional datastore cockroach labs founded 2015 ex-google employees spencer kimball peter mattis ben darnell prior cockroach labs kimball mattis key members google file system team darnell key member google reader team google three previously used bigtable acquainted successor spanner leaving google wanted design build something similar companies outside google june 2015 company nine cockroachdb engineers spencer kimball wrote first iteration design january 2014 began open-source project github february 2014 allowing outside access contributions attracted community experienced contributors co-founders actively supporting project conferences networking meet-ups collaborations github earned open source rookie year title awarded black duck software open-source projects june 2015 company closed 6.25 million funding benchmark sequoia google ventures firstmark capital benchmark general partner peter fenton named company board directors additional investors included hortonworks chief executive rob bearden coreos ceo alex polvi cloudera co-founder jeff hammerbacher june 2019 cockroach labs announced cockroachdb would change license free software license apache license 2.0 proprietary license cockroach labs raised 55 million series c round august 2019 led altimeter capital database scalable single instance scale single laptop thousands servers cockroachdb designed run cloud resilient failures result database described almost impossible take even multiple servers entire datacenter go offline cockroachdb would keep services online | [
6506,
5476,
5455,
2683,
7248,
7848,
5447
] | Test |
4,299 | 2 | Wallace_v._International_Business_Machines_Corp.:wallace v. international business machines corp. wallace v. international business machines corp. 467 f.3d 1104 7th cir 2006 significant case development free software case decided court appeals seventh circuit united states law gnu general public license gpl contravene federal antitrust laws daniel wallace united states citizen sued free software foundation fsf price fixing later lawsuit unsuccessfully sued ibm novell red hat wallace claimed free linux prevented making profit selling operating system 2005 daniel wallace filed suit fsf u.s. district court southern district indiana stating gpl requiring copies computer software licensed made available freely possibly even cost tantamount price fixing november 2005 case dismissed without prejudice wallace filed multiple amended complaints effort satisfy requirements antitrust allegation fourth final amended complaint dismissed march 20 2006 judge john daniel tinder wallace ordered pay fsf costs decision grant motion dismiss court ruled wallace failed allege antitrust injury claim could based since wallace obligated claim injured also market court instead found court also noted prior cases established sherman act enacted assure customers benefits price competition emphasized act primary purpose protecting economic freedom participants relevant market decision thus supports right authors content creators offer creations free charge 2006 daniel wallace filed lawsuit software companies ibm novell red hat profit distribution open-source software specifically gnu/linux operating system wallace allegation software companies engaging anticompetitive price fixing may 16 2006 judge richard l. young dismissed case prejudice wallace later filed appeal seventh circuit appeal court case heard de novo front three-judge panel led frank easterbrook lost appeal judge citing number problems complaint | [
4408,
3807,
6130,
4299,
3514,
5571,
6586,
7003,
6543,
578,
2803
] | Test |
4,300 | 2 | Macpup:macpup macpup operating system based puppy linux puppy normal jwm window manager available also includes enlightenment wm users quickly switch window managers without rebooting macpup enlightenment interface installed features mac os x-like dockbar many enlightenment themes available macpup comes firefox web browser like parent macpup run ram live .iso uses 184mb ram | [
3559,
352,
3751,
578,
5232
] | Test |
4,301 | 4 | Dynamic_secrets:dynamic secrets dynamic secrets novel key management scheme secure communications proposed sheng xiao weibo gong towsley first academic publication nominated infocom 2010 best paper award later monograph published springer extend scheme framework dynamic secrets applied bi-directional communication systems single-directional communication systems improve communication security three main benefits 1. encryption authentication keys rapidly automatically updated pair communication devices 2. key update process binds communication process incurs negligible computing bandwidth cost 3 use cloned key either authentication encrypted communication guaranteed detected detection false alarms cost computing networking resources dynamic secrets automatically break secure communication clone key legitimate key co-exist however order find attacker takes actions consumes computing power network bandwidth | [
3794,
651,
2566
] | Test |
4,302 | 9 | Assignment_(computer_science):assignment computer science computer programming assignment statement sets and/or re-sets value stored storage location denoted variable name words copies value variable imperative programming languages assignment statement expression fundamental construct today commonly used notation basic operation come codice_1 originally superplan 1949–51 popularized fortran 1957 c followed codice_2 originally algol 1958 popularised pascal although many notations use languages symbol used regarded operator meaning assignment statement whole returns value others define assignment statement meaning used expression assignments typically allow variable hold different values different times life-span scope however languages primarily strictly functional allow kind destructive reassignment might imply changes non-local state purpose enforce referential transparency i.e functions depend state variable produce results given set parametric inputs point time modern programs languages also often use similar strategies although less strict certain parts order reduce complexity normally conjunction complementing methodologies data structuring structured programming object orientation assignment operation process imperative programming different values associated particular variable name time passes program model operates changing state using successive assignment statements primitives imperative programming languages rely assignment iteration lowest level assignment implemented using machine operations codice_3 codice_4 variables containers values possible put value variable later replace new one assignment operation modifies current state executing program consequently assignment dependent concept variables assignment example assuming codice_7 numeric variable assignment codice_8 means content variable codice_7 doubled execution statement example segment c code sample variable codice_10 first declared int assigned value 10 notice declaration assignment occur statement second line codice_11 declared without assignment third line codice_10 reassigned value 23 finally codice_11 assigned value 32.4 assignment operation necessary value codice_5 well-defined valid rvalue codice_6 represents modifiable entity valid modifiable non-const lvalue languages typically dynamic ones necessary declare variable prior assigning value languages variable automatically declared first time assigned scope declared varying language assignment changes existing value e.g codice_16 disallowed purely functional languages functional programming assignment discouraged favor single assignment also called initialization single assignment example name binding differs assignment described article done usually variable created subsequent reassignment allowed evaluation expression side effect change observable state machine produces values input imperative assignment introduce side effects destroying making old value unavailable substituting new one referred destructive assignment reason lisp functional programming similar destructive updating single assignment form assignment available purely functional languages haskell variables sense imperative programming languages rather named constant values possibly compound nature elements progressively defined on-demand purely functional languages provide opportunity computation performed parallel avoiding von neumann bottleneck sequential one step time execution since values independent impure functional languages provide single assignment well true assignment though true assignment typically used less frequency imperative programming languages example scheme single assignment codice_17 true assignment codice_18 used variables specialized primitives provided destructive update inside lists vectors strings etc ocaml single assignment allowed variables via codice_19 syntax however destructive update used elements arrays strings separate codice_20 operator well fields records objects explicitly declared mutable meaning capable changed initial declaration programmer functional programming languages use single assignment include clojure data structures vars erlang accepts multiple assignment values equal contrast haskell f haskell lava ocaml oz dataflow variables cells racket data structures like lists symbols sasl scala vals sisal standard ml non-backtracking prolog code considered explicit single-assignment explicit sense named variables explicitly unassigned state set exactly haskell contrast unassigned variables every variable thought implicitly set value rather computational object produce value demand created programming languages assignment statement returns value others expression-oriented programming languages example c assignment statement returns assigned value allowing idioms codice_21 assignment statement codice_22 returns value codice_7 assigned codice_10 statement codice_25 return value function used control loop assigning value variable programming languages scheme example return value assignment undefined idioms invalid haskell variable assignment operations similar assignment like assigning field array field mutable data structure usually evaluate unit type represented codice_26 type one possible value therefore containing information typically type expression evaluated purely side effects certain use patterns common thus often special syntax support primarily syntactic sugar reduce redundancy source code also assists readers code understanding programmer intent provides compiler clue possible optimization case assigned value depends previous one common many imperative languages notably c majority descendants provide special operators called augmented assignment like codice_27 codice_28 instead written codice_29 beyond syntactic sugar assists task compiler making clear in-place modification variable codice_7 possible statement like codice_31 called chained assignment value codice_32 assigned multiple variables codice_33 codice_11 chained assignments often used initialize multiple variables codice_35 programming languages support chained assignment chained assignments equivalent sequence assignments evaluation strategy differs languages simple chained assignments like initializing multiple variables evaluation strategy matter targets l-values assignment connected way evaluation strategy affects result programming languages c example chained assignments supported assignments expressions values case chain assignment implemented right-associative assignment assignments happen right-to-left example codice_36 equivalent codice_37 c++ also available values class types declaring appropriate return type assignment operator python assignment statements expressions thus value instead chained assignments series statements multiple targets single expression assignments executed left-to-right codice_36 evaluates expression codice_39 assigns result leftmost target codice_40 assigns result next target codice_41 using new value codice_40 essentially equivalent codice_43 though actual variable produced temporary value programming languages apl common lisp go javascript since 1.7 php maple lua occam 2 perl python rebol ruby windows powershell allow several variables assigned parallel syntax like simultaneously assigns 0 codice_7 1 codice_45 often known parallel assignment introduced cpl 1963 name simultaneous assignment sometimes called multiple assignment though confusing used single assignment opposites right-hand side assignment single variable e.g array structure feature called unpacking destructuring assignment list unpacked 0 assigned codice_7 1 codice_45 furthermore swaps values codice_7 codice_45 languages without parallel assignment would written use temporary variable since codice_50 leaves codice_7 codice_45 original value codice_45 languages go python combine parallel assignment tuples automatic allow multiple return values single function python example provides alternative use output parameters returning multiple values function dates clu 1974 clu helped popularize parallel assignment generally c c++ comma operator similar parallel assignment allowing multiple assignments occur within single statement writing codice_54 instead codice_55 primarily used loops replaced parallel assignment languages go however c++ code ensure perfect simultaneity since right side following code codice_56 evaluated left side languages python codice_57 assign two variables concurrently using initial value compute new b use equals sign codice_58 assignment operator frequently criticized due conflict equals comparison equality results confusion novices writing code confusion even experienced programmers reading code use equals assignment dates back heinz rutishauser language superplan designed 1949 1951 particularly popularized fortran beginning programmers sometimes confuse assignment relational operator equality means equality mathematics used assignment many languages assignment alters value variable equality testing tests whether two expressions value languages basic single equals sign codice_59 used assignment operator equality relational operator context determining meant languages use different symbols two operators example similarity two symbols lead errors programmer forgets form codice_58 codice_67 codice_68 appropriate mistypes codice_58 codice_67 intended common programming problem languages c including one famous attempt backdoor linux kernel assignment operator also returns value assigned way function returns value validly nested inside expressions intention compare two values codice_71 statement instance assignment quite likely return value interpretable boolean true case codice_72 clause executed leading program behave unexpectedly language processors gcc detect situations warn programmer potential error two common representations copying assignment equals sign codice_58 colon-equals codice_68 forms may semantically denote either assignment statement assignment operator also value depending language and/or usage possibilities include left arrow keyword though rarer variants mathematical pseudo code assignments generally depicted left-arrow platforms put expression left variable right expression-oriented languages lisp tcl uniformly use prefix postfix syntax statements including assignment | [
1445,
6428,
1102,
2576,
1116,
5073,
5424,
1889,
1892,
4743,
2619,
4021,
6507,
1157,
4039,
3368,
4053,
486,
2661,
2662,
6912,
5844,
5846,
7277,
4070,
5855,
5510,
5164,
3410,
6585,
171,
2366,
7333,
6980,
2740,
1274,
6277,
5932,
4152,
7005,
... | Test |
4,303 | 7 | Gremlin_(programming_language):gremlin programming language gremlin graph traversal language virtual machine developed apache tinkerpop apache software foundation gremlin works oltp-based graph databases well olap-based graph processors gremlin automata functional language foundation enable gremlin naturally support imperative declarative querying host language agnosticism user-defined domain specific languages extensible compiler/optimizer single- multi-machine execution models hybrid depth- breadth-first evaluation well turing completeness explanatory analogy apache tinkerpop gremlin graph databases jdbc sql relational databases likewise gremlin traversal machine graph computing java virtual machine general purpose computing gremlin apache2-licensed graph traversal language used graph system vendors typically two types graph system vendors oltp graph databases olap graph processors table outlines graph vendors support gremlin following examples gremlin queries responses gremlin-groovy environment relative graph representation movielens dataset dataset includes users rate movies users one occupation movie one categories associated movielens graph schema detailed gremlin supports declarative graph pattern matching similar sparql instance following query uses gremlin match -step gremlin virtual machine composed instruction set well execution engine analogy drawn gremlin java following traversal gremlin traversal gremlin-java8 dialect gremlin language i.e fluent-style expressing graph traversal represented host language supports function composition function nesting due simple requirement exists various gremlin dialects including gremlin-groovy gremlin-scala gremlin-clojure etc gremlin-java8 traversal ultimately compiled step sequence called traversal string representation traversal provided steps primitives gremlin graph traversal machine parameterized instructions machine ultimately executes gremlin instruction set approximately 30 steps steps sufficient provide general purpose computing typically required express common motifs graph traversal query given gremlin language instruction set virtual machine possible design another traversal language compiles gremlin traversal machine analogous scala compiles jvm instance popular sparql graph pattern match language compiled execute gremlin machine following sparql query would compile gremlin-java8 sparql query would represented compile identical gremlin step sequence i.e traversal gremlin graph traversal machine execute single machine across multi-machine compute cluster execution agnosticism allows gremlin run graph databases oltp graph processors olap | [
3928,
5894,
7238,
894,
105,
1333,
901,
2103,
5728,
7805,
2741,
7444,
7896,
5571,
5007,
3463,
3542,
3204,
1286,
6821,
5054,
840,
1392,
3031,
5408,
3558,
5677,
3479,
6128,
5863,
684,
6387,
5075,
6137,
7488,
7857,
4635,
5874,
3915,
1511,
4... | Test |
4,304 | 4 | Computer_security_policy:computer security policy computer security policy defines goals elements organization computer systems definition highly formal informal security policies enforced organizational policies security mechanisms technical implementation defines whether computer system secure insecure formal policy models categorized core security principles confidentiality integrity availability example bell-la padula model confidentiality policy model whereas biba model integrity policy model system regarded finite-state automaton set transitions operations change system state security policy seen statement partitions states authorized unauthorized ones given simple definition one define secure system one starts authorized state never enter unauthorized state represent concrete policy especially automated enforcement language representation needed exist lot application specific languages closely coupled security mechanisms enforce policy application compared abstract policy languages e.g domain type enforcement-language independent concrete mechanism | [
2557,
2810,
3231,
1368,
700,
2774,
4440,
2423
] | Test |
4,305 | 9 | FX-87:fx-87 fx-87 polymorphic typed functional language based system static program analysis every expression two static properties type effect study done mit fx-87 yields similar performance results functional languages programs contain side effects fibonacci factorial fx-87 yield great performance increase matching dna sequences kfx kernel language fx-87 described 'polymorphic effect systems j.m lucassen et al. proceedings 15th annual acm conference popl acm 1988 pp 47–57 | [
7385
] | Test |
4,306 | 1 | LibreOffice_Base:libreoffice base libreoffice base free open-source relational database management system part libreoffice office suite libreoffice base built fork openoffice.org first released version 3.4.0.1 october 4 2011 similarly packages libreoffice suite base supported across multiple platforms including microsoft windows macos linux base recognized cross-platform compatibility relative microsoft access developed exclusively windows libreoffice base designed allow users easily create access modify view databases data done providing users graphical user interface allows users work four main tools tables queries forms reports base includes software wizards assist users various aspects program base able work embedded external database files embedded databases stored single file using c++ based firebird java-based hsqldb storage engine connecting external databases base acts graphical user interface front-end facilitate interactions various database systems including microsoft access databases jet odbc/jdbc data sources mysql mariadb postgresql base described unusual project niche database management system software tends toward proprietary software designed enterprise users proprietary database management software costs described reason use base small businesses work ongoing transition embedded storage engine hsqldb firebird sql back-end firebird included libreoffice experimental option since libreoffice 4.2 august 2018 document foundation announced release libreoffice version 6.1 experimental mode used embedded firebird engine support fully available old hsqldb engine deprecated—although still available—and replaced firebird default option february 2019 document foundation released libreoffice version 6.2 embedded firebird engine support moved experimental mode operational firebird migration assistant create backup copy content xml document migration process | [
5252,
6056,
4759,
5571,
6538,
6586,
5956,
578,
684
] | Test |
4,307 | 4 | Killer_poke:killer poke computer jargon killer poke method inducing physical hardware damage machine peripherals insertion invalid values via example basic poke command memory-mapped control register term typically used describe family fairly well known tricks overload analog electronics crt monitors computers lacking hardware sanity checking notable examples ibm portable commodore pet pet-specific killer poke connected architecture machine video rasterizer circuits early pets writing certain value memory address certain i/o register codice_1 made machine able display text screen much faster pet range revamped updated hardware discovered performing old trick new hardware led strange behavior new video chip could possibly damage pet integrated crt monitor commodore 64 optional external 5-1/4 floppy drive commodore 1541 contained 6502 microprocessor used run commodore dos also manage drive mechanism drives stored data 40 tracks 0–39 stepper motor could manually controlled basic print -ing memory-write commands drive correspond poke command basic write drive internal memory i/o registers computer drive either end range track 0 track 39 commanded continue moving software firmware method prevent drive damage continued knocking drive head stop would throw mechanism alignment problem exacerbated copy protection techniques used non-standard disk formats unusual track counts commodore 1571 optical head stop instead mechanical one trs-80 model iii ability switch 32-character-wide display 64-character display actuated relay video hardware accomplished writing specific memory-mapped control register programs repeatedly switched 32- 64-character modes high speed either purpose accidentally could permanently damage video hardware single killer poke demonstrates software failure mode could permanently damage hardware trs-80 color computer ibm pc ibm pcjr nascom msx amstrad cpc bbc micro acorn computers contained built-in relay controlling external tape recorder toggling motor control relay tight loop would reduce relay longevity floppy drive commodore amiga personal computer could made produce noises various pitches making drive heads move back forth program existed could play el cóndor pasa less correctly amiga floppy drive sounds relied head assembly hitting stop gradually sent head alignment certain models lg cd-rom drives specific firmware used abnormal command update firmware clear buffer command usually used cd-rw drives linux uses command tell difference cd-rom cd-rw drives cd-rom drives dependably return error unsupported cd-rw command faulty drives interpreted update firmware causing stop working casual parlance bricked systemd mounts variables used unified extensible firmware interface linux system sysfs writable root user system result possible root user system completely brick system non-conforming uefi implementation specifically msi laptops using codice_2 command delete codice_3 directory recursively delete root directory game boy lcd screen turned game software outside vertical blanking interval damage hardware | [
4009,
6952,
578,
3359
] | Validation |
4,308 | 9 | WBEM_Services_Specification:wbem services specification jsr 48 java wbem api specification java specification request developed java community process specifies java language binding dmtf common information model/web-based enterprise management standards jsr 48 expert group completed public review 2006 way create technology compatibility kit order finalize standard api regarded stable jsr 48 requires java platform standard edition java se formerly j2se 7 higher ws jsr-48 api api composed 5 packages ws provides jsr-48 implementation part ws sdk pro ws also uses jsr-48 ws j wbem server wave wbem agent validation environment sblim cim client java adopted jsr 48 api stated openpegasus project use jsr 48 jmpi provider interface although status yet available | [
4552,
737
] | Train |
4,309 | 4 | Zeroday_Emergency_Response_Team:zeroday emergency response team computer security zeroday emergency response team zert group volunteer security researchers produced emergency patches zero day attack vulnerabilities proprietary software came public notice late september 2006 patch month vector markup language vulnerability microsoft later producing patch older versions microsoft windows longer supported microsoft team included several members prominent antivirus network security work manifesto states zert members work together team release non-vendor patch so-called 0day zero-day exploit appears open poses serious risk public infrastructure internet purpose zert crack products rather uncrack averting security vulnerabilities widely exploited zert website updated since april 2007 group presumed inactive | [
2791,
4759,
1805
] | Test |
4,310 | 4 | Dirtbox_(cell_phone):dirtbox cell phone dirtbox drt box cell site simulator phone device mimicking cell phone tower creates signal strong enough cause nearby dormant mobile phones switch mounted aircraft used united states marshals service locate collect information cell phones believed connected criminal activity also used jam phones device name comes company developed digital receiver technology inc. drt owned boeing company boeing describes device hybrid jamming managed access detection similar device smaller range controversial stingray phone tracker widely used u.s. federal entities including federal bureau investigation fbi known drt first manufactured dirtbox company publicly advertise stating web site due sensitive nature work unable publicly advertise many products wall street journal wrote u.s marshals service program utilizing device fully matured 2007 boeing bought drt 2008 similar devices harris corporation like stingray phone tracker sold around time since 2008 airborne mounting kit cell phone surveillance said cost 9,000 june 11 2010 boeing company asked national telecommunications information administration advise united states congress ... communications act 1934 modified allow prison officials state local law enforcement use appropriate cell phone management suggested special weapons tactics swat teams paramilitary tactical units could use devices control wireless communications raids chicago police department bought dirtboxes eavesdrop demonstrators 2012 nato summit used 2014 black lives matter demonstrations 2015 became known los angeles police department purchased devices device described size mimic cell phone tower utilizes imsi-catcher international mobile subscriber identity technology phone services use identify individual subscribers emits pilot signal made appear stronger nearest cell tower causing phones within range broadcast imsi numbers electronic serial numbers esn encryption prevent process devices retrieve phone encryption session keys less one second success rates 50–75 real world conditions aircraft-mounted device locate phone within 10 feet another source claims triangulating flights dirtbox pinpoint phone location two feet dirtbox hybrid detection managed access jamming technologies according wall street journal people knowledge program determine phones belong suspects non-suspects cell phones interest belonging prison personnel commercial users area returned local network also selectively interrupt prevent calls certain phones used block unauthorized phone use prison inmates also retrieve data phones according boeing technology unobtrusive legitimate wireless communications bypasses phone companies operations u.s marshals service technical operations group used device fixed manned airplanes track fugitives said deploy targets requested parts justice program devices operated least five u.s. airports covering u.s. population unclear whether u.s marshals service requests court orders use devices marshals service used dirtboxes mexican drug war tracking fugitives coordination mexico naval infantry force flights guatemala dirtboxes also used united states special operations command drug enforcement administration fbi u.s. customs border protection according procurement documents u.s. navy bought dirtboxes mount drones naval air weapons station china lake research development facility southern california pentagon washington headquarters services bought dirtboxes 2011 based references drtbox nsa boundless informant screenshots leaked edward snowden dirtboxes probably used nsa 2013 french newspaper lemonde wrote thanks drtbox 62.5 million phone data collected france united states naval special warfare development group group one bought digital receiver technology 1301b system april 2 2007 25,000 according united states government procurement web site national telecommunications information administration ntia known dirtboxes since least 2010 2014 united states department justice refused confirm deny government agencies used official said would utterly false conflate law-enforcement program collection bulk telephone records national security agency federal communications commission responsible licensing regulating cell-service providers aware dirtbox activity prior wall street journal exposé january 2015 us senate judiciary committee asked department justice department homeland security law enforcement agencies used drtboxes specify legal processes policies existed protect privacy whose information collected privacy advocates including u.s. rep. alan grayson d-florida criticized dirtbox use violation fourth amendment united states constitution brian owsley law professor indiana institute technology former united states magistrate said use devices legally think government would need obtain search warrant based probable cause consistent fourth amendment guardian quoted michael german professor new york university law school former fbi agent saying overriding problem excessive secrecy hides government ’ ever-expanding surveillance programs public accountability senator edward markey d-massachusetts former senator al franken d-minnesota warned americans privacy rights must assured | [
731
] | Validation |
4,311 | 4 | NetTransformer:nettransformer nettransformer cross-platform network discovery program software created idea discovering set snmp queries ip networks state produce various data models use data models inputs transform network one state another per original phd author used nettransformer demonstrate network transformation isp network ipv4 ipv6 state transformation long lasting process typically driven strategy passes many states example initial state current state network services offered ipv4 long term goal network service ipv6 achieve isp pass many intermediate states depending transformation strategy network mapping perspective nettransformer generates 3 distinct data models software generating topology views network topology diff views network centric data model thus lot people use simply network mapping one important concepts network treated separate project since many kinds networks years appeared various kinds project types example free graph working kind graph using rest diff visualization capabilities software | [
2837,
1462,
4759,
5571,
578,
3819
] | Test |
4,312 | 3 | Snail_Maze:snail maze snail maze 1986 video game sega part sega master system instead released cartridge built system bios could played starting system without game cartridge inserted holding buttons 1 2 simultaneously later console models included minimal bios memory constraints snail maze removed systems instead included built alex kidd miracle world sonic hedgehog snail maze never released cartridge card format simple game snail maze involves navigating small orange snail yellow shell blue maze goal area clearly marked players must attempt reach within time limit despite relative simplicity compared games era snail maze could quite challenging subsequent levels reduce time available giving progressively lower margin error snail maze fans worked keep game becoming obscure footnote video game history example 2004 port snail maze made japanese msx computer platform port included enhanced graphics well new title screen version snail maze included coleco sonic handheld system created 2006 port snail maze released december 2015 ti-84 plus ce graphing calculator written ez80 assembly language james vernon | [
1052
] | Test |
4,313 | 0 | Manually_Annotated_Sub-Corpus:manually annotated sub-corpus masc balanced subset 500k words written texts transcribed speech drawn primarily open american national corpus oanc oanc 15 million word growing corpus american english produced since 1990 public domain otherwise free usage redistribution restrictions masc includes manually validated annotations logical structure headings sections paragraphs etc sentence boundaries three different tokenizations associated part speech tags shallow parse noun verb chunks named entities person location organization date time penn treebank syntax additional manually produced validated annotations produced masc project portions sub-corpus including full-text annotation framenet frame elements 100k+ sentence corpus wordnet 3.1 sense tags one-tenth also annotated framenet frame elements annotations portions sub-corpus wide variety linguistic phenomena contributed projects including propbank timebank mpqa opinion several others co-reference annotations clause boundaries entire masc corpus scheduled released end 2016 wordnet sense annotations occurrences 114 words also included masc distribution well framenet annotations 50-100 occurrences 114 words sentences wordnet framenet annotations also distributed part masc sentence corpus unlike freely available corpora including wide variety linguistic annotations masc contains balanced selection texts broad range genres present masc includes seventeen different types linguistic annotation production ** currently available original format masc annotations whether contributed produced in-house transduced graph annotation format graf defined iso tc37 sc4 ’ linguistic annotation framework laf online tool anc2go transduce annotations parts masc several formats including conll iob format formats use uima general architecture text engineering masc open data resource used anyone purpose time collaborative community resource sustained community contributions annotations derived data freely downloadable masc download page linguistic data consortium masc also distributed part-of-speech-tagged form natural language toolkit | [
3959,
5800
] | Test |
4,314 | 3 | LGA_771:lga 771 lga 771 also known socket j cpu interface introduced intel 2006 used intel core microarchitecture netburst microarchitecture dempsey based dp-capable server processors dual-core xeon codenamed dempsey woodcrest wolfdale quad-core processors clovertown harpertown yorkfield-cl also used core 2 extreme qx9775 succeeded lga 1366 nehalem-based xeon processors name implies land grid array 771 contacts word socket instance misnomer processor interface pin holes instead 771 protruding lands touch contact points underside microprocessor j socket j refers now-canceled processor codenamed jayhawk expected debut alongside interface intended successor socket 604 takes much design lga 775 almost pin compatible lga 775 socket 771 cpus rotated 90 degrees two pins swapped small adapters developed chinese computer diy enthusiasts available allow lga 771 cpus installed lga 775 motherboards bios microcode supports also able add supportion microcode manually | [
2541,
6698,
4123,
3849,
1729,
2828,
6173,
2830,
3002,
7974,
5379,
3193,
1841,
1645,
3203,
4968,
3385,
4972,
5853,
2685,
6935,
8021,
7302,
5963,
5343,
866,
3333,
7134,
262,
6683,
5886
] | Test |
4,315 | 7 | Koding:koding koding development environment automation platform owned koding inc. allows software developers define development environments definition file called stack script file calls various cloud providers provision defined development environment file visible entire team updated administrators account environments provisioned file shared web browser without needs downloading software development kits developers also able download command line tool called kd allows mount provisioned vms computers thus enabling development using developers local ides since platform able create linux vms supports multiple programming languages including c c++ go java node.js perl php python ruby name=ram 2009 kodingen predecessor koding launched included features koding today later application temporarily closed development resulted koding first version koding launched 16 january 2012 private beta public beta began 24 july 2012 final beta version single developer version released public 7 august 2013 march 2016 koding released teams version geared towards enterprises teams developers koding received 20m date khosla ventures series b matrix partners series rtp ventures greycroft partners seed funding koding via environment definition files able create resources cloud providers developers able write code created resources | [
5629,
2451,
5983,
4296,
993,
6428,
1177,
831,
313,
1016,
6029,
237,
2870,
6660,
7933,
518,
340,
7582,
5965,
6400,
3584,
7687,
7505,
1435
] | Test |
4,316 | 4 | Xplico:xplico xplico network forensics analysis tool nfat software reconstructs contents acquisitions performed packet sniffer e.g wireshark tcpdump netsniff-ng unlike protocol analyzer whose main characteristic reconstruction data carried protocols xplico born expressly aim reconstruct protocol application data able recognize protocols technique named port independent protocol identification pipi name xplico refers latin verb explico significance xplico free open-source software subject requirements gnu general public license gpl version 2 clarify xplico imagine raw data ethernet ppp web navigation http protocol case xplico able extract reconstruct web pages contents images files cookies similarly xplico able reconstruct e-mail exchanged imap pop smtp protocols among protocols xplico identifies reconstructs voip msn irc http imap pop smtp ftp xplico software architecture provides output module xplico different user interfaces fact used command line web user interface called xplico interface protocol dissector modules decoding individual protocol protocol dissector reconstruct extract data protocol modules plug-in configuration file loaded execution program allows focus decoding want decode voip calls web traffic configure xplico load rtp sip modules excluding http module another feature xplico ability process reconstruct huge amounts data able manage pcap files multiple gigabytes even terabytes multiple capture probes simultaneously thanks use various types input modules pcap files uploaded many ways directly xplico web user interface sftp transmission channel called pcap-over-ip features xplico used contexts lawful interception network forensics xplico also specific version called pcap2wav able decode voip calls based rtp protocol sip h323 mgcp skinny supports decodidica audio codecs g711ulaw g711alaw g722 g729 g723 g726 msrta microsoft real-time audio examples assumed eth0 used network interface xplico -m rltm -i eth0 xplico -m pcap -f example.pcap xplico -m pcap -d /path/dir/ cases data decoded stored directory named xdecode parameter -m select input module type input module named rltm acquires data directly network interface vice versa input module named pcap acquires data form pcap files directory xplico installed default major distributions digital forensics penetration testing | [
1715,
7170,
5561,
3700,
726,
5125,
7825,
5571,
6908,
578,
6020,
1756,
6029,
588,
4523,
6929,
6574,
3823,
5254,
430,
6488,
5965,
5880,
1435
] | Train |
4,317 | 2 | Palm_Pixi:palm pixi palm pixi pixi plus multimedia smartphones developed palm purchased 2010 hp device viewed successor palm centro smartphone palm second webos device palm pre phones considered smallest smartphone market able browse internet access facebook social media sites well online banking original pixi announced september 8 2009 palm official blog released november 15 2009 sprint carrier network u.s pixi plus announced ces 2010 plus versions include wifi ability act 3g mobile hotspot sometimes known mifi phone released january 7 2010 verizon wireless carrier network subsequently mobility released may 28 2010 o2 united kingdom pixi touch screen capability qwerty keyboard access battery interior hardware phone metal faceplate sits plastic backing palm inc. detailed specifications palm pixi company product web page according information given pixi features 2.63-inch capacitive touchscreen 18-bit color 320x400 screen resolution sub-hvga display device weighs 92.5 grams 3.51 ounces 55.0 mm 2.17 inches width 111.0 mm 4.37 inches height 10.85 mm 0.43 inches thick board radios include gps dual-band cdma2000 3g evdo rev data networking e-mail supports microsoft exchange services direct push well pop3 imap yahoo mail gmail aol microsoft outlook messaging features include im sms mms features 2 megapixel camera led flash proximity sensor accelerometer bluetooth 2.1 a2dp stereo microusb connector 3.5 mm headphone jack 8 gigabytes flash memory roughly 7 gigabytes available user like palm pre pixi features webos includes over-the-air synergy synchronization pixi plus display pixi hardware specs include qualcomm msm7627 600mhz cpu adreno 200 graphics 8gb storage 256 mb ram 802.11 b/g wifi bluetooth 2.1 capable using hsdpa 3.6 mbit/s well gprs offers a-gps navigation location services battery changeable 1,150 mah unit 5.5h talk time 2g 350h standby according manufacturer camera 2 megapixel device rear led flash | [
1066,
2538,
7326,
4754,
6874,
3764,
2370,
1167,
289,
2551,
3524,
6443,
488,
1284,
740,
1202,
5236,
7919,
4166,
6378,
1581,
1582,
4627,
3734,
1973,
3405,
2338,
1237,
1702,
7049,
5797
] | Test |
4,318 | 4 | Race_condition:race condition race condition race hazard behavior electronics software system system substantive behavior dependent sequence timing uncontrollable events becomes bug one possible behaviors undesirable term race condition already use 1954 example david a. huffman doctoral thesis synthesis sequential switching circuits race conditions occur especially logic circuits multithreaded distributed software programs typical example race condition may occur logic gate combines signals traveled along different paths source inputs gate change slightly different times response change source signal output may brief period change unwanted state settling back designed state certain systems tolerate glitches output functions clock signal systems contain memory example system rapidly depart designed behaviour effect temporary glitch becomes permanent glitch consider example two-input gate fed logic signal one input negation another input theory output never true however changes value take longer propagate second input first changes false true brief period ensue inputs true gate output also true design techniques karnaugh maps encourage designers recognize eliminate race conditions cause problems often logic redundancy added eliminate kinds races well problems logic elements enter metastable states create problems circuit designers critical race condition occurs order internal variables changed determines eventual state state machine end non-critical race condition occurs order internal variables changed determine eventual state state machine end static race condition occurs signal complement combined together dynamic race condition occurs results multiple transitions one intended due interaction gates eliminated using two levels gating essential race condition occurs input two transitions less total feedback propagation time sometimes cured using inductive delay line elements effectively increase time duration input signal race conditions arise software application depends sequence timing processes threads operate properly electronics critical race conditions result invalid execution bugs critical race conditions often happen processes threads depend shared state operations upon shared states critical sections must mutually exclusive failure obey rule opens possibility corrupting shared state concept called data race type race condition data races important parts various formal memory models notably memory model defined c11 c++11 standards specify c c++ program containing data race undefined behavior race conditions reputation difficult reproduce debug since end result nondeterministic depends relative timing interfering threads problems occurring production systems therefore disappear running debug mode additional logging added attaching debugger often referred heisenbug therefore better avoid race conditions careful software design rather attempting fix afterwards simple example let us assume two threads want increment value global integer variable one ideally following sequence operations would take place case shown final value 2 expected however two threads run simultaneously without locking synchronization outcome operation could wrong alternative sequence operations demonstrates scenario case final value 1 instead expected result 2 occurs increment operations mutually exclusive mutually exclusive operations interrupted accessing resource memory location regard data races subset race conditions precise definition data race specific formal concurrency model used typically refers situation memory operation one thread could potentially attempt access memory location time memory operation another thread writing memory location context dangerous implies data race different race condition possible nondeterminism due timing even program without data races example program memory accesses use atomic operations dangerous many platforms two threads write memory location time may possible memory location end holding value arbitrary meaningless combination bits representing values thread attempting write could result memory corruption resulting value one neither thread attempted write sometimes called 'torn write similarly one thread reads location another thread writing may possible read return value arbitrary meaningless combination bits representing value memory location held write bits representing value written many platforms special memory operations provided simultaneous access cases typically simultaneous access using special operations safe simultaneous access using memory operations dangerous sometimes special operations safe simultaneous access called atomic synchronization operations whereas ordinary operations unsafe simultaneous access called data operations probably term data race many platforms race condition involving synchronization operations race may nondeterministic otherwise safe data race could lead memory corruption undefined behavior precise definition data race differs across formal concurrency models matters concurrent behavior often non-intuitive formal reasoning sometimes applied c++ standard draft n4296 2014-11-19 defines data race follows section 1.10.23 page 14 two actions potentially concurrent execution program contains data race contains two potentially concurrent conflicting actions least one atomic neither happens except special case signal handlers described omitted data race results undefined behavior parts definition relating signal handlers idiosyncratic c++ typical definitions data race paper detecting data races weak memory systems provides different definition two memory operations conflict access location least one write operation ... two memory operations x sequentially consistent execution form race 〈x y〉 iff x conflict ordered hb1 relation execution race 〈x y〉 data race iff least one x data operation two memory operations accessing location one write hb1 relation defined elsewhere paper example typical happens-before relation intuitively prove situation one memory operation x guaranteed executed completion another memory operation begins say x happens-before neither x happens-before happens-before x say x ordered hb1 relation clause ... ordered hb1 relation execution intuitively translated ... x potentially simultaneous paper considers dangerous situations least one memory operations data operation parts paper paper also defines class synchronization operations safe potentially simultaneous use contrast data operations java language specification provides different definition two accesses reads writes variable said conflicting least one accesses write ... program contains two conflicting accesses §17.4.1 ordered happens-before relationship said contain data race ... data race cause incorrect behavior returning wrong length array critical difference c++ approach java approach c++ data race undefined behavior whereas java data race merely affects inter-thread actions means c++ attempt execute program containing data race could still adhering spec crash could exhibit insecure bizarre behavior whereas java attempt execute program containing data race may produce undesired concurrency behavior otherwise assuming implementation adheres spec safe important facet data races contexts program free data races guaranteed execute sequentially consistent manner greatly easing reasoning concurrent behavior program formal memory models provide guarantee said exhibit sc drf sequential consistency data race freedom property approach said achieved recent consensus presumably compared approaches guarantee sequential consistency cases approaches guarantee example java guarantee directly specified program correctly synchronized sequentially consistent executions free data races program correctly synchronized executions program appear sequentially consistent §17.4.3 extremely strong guarantee programmers programmers need reason reorderings determine code contains data races therefore need reason reorderings determining whether code correctly synchronized determination code correctly synchronized made programmer need worry reorderings affect code program must correctly synchronized avoid kinds counterintuitive behaviors observed code reordered use correct synchronization ensure overall behavior program correct however use allow programmer reason possible behaviors program simple way behavior correctly synchronized program much less dependent possible reorderings without correct synchronization strange confusing counterintuitive behaviors possible contrast draft c++ specification directly require sc drf property merely observes exists theorem providing note shown programs correctly use mutexes memory_order_seq_cst operations prevent data races use synchronization operations behave operations executed constituent threads simply interleaved value computation object taken last side effect object interleaving normally referred “ sequential consistency ” however applies data-race-free programs data-race-free programs observe program transformations change single-threaded program semantics fact single-threaded program transformations continue allowed since program behaves differently result must perform undefined operation.— end note note c++ draft specification admits possibility programs valid use synchronization operations memory_order memory_order_seq_cst case result may program correct guarantee sequentially consistency provided words c++ correct programs sequentially consistent approach thought give c++ programmers freedom choose faster program execution cost giving ease reasoning program various theorems often provided form memory models provide sc drf guarantees given various contexts premises theorems typically place constraints upon memory model therefore upon implementation also upon programmer say typically case programs meet premises theorem could guaranteed execute sequentially consistent manner drf1 memory model provides sc drf allows optimizations wo weak ordering rcsc release consistency sequentially consistent special operations vax memory model data-race-free-0 memory models plpc memory model provides sc drf allows optimizations tso total store order pso pc processor consistency rcpc release consistency processor consistency special operations models drfrlx provides sketch sc drf theorem presence relaxed atomics many software race conditions associated computer security implications race condition allows attacker access shared resource cause actors utilize resource malfunction resulting effects including denial service privilege escalation specific kind race condition involves checking predicate e.g authentication acting predicate state change time check time use kind bug exists security-sensitive code security vulnerability called time-of-check-to-time-of-use tocttou bug created race conditions also intentionally used create hardware random number generators physically unclonable functions pufs created designing circuit topologies identical paths node relying manufacturing variations randomly determine paths complete first measuring manufactured circuit specific set race condition outcomes profile collected circuit kept secret order later verify circuit identity two programs may collide attempts modify access file system result data corruption privilege escalation file locking provides commonly used solution cumbersome remedy involves organizing system way one unique process running daemon like exclusive access file processes need access data file via interprocess communication one process requires synchronization process level different form race condition exists file systems unrelated programs may affect suddenly using available resources disk space memory space processor cycles software carefully designed anticipate handle race situation may become unpredictable risk may overlooked long time system seems reliable eventually enough data may accumulate enough software may added critically destabilize many parts system example occurred near loss mars rover spirit long landing solution software request reserve resources need beginning task request fails task postponed avoiding many points failure could occurred alternatively points equipped error handling success entire task verified afterwards continuing common approach simply verify enough system resources available starting task however may adequate complex systems actions running programs unpredictable networking consider distributed chat network like irc user starts channel automatically acquires channel-operator privileges two users different servers different ends network try start same-named channel time user respective server grant channel-operator privileges user since neither server yet received server signal allocated channel problem largely solved various irc server implementations case race condition concept shared resource covers state network channels exist well users started therefore privileges server freely change long signals servers network changes update conception state network however latency across network makes possible kind race condition described case heading race conditions imposing form control access shared resource—say appointing one server control holds privileges—would mean turning distributed network centralized one least one part network operation race conditions also exist computer program written non-blocking sockets case performance program dependent speed network link software flaws life-critical systems disastrous race conditions among flaws therac-25 radiation therapy machine led death least three patients injuries several another example energy management system provided ge energy used ohio-based firstenergy corp among power facilities race condition existed alarm subsystem three sagging power lines tripped simultaneously condition prevented alerts raised monitoring technicians delaying awareness problem software flaw eventually led north american blackout 2003 ge energy later developed software patch correct previously undiscovered error neuroscience demonstrating race conditions occur mammal rat brains well many software tools exist help detect race conditions software largely categorized two groups static analysis tools dynamic analysis tools thread safety analysis static analysis tool annotation-based intra-procedural static analysis originally implemented branch gcc reimplemented clang supporting pthreads dynamic analysis tools include several benchmarks designed evaluate effectiveness data race detection tools | [
5371,
7529,
5042,
1481,
6118,
1805,
421,
2961,
3667,
2969,
780,
4742,
5447,
2266,
1546,
4049,
4052,
130,
1570,
3726,
3041,
1584,
1586,
515,
1598,
6593,
4839,
5890,
7322,
549,
4847,
553,
1630,
5209,
573,
3794,
4154,
5939,
4159,
1295,
166... | Validation |
4,319 | 7 | Sixa:sixa sixa inc. cloud-computing startup company lets users on-demand access personal virtual computer company founded september 2015 headquartered san francisco california company offers custom computers developers designers gamers relevant preinstalled software service allows users access powerful cloud computer device eliminates need buy new hardware computational power needed service available windows mac os x android operating systems sixa backed combinator join summer 2016 batch july 2016 raised 261,000 funding startupbootcamp istanbul ws investments combinator starting december 2016 sixa service publicly available usage part launch company raised 3.5 million seed investment round led tandem capital | [
2961
] | Test |
4,320 | 2 | IOS_9:ios 9 ios 9 ninth major release ios mobile operating system developed apple inc. successor ios 8 announced company worldwide developers conference june 8 2015 released september 16 2015 succeeded ios 10 september 13 2016. ios 9 incorporated many feature updates built-in apps notably notes received ability draw sketches different tools image insertion prominent visual appearance website links map locations advanced list formatting all-new apple news app aggregates articles different sources apple maps received mass transit support although limited number locations launch major new system updates include proactivity siri advanced search combined make operating system contextually aware information time location provide user information ahead time searching proactive intelligence display instant results widget-like format including weather sports news ios 9 also added multiple forms multitasking ipad ios 9.3 apple added night shift mode changes color device display warmer less blue light shade prevent potential negative screen effect users circadian rhythms additionally ios 9 brought new user experience functions including quick actions peek pop based touch-sensitive display technology iphone 6s quick actions shortcuts home screen app icons users preview peek content without moving away current screen enter pop previewed content full view reception ios 9 positive critics praised proactivity siri making notification center central location information potential future updates improve functionality new multitasking features ipad complimented drawing photo insertion notes app however apple news criticized low number decent-looking articles apple maps criticized limited geographical availability mass transit support five days release apple announced ios 9 installed 50 active ios devices apple described fastest adoption rate ever new operating system ios 9 introduced apple worldwide developers conference june 8 2015 first beta made available registered developers keynote public beta made available july marked first time general public able test new versions ios official release eddy cue apple senior vice president internet software services telling fast company public beta program started maps referring company apple maps launch significant issues early days ios 9 officially released september 16 2015. ios 9.0.1 released september 23 2015 first update ios 9 fixed playback issues alarms timers made setup assistant work properly resolved distortion paused frames video playback photos safari ios 9.0.2 released september 30 2015 fix multiple bugs including lock screen bypass issue ios 9.1 released october 21 2015 update included support ipad pro apple pencil 4th-generation apple tv also added support 150 new emoji part unicode 7.0 8.0 emoji standards live photos intelligently sense user raises lowers phone n't record movements bug fixes improvements security performance also included ios 9.2 released december 8 2015 update included arabic language support siri iphone support apple lightning-to-sd-card reader accessory lets users transfer photos videos sd card commonly used dslr cameras iphone without need computer ios 9.2 also included new visual download indicator apple music support wi-fi calling users along bug fixes stability improvements ios 9.2.1 released january 19 2016 bug fixes february 18 2016 second version ios 9.2.1 released fix bricking issue impacted iphones touch id sensors repaired third-party ios 9.3 released march 21 2016 new 3d touch quick actions several apple built-in apps night shift mode notes password protection touch id news better personalized recommendations support in-line video iphone landscape view health activity view carplay updates apple music apple maps new languages siri multi-user mode ipad education support pairing multiple apple watches one iphone wi-fi calling verizon users support playing videos encoded dolby digital plus audio streams select lightning-equipped ios devices well major bug fixes ios 9.3.1 released march 31 2016 fix issue caused apps become unresponsive crash tapping links ios 9.3.2 released may 16 2016 update made possible use night shift low power mode simultaneously previously possible also fixed bluetooth issue iphone se however ios 9.3.2 bricked 9.7-inch ipad pros preventing used apple pulled update ipad pro may 20 2016 re-released 9.3.2 device june 2 2016 fixing issue ios 9.3.3 released july 18 2016 bug fixes performance improvements ios 9.3.4 released august 4 2016 fix memory corruption issue could enable app execute arbitrary code kernel privileges update consequently patched ios jailbreaking method used chinese programming group pangu team ios 9.3.5 released august 25 2016 fix three critical security vulnerabilities user clicked malicious link jailbreak enabled device installed spyware pegasus intercept collect information device well activate microphone track device location spyware used strong encryption avoid detection ios 9.3.6 released july 22 2019 address issue could impact gps location performance could cause system date time incorrect update available iphone 4s cellular models ipad mini 1st generation ipad 2 ipad 3rd generation iphone 6s iphone 6s plus touch-sensitive display feature called 3d touch incorporated ios 9 similar force touch found trackpad apple macbook computers quick actions shortcuts added apps support 3d touch feature triggered pressing slightly harder app icon also introduces actions known peek pop lets users firmly hold preview peek kind content hovering window optionally apply pressure enter pop content full view taptic engine iphone 6s provides haptic feedback time users press screen harder ios 9 comes two important battery-saving updates phone placed face-down screen light upon receiving notifications apple also added low power mode modifies amount energy dedicated background services animations example background app refresh push email paused low power mode phone reaches 20 battery level users automatically prompted turn low power mode changes color battery icon top row status bar screen yellow battery goes higher 80 level low power mode automatically turns back san francisco new system font replaced helvetica neue system typeface ios ios 9 added new battery widget notification center displayed battery life charging status connected bluetooth device shift button inactive lowercase letters displayed keyboard instead all-caps representation previous ios versions ios 9 smaller update ios 8 requiring 1.3 gb space compared 4.58 gb ios 8 additionally ios 9 includes option temporarily delete apps allow update install update installed apps automatically restored ios 9 also features app thinning functionality whereby necessary assets needed run apps individual device downloaded rather entire app potentially saving space ios 9 adds number features ipad improve productivity include slide split screen picture picture enhanced multitasking similar experience found os x el capitan slide allows user pull second app swipe right edge display app takes 1/3 screen sticks right side screen interactivity within full-screen app disabled left inactive background feature allows users perform quick tasks dismiss app user taps handle next slide window extends window towards left screen user enters split screen allows interact two apps simultaneously side-by-side 50/50 split users also switch another app either slide mode split screen view pulling handle top either app selecting another app list replace existing one picture picture mode allows users minimize facetime calls supported videos smaller window continue watching tasks ipad split screen multitasking feature available ipad air 2 ipad mini 4 ipad pro slide picture picture features available ipad air ipad air 2 ipad mini 2 newer ipad pro banner notifications tapped causing another app open back button top-left corner screen added bringing user back previous app night shift display mode introduced ios 9.3 mode shifts colors device display warmer similar f.lux popular program microsoft windows apple macos computers enabled uses device clock geographic location determine turn feature optionally user set manual schedule schedule ease access new night shift toggle control center settings night shift located display brightness settings app top enabling feature setting schedule user also set warmth display despite introduced ios 9.3 march 2016 n't possible use night shift low power mode simultaneously release ios 9.3.2 two months later night shift requires 64-bit processor found apple a7 newer chips means older ios devices including iphone 4s iphone 5 iphone 5c ipad 2 ipad 3 ipad 4 first-generation ipad mini ipod touch 5 receive night shift mode ios 9 includes performance speed improvements thanks expanded use metal api metal introduced ios 8 previously limited game developers ios 9 use metal expanded let handle many core user interface elements graphics intelligence one main features ios 9 consisting newly integrated siri search previously known spotlight well proactivity throughout operating system ios aware contextual information time location proactively provides user may need advance save time effort typing search also improved display instant answers at-a-glance widget-like format similar provided siri interface search display current weather sports scores news search screen proactive suggestions accessed either pulling notifications window safari web browser search bar left home screen intelligence also extends apps instance mail events automatically added calendar details found message content likely additional recipients suggested message composition siri also aware currently screen engaged holding home button ios 9 introduces multiple security enhancements introduces 6-digit passcode default extra two digits previous 4-digit default well support two-factor authentication original ios 9 release september 2015 fixed security issue within previous ios versions flaw allowed anyone within range airdrop user install malware target device tweak ios settings exploit would still work victim rejected incoming airdrop file settings app ios 9 search bar makes easier find settings options user also options notifications grouped app came ability turn shake undo ipad two-finger drag keyboard moves cursor freely like traditional trackpad making positioning cursor selecting text easier keyboard-to-trackpad feature also extended iphone 6s 6s plus users 3d touch force press keyboard enable trackpad also ipad shortcut bar added cut copy paste undo redo functions folders display 16 apps per page 4-by-4 arrangement compared 9 iphone allowing increased total 240 apps single folder ios 9 introduced wi-fi assist feature default automatically switches phone cellular data wi-fi connection spotty whenever user presented flight information user click link view preview flight ios 9.3 pdfs saved ibooks application via safari itunes synced icloud ios 9 setting enables icloud drive app home screen icloud drive lets user save browse files folders icloud health app introduced ios 8 received landscape mode iphone also added support reproductive health uv exposure water intake sedentary state data types ios 9.3 also tracks sleep exercise weight apple watch messages app allows user search text text highlighted scrolled apple maps adds support transit directions baltimore berlin chicago london los angeles mexico city new york city paris philadelphia san francisco toronto washington d.c. along 300 locations china maps app also enhanced location details including nearby feature recommends shops restaurants places drink close proximity user places serving food users specify exactly type food want ios 9 includes new apple news app replacing newsstand app aggregates news different sources similar style flipboard app features mobile-formatted layout loads quickly informative animations full-bleed images additionally news supports rss feeds safari web browser launch news app available united states expanded united kingdom australia ios 9.1 update march 2016 apple opened news platform news agencies including independent bloggers notes app received number enhancements ios 9 including ability draw sketches number different tools including ruler straight lines images also added links websites map locations get prominent visual appearance added notes ipad iphone landscape mode notes range color options drawing well eraser advanced formatting options including checked bulleted dashed numbered lists app also supports icloud allows easy folder creation secure notes feature introduced ios 9.3 lets ios user protect notes either passcode touch id photos app ios 9 included improved scrubber bar photo viewer screenshots selfies albums ability hold select multiple photos easily without delete individually also allows user hide sensitive material new hide option app also allows user pinch-to-zoom playing video release ios 9 safari web browser allows third-party content blocking apps safari also allows users customize appearance reader mode options font background color days release ios 9 ad blocking software topped app store charts marco arment developer peace app saying web advertising behavioral tracking control ... 're unacceptably creepy bloated annoying insecure 're getting worse alarming pace passbook application renamed wallet ios 9 includes many new changes support store loyalty cards gift cards discover credit/debit cards apple pay uk wallet app also accessed lock screen ios 9.3 music api allows developers integrate apps apple music streaming service ios 9 received mostly positive reviews dan seifert verge praised improvements proactivity siri highlighting notification drop-down contains information user needs although pointed google google microsoft cortana personal assistants offer similar services sometimes better varied ways achieving results improvements ios lay foundation even capabilities future chris velazco engadget liked small thoughtful design changes impressed new multitasking features ipad referring split screen lovely little feature however criticize low number decent-looking articles apple news writing 'll notice discrepancy articles handled -- formatted text white background outlet logo top also noted limited number locations apple maps launch supported mass transit directions matt swider techradar wrote siri proactivity lists robust enjoyed notifications sorted chronologically rather app samuel gibbs guardian welcomed changes built-in apps drawing photo insertion notes unknown number identification emails phone siri automatically launching music app upon plugging headphones also praised updates keyboard calling much easier use apple facing 5 million lawsuit allegedly slowing iphone 4s ios 9 according lawsuit ios 9 update slowed iphone 4s point phone unusable performance sluggish apple knew fact planned obsolescence september 21 2015 apple announced ios 9 installed 50 active ios devices measured app store according apple fastest adoption rate ever new operating system february 2016 news outlets reported users updated ios 9 particular device components repaired third-party notably touch id fingerprint recognition sensor rendered phone bricked issue named error 53 according ifixit limited iphone 6 6 plus devices apple stated protect fingerprint data using secure enclave uniquely paired touch id sensor iphone serviced authorised apple service provider apple retail store changes affect touch id sensor pairing re-validated ... check ensures device ios features related touch id remain secure without unique pairing malicious touch id sensor could substituted thereby gaining access secure enclave ios detects pairing fails touch id including apple pay disabled device remains secure apple released new version ios 9.2.1 later february fix issue february 2016 bug discovered could permanently disable 64-bit devices bug setting time 1 january 1970 would cause device get stuck reboot process ios 9.3 released march 21 2016 fixed issue may 2016 apple released ios 9.3.2 update followed reports bricked 9.7-inch ipad pros connect itunes message error 56 message itunes could n't restore tablet apple temporarily stopped offering 9.3.2 update re-release version june 2016 fixed issue release ios 9.3.3 july 2016 followed reports ibooks store crashed however apple explained august timing coincidence ibooks app crash result server issue software update release ios 9.3.5 august 2016 fixed three critical security vulnerabilities vulnerabilities could exploited silently enable jailbreak allow malicious installation spyware called pegasus pegasus could intercept read text messages emails track calls trace phone location activate microphone gather information apps including limited imessage gmail viber facebook whatsapp telegram skype discovery vulnerabilities dated 10 days 9.3.5 update released arab human rights defender ahmed mansoor received suspicious text message link sent citizen lab investigation ensued collaboration lookout revealed mansoor clicked link would jailbroken phone implanted spyware citizen lab linked attack israeli surveillance company known nso group sells pegasus governments lawful interception regarding widespread issue lookout explained blog post believe spyware wild significant amount time based indicators within code pointed code shows signs kernel mapping table values way back ios 7 news spyware received significant media attention particularly called sophisticated smartphone attack ever first time iphone history remote jailbreak exploit detected july 2017 information critical wi-fi security vulnerability affecting one billion ios android devices published issue named broadpwn allows attacker remotely take control nearby vulnerable smartphones turn affected devices rogue access points spreading infection nearby devices apple released security patch issue part ios 10.3.3 update though older devices running ios 9 including ipad 2 iphone 4s left without available update causing concerns safety product schools release apple drop support ios devices devices supporting ios 8 also able run ios 9 | [
6788,
3940,
4670,
7890,
2926,
4690,
734,
740,
3640,
5752,
6113,
405,
6119,
6125,
2954,
1123,
6479,
6847,
6142,
2609,
778,
1895,
4376,
5091,
4749,
5450,
7601,
4759,
3001,
2284,
7259,
2294,
120,
1940,
2300,
3025,
2665,
2679,
1582,
2327,
6... | Test |
4,321 | 3 | VMEbus:vmebus vmebus versa module europa versa module eurocard bus computer bus standard originally developed motorola 68000 line cpus later widely used many applications standardized iec ansi/ieee 1014-1987 physically based eurocard sizes mechanicals connectors din 41612 uses signalling system eurocard define first developed 1981 continues see widespread use today 1979 development motorola 68000 cpu one engineers jack kister decided set creating standardized bus system 68000-based systems motorola team brainstormed days select name versabus versabus cards large used edge connectors products adopted including ibm system 9000 instrument controller automatix robot machine vision systems kister later joined john black refined specifications created versamodule product concept young engineer working black julie keahey designed first versamodule card versabus adaptor module used run existing cards new versabus sven rau max loesel motorola-europe added mechanical specification system basing eurocard standard late standardization process result first known versabus-e later renamed vmebus versamodule eurocard bus although refer versa module europa point number companies involved 68000 ecosystem agreed use standard including signetics philips thomson mostek soon officially standardized iec iec 821 vmebus ansi ieee ansi/ieee 1014-1987 original standard 16-bit bus designed fit within existing eurocard din connectors however several updates system allow wider bus widths current vme64 includes full 64-bit bus 6u-sized cards 32-bit 3u cards vme64 protocol typical performance 40 mb/s associated standards added hot-swapping plug-and-play vme64x smaller 'ip cards plug single vmebus card various interconnect standards linking vme systems together late 1990s synchronous protocols proved favourable research project called vme320 vita standards organization called new standard unmodified vme32/64 backplanes new 2esst protocol approved ansi/vita 1.5 1999 years many extensions added vme interface providing 'sideband channels communication parallel vme examples ip module raceway interlink scsa gigabit ethernet vme64x backplanes pci express rapidio starfabric infiniband vmebus also used develop closely related standards vxibus vpx vmebus strong influence many later computer buses stebus architectural concepts vmebus based versabus developed late 1970s motorola motorola european microsystems group munich west germany proposed development versabus-like product line based eurocard mechanical standard demonstrate concept max loesel sven rau developed three prototype boards 1 68000 cpu board 2 dynamic memory board 3 static memory board named new bus versabus-e later renamed vme short versa module european lyman lym hevle vp motorola microsystems operation later founder vme marketing group subsequently renamed vme international trade association vita early 1981 motorola mostek signetics agreed jointly develop support new bus architecture companies early supporters 68000 microprocessor family john black motorola craig mackenna mostek cecil kaplinsky signetics developed first draft vmebus specification october 1981 system '81 trade show munich west germany motorola mostek signetics/philips thomson csf announced joint support vmebus also placed revision specification public domain august 1982 revision b vmebus specification published newly formed vmebus manufacturers group vita new revision refined electrical specifications signal line drivers receivers brought mechanical specification line developing iec 297 standard formal specification eurocard mechanical formats latter 1982 french delegation international electrotechnical commission iec proposed revision b vmebus international standard iec sc47b subcommittee nominated mira pauker philips france chairperson editorial committee thus formally starting international standardization vmebus march 1983 ieee microprocessor standards committee msc requested authorization establish working group could standardize vmebus us request approved ieee standards board p1014 working group established wayne fischer appointed first chairman working group john black served chairman p1014 technical subcommittee iec ieee vmebus manufacturers group vita distributed copies revision b comment received resulting requests changes document comments made clear time go past revision b december 1983 meeting held included john black mira pauker wayne fischer craig mackenna agreed revision c created take consideration comments received three organizations john black shlomo pri-tal motorola incorporated changes sources common document vmebus manufacturers group labelled document revision c.1 placed public domain ieee labelled p1014 draft 1.2 iec labelled iec 821 bus subsequent ballots ieee p1014 working group msc resulted comments required ieee p1014 draft updated resulted ansi/ieee 1014-1987 specification 1985 aitech developed contract us tacom first conduction-cooled 6u vmebus board although electrically providing compliant vmebus protocol interface mechanically board interchangeable use air-cooled lab vmebus development chassis late 1987 technical committee formed vita direction ieee create first military conduction-cooled 6u x 160mm fully electrically mechanically compatible vmebus board co-chaired dale young dy4 systems doug patterson plessey microsystems radstone technology ansi/ieee-1101.2-1992 later ratified released 1992 remains place conduction-cooled international standard 6u vmebus products 1989 john peters performance technologies inc. developed initial concept vme64 multiplexing address data lines a64/d64 vmebus concept demonstrated year placed vita technical committee 1990 performance enhancement vmebus specification 1991 par project authorization request p1014r revisions vmebus specification granted ieee ray alderman technical director vita co-chaired activity kim clohessy dy-4 systems end 1992 additional enhancements vmebus a40/d32 locked cycles rescinding dtack* autoslot-id auto system controller enhanced din connector mechanicals required work complete document vita technical committee suspended work ieee sought accreditation standards developer organization sdo american national standards institute ansi original ieee par p1014r subsequently withdrawn ieee vita technical committee returned using public domain vmebus c.1 specification base-level document added new enhancements enhancement work undertaken entirely vita technical committee resulted ansi/vita 1-1994 tremendous undertaking document editing accomplished kim clohessy dy-4 systems technical co-chair activity great help frank hom created mechanical drawings exceptional contributions chapter editor additional enhancements proposed vme64 subcommittee placed vme64 extensions document two activities began late 1992 blli vmebus board-level live insertion specifications vsli vmebus system-level live insertion fault tolerance 1993 new activities began base-vme architecture involving implementation high-speed serial parallel sub-buses use i/o interconnections data mover subsystems architectures used message switches routers small multiprocessor parallel architectures vita application recognition accredited standards developer organization ansi granted june 1993 numerous documents including mezzanine p2 serial bus standards placed vita public domain administrator technologies detailed timeline vmebus history found vita website many ways vmebus equivalent analogous pins 68000 run onto backplane however one key features 68000 flat 32-bit memory model free memory segmentation anti-features result vme 68000-like 68000 generic enough make issue cases like 68000 vme uses separate 32-bit data address buses 68000 address bus actually 24-bit data bus 16-bit although 32/32 internally designers already looking towards full 32-bit implementation order allow bus widths vme uses two different eurocard connectors p1 p2 p1 contains three rows 32 pins implementing first 24 address bits 16 data bits control signals p2 contains one row includes remaining 8 address bits 16 data bits bus controlled set nine lines known arbitration bus communications controlled card slot one eurocard chassis known arbiter module two arbitration modes supported round robin prioritized regardless arbitration mode card attempt become bus master holding one four bus request lines low round robin arbitration arbiter cycles amongst bus request lines br0-br3 determine potentially simultaneous requesters granted bus priority arbitration br0-br3 use fixed priority scheme br0 lowest br3 highest arbiter grant bus highest priority requestor arbiter determined bus requests grant asserts corresponding bus grant line bg0 bg3 level bus mastership two masters simultaneously request bus using br line bus grant daisy-chain effectively breaks tie granting bus module closest arbiter master granted bus indicate bus use asserting bus busy bbsy* point master gained access bus write data card drives address address modifier data onto bus drives address strobe line two data strobe lines low indicate data ready drives write pin indicate transfer direction two data strobes *lword line cards indicate data width 8 16 32 bits 64 vme64 card bus address reads data pulls data transfer acknowledge low line transfer complete transfer complete pull bus error line low reading data essentially controlling card drives address bus leaves data bus tri-stated drives read pin slave card drives read data onto data bus drives data strobe pins low data ready signalling scheme asynchronous meaning transfer tied timing bus clock pin unlike synchronous buses pci block transfer protocol allows several bus transfers occur single address cycle block transfer mode first transfer includes address cycle subsequent transfers require data cycles slave responsible ensuring transfers use successive addresses bus masters release bus two ways release done rwd master releases bus completes transfer must re-arbitrate bus every subsequent transfer release request ror master retains bus continuing assert bbsy* transfers ror allows master retain control bus bus clear bclr* asserted another master wishes arbitrate bus thus master generates bursts traffic optimize performance arbitrating bus first transfer burst decrease transfer latency comes cost somewhat higher transfer latency masters address modifiers used divide vme bus address space several distinct sub-spaces address modifier 6 bit wide set signals backplane address modifiers specify number significant address bits privilege mode allow processors distinguish bus accesses user level system level software whether transfer block transfer incomplete table address modifiers vme also decodes seven 68000 interrupt levels onto 7-pin interrupt bus interrupt scheme one prioritized vectored interrupts interrupt request lines irq1 irq7 prioritize interrupts interrupting module asserts one interrupt request lines module bus may potentially handle interrupt interrupt handling module recognizes interrupt request priority handles arbitrates bus usual fashion described performs read interrupt vector driving binary version irq line handles e.g irq5 handled binary 101 onto address bus also asserts iack line along appropriate data transfer strobes width status/id read lword* ds0* ds1* allow status/id read cycles 8 16 32 bit wide transfers existing hardware interrupters use 8 bit status/ids interrupter responds transferring status/id data bus describe interrupt interrupt handling module usually cpu usually use status/id number identify run appropriate software interrupt service routine vme bus transfers dma every card master slave bus standards considerable amount complexity added order support various transfer types master/slave selection instance isa bus features added alongside existing channels model whereby communications handled host cpu makes vme considerably simpler conceptual level powerful though requires complex controllers card developing and/or troubleshooting vme bus examination hardware signals important logic analyzers bus analyzers tools collect analyze decode store signals people view high-speed waveforms leisure vita offers comprehensive faq assist front end design development vme systems computers using vmebus include | [
6071,
4926,
2194,
5374,
1933,
3105,
4836,
6014,
309,
2659,
4423,
3799,
4967,
7010,
2672,
2226,
7569,
6754,
7209,
4631,
3230,
5079,
4093,
8139,
1237,
5614,
6236,
7777,
3755,
2714
] | Test |
4,322 | 9 | Matita:matita matita experimental proof assistant development computer science department university bologna tool aiding development formal proofs man-machine collaboration providing programming environment formal specifications executable algorithms automatically verifiable correctness certificates naturally coexist matita based dependent type system known calculus co inductive constructions derivative calculus constructions compatible extent coq word matita means pencil italian simple widespread editing tool reasonably small simple application whose architectural software complexity meant mastered students providing tool particularly suited testing innovative ideas solutions matita adopts tactic-based editing mode xml-encoded proof objects produced storage exchange existential variables native matita allowing simpler management dependent goals matita implements bidirectional type inference algorithm exploiting inferred expected types power type inference system refiner augmented mechanism hints helps synthetizing unifiers particular situations specified user matita supports sophisticated disambiguation strategy based dialog parser typechecker interactive level system implements small step execution structured tactics allowing much better management proof development naturally leading structured readable scripts matita employed cerco certified complexity fp7 european project focused development formally verified complexity preserving compiler large subset c assembler mcs-51 microprocessor matita tutorial provides pragmatic introduction main functionalities matita interactive theorem prover offering guided tour set trivial examples field software specification verification | [
5938,
578,
6223,
5571,
260,
4359
] | Test |
4,323 | 1 | SQLBits:sqlbits sqlbits largest community-led sql server microsoft data platform conference europe founded 2007 group individuals passionate microsoft sql server azure product suite volunteers include committee members speakers helpers industry sponsors come together provide microsoft sql server education sqlbits held year sessions recorded hosted sqlbits website freely available everyone download one key principles sqlbits community led conference located one specific area uk instead conference reaches sql server community moving event around uk 16 sqlbits conferences date key dates locations listed | [
7715
] | Test |
4,324 | 9 | DataViva:dataviva dataviva information visualization engine created strategic priorities office government minas gerais dataviva makes official data exports industries locations occupations available entirety brazil eight apps 100 million possible visualizations first set datum – also available aliceweb – provided mdic ministry development industry foreign trade secex secretariat foreign trade official institution government brazil shows foreign trade statistics exporting municipalities country database provided ministério trabalho e emprego mte – ministry labor employment shows information industries occupations brazil rais – annual social information report platform consists eight core applications allows different ways visualizing data available applications descriptive showing data aggregated various levels simple comparative way treemapping others prescriptive using calculations allow analytic visualization data based theories product space applications generated using d3plus open source javascript library built top d3.js alexander simoes dave landry inspired observatory economic complexity dataviva open data open-source free use tool developed partnership datawheel co-founded mit media lab professor césar hidalgo maintained government minas gerais | [
5965,
7848,
2451
] | Test |
4,325 | 4 | Rohit_Khare:rohit khare rohit khare computer science entrepreneur active many aspects development world wide web founder ångströ co-founder knownow former director commercenet labs key player microformats community holds ph.d. university california irvine bachelors caltech computer science previously worked internet security w3c also active representational state transfer rest community august 2007 authored arrested paper syndication-oriented architecture variant service-oriented architecture | [
2789,
84
] | Test |
4,326 | 2 | Event_flag:event flag event flag process synchronization primitive openvms operating system two possible states set cleared following basic primitive operations provided additional synchronization operations event flags either local per-process common accessible one process process set 64 local flags numbered 0-63 also possible associate process 2 sets common event flags come sets 32 process assign numbers 64-95 96-127 come existence first process associates disappear last process removes association every potentially time-consuming asynchronous system call qio among others includes argument specifying number event flag set completion compare semaphore | [
7396
] | Test |
4,327 | 4 | Australian_Information_Security_Association:australian information security association nationally recognised not-for-profit organisation charity australian information security association aisa champions development robust information security sector building capacity professionals australia advancing cyber security safety australian public well businesses governments australia established 1999 aisa become recognised authority information security australia membership 3000 individuals across country aisa caters domains information security industry particular focus sharing expertise field meetings focus groups networking opportunities around australia aisa vision world people businesses governments educated risks dangers cyber attack data theft enable take reasonable precautions protect independent non-profit association created provide leadership development promotion improvement profession strategic plan calls continued work areas advocacy diversity education organisational excellence aisa hosts australia largest independent not-for-profit cyber security conference australian cyber conference https //cyberconference.com.au/ guidelines provide direction post-nominals represented indicate aisa membership status post-nominals letters placed following person ’ last name indicate aisa membership status encourage members use maisa aaisa faisa applicable post-nominals every opportunity including email sign-offs official letters tender documents etc helps raise profile professional status membership aisa post-nominals listed following order | [] | Validation |
4,328 | 3 | Lot_Lot:lot lot player controls one arrow move pellets resemble pachinko balls upper cells four-second delay lower ones without confront evil crab grab player pellets try prevent player scoring cutting elastic crab forced leave board pellets find | [] | Test |
4,329 | 6 | Romfs:romfs computing romfs rom filesystem extremely simple file system lacking many features intended burning important files onto eeprom available linux possibly unix-like systems useful initial rom holding kernel modules loaded later needed small code wise description filesystem layout available lxr -- romfs.txt bo brantén created romfs file system driver windows nt/2k/xp nikolay aleksandrov written romfs image extraction manipulation tool called romfser primarily targeted bsd family operating systems lack support romfs | [
5571,
578
] | Test |
4,330 | 7 | Proven_(company):proven company proven hiring tool content hub small businesses across united states proven software allowed managers post jobs 100 job sites including simply hired craigslist indeed proven proven also offered tools allow users sort evaluate message onboard applicants job seekers could apply directly jobs proven mobile apps proven website proven job board partners proven based san francisco california austin texas used 1,000 small businesses throughout united states proven co-founded pablo fuentes sean falconer joe mellin 2009 company privately held seed investment andreessen horowitz greylock partners kapor capital 500 startups founder collective morado ventures angels august 2012 proven launched free proven job search app ios december 2012 proven job search android launched proven job search allows users search apply jobs directly ios android device users also import resume create one directly within app 2013 proven pivoted become hiring tool job board specifically restaurant hospitality industries proven app remains active tool applicants apply jobs early 2015 proven also rolled onboarding feature stores documents allows applicants sign electronically fall 2015 proven expanded hiring tool job board small businesses industries nationwide august 2019 proven announced acquired upward.net job site headquartered newark california | [] | Test |
4,331 | 8 | WalkMe:walkme walkme owned walkme inc. software-as-a-service saas company helps users navigate features web-based services walkme digital adoption platform dap works overlaying information tip-balloons browser window balloons break online processes step-by-step instructions according company dap collects data users behaviors action patterns platforms helps users complete online tasks without leaving screen watch video tutorials read manuals faq pages also allows users automatically get specific guidance according preference language walkme inc. founded 2011 dan adika raphael sweary eyal cohen yuval shalom ozanna april 2012 launched product walkme headquarters san francisco california january 2017 walkme acquired abbi startup specializes mobile a/b testing app engagement walkme retired abbi brand integrated services walkme ’ platform process also migrated abbi ’ existing customers april year walkme acquired jaco | [] | Validation |
4,332 | 9 | Kyoto_Common_Lisp:kyoto common lisp kyoto common lisp kcl implementation common lisp taichi yuasa masami hagiya written c run unix-like operating systems kcl compiled ansi c. conforms common lisp described 1984 first edition guy steele book common lisp language available licence agreement kcl notable implemented scratch outside standard committee solely basis specification one first common lisp implementations ever exposed number holes mistakes specification gone unnoticed | [
1716,
6876,
1445,
6888,
2915,
6352,
3370,
6191,
4878,
5757,
6116,
3212,
7750,
6210,
1116,
6471,
940,
1676,
4535,
2249,
1890,
969,
3832,
1435,
3250
] | Test |
4,333 | 4 | Shell_Control_Box:shell control box shell control box scb network security appliance controls privileged access remote systems records activities replayable audit trails prevents malicious actions example records system administrator updates file server third-party network operator configures router recorded audit trails replayed like movie review events occurred content audit trails indexed make searching events automatic reporting possible scb linux-based device developed balabit application level proxy gateway 2017 balabit changed name product privileged session management psm repositioned core module privileged access management solution balabit ’ privileged session management psm shell control box scb device controls monitors audits remote administrative access servers network devices tool oversee system administrators controlling encrypted connections used administration psm scb full control ssh rdp telnet tn3270 tn5250 citrix ica vnc connections providing framework solid boundaries work administrators psm scb acts authentication gateway enforcing strong authentication users access assets psm also integrate user directories example microsoft active directory resolve group memberships users access protected servers credentials accessing server retrieved transparently psm ’ credential store third-party password management system psm impersonating authenticated user automatic password retrieval protects confidentiality passwords users never access psm controls audits privileged access wide-spread protocols ssh rdp http detailed access management helps control access servers also possible control advanced features protocols like type channels permitted example unneeded channels like file transfer file sharing disabled reducing security risk server psm policies privileged access enforced one single system avoid accidental misconfiguration human errors psm supports 4-eyes authorization principle achieved requiring authorizer allow administrators access server authorizer also possibility monitor – terminate session administrator real-time watching screen psm monitor network traffic real time execute various actions certain pattern example suspicious command window title text appears screen psm also detect specific patterns credit card numbers case detecting suspicious user action psm send e-mail alert immediately terminate connection example psm block connection destructive administrator command „ rm ” comes effect psm makes user activities traceable recording tamper-proof confidential audit trails records selected sessions encrypted timestamped digitally signed audit trails audit trails browsed online followed real-time monitor activities users psm replays recorded sessions like movie – actions users seen exactly appeared monitor balabit desktop player enables fast forwarding replays searching events example typed commands pressing enter texts seen user case problems database manipulation unexpected shutdown etc circumstances event readily available trails thus cause incident identified addition recording audit trails transferred files also recorded extracted analysis | [
3490,
7765,
578,
3794,
7508
] | Test |
4,334 | 5 | Transmux:transmux transmux transcode-multiplexing signaling format change telecommunications signaling synchronous optical network signals sonet asynchronous ds3 signals ds3 signal multiplexed 28 individual ds1 signals bit-interleaved fashion framing overhead determined intervals sonet differs approach using byte-interleaved synchronous multiplexing technique several variations payload types sonet payload carry multiplexed lower rate streams ds1 e1 ds3 etc well octet-based format tcp/ip atm frame relay ethernet etc cross-connect capability maintained vt1.5 level individual ds1 signals extracted parent ds3 electrical t1 transmuxed individually vt1.5 complete ds3 signal delivered sonet drop entire ds3 transmuxed intact sts container subsequent cross-connect capability exists sonet payload vt1.5 level white rock networks description product transmux support applications conversion ds3 vt1.5 mapped sts-1s required transmux allows ds3 embedded within sts-1 circuit adapted vt1.5 mapped sts-1 without physically terminating circuit ds3 ec-1 | [
5714
] | Validation |
4,335 | 4 | Patch-through_access:patch-through access patch-through access refers security clearance used various applications according application may regarded high low level security clearance | [] | Test |
4,336 | 2 | Comparison_of_real-time_operating_systems:comparison real-time operating systems list real-time operating systems rtos operating system time taken process input stimulus less time lapsed next input stimulus type | [
3934,
6082,
4670,
1454,
5405,
5055,
5423,
3664,
771,
6489,
6853,
2257,
7950,
4017,
1522,
7605,
3348,
4759,
1918,
804,
463,
5110,
4041,
3365,
1556,
7990,
6206,
6918,
6919,
7283,
6928,
7672,
861,
7312,
7331,
6973,
895,
5208,
5920,
2024,
5... | Test |
4,337 | 0 | Chatbot:chatbot chatbot piece software conducts conversation via auditory textual methods programs often designed convincingly simulate human would behave conversational partner although 2019 far short able pass turing test chatbots typically used dialog systems various practical purposes including customer service information acquisition chatbots use sophisticated natural language processing systems many simpler ones scan keywords within input pull reply matching keywords similar wording pattern database term chatterbot originally coined michael mauldin creator first verbot julia 1994 describe conversational programs today chatbots accessed via virtual assistants google assistant amazon alexa via messaging apps facebook messenger wechat via individual organizations apps websites chatbots classified usage categories conversational commerce e-commerce via chat analytics communication customer support design developer tools education entertainment finance food games health hr marketing news personal productivity shopping social sports travel utilities beyond chatbots conversational ai refers use messaging apps speech-based assistants chatbots automate communication create personalized customer experiences scale 1950 alan turing famous article computing machinery intelligence published proposed called turing test criterion intelligence criterion depends ability computer program impersonate human real-time written conversation human judge sufficiently well judge unable distinguish reliably—on basis conversational content alone—between program real human notoriety turing proposed test stimulated great interest joseph weizenbaum program eliza published 1966 seemed able fool users believing conversing real human however weizenbaum claim eliza genuinely intelligent introduction paper presented debunking exercise artificial intelligence ... machines made behave wondrous ways often sufficient dazzle even experienced observer particular program unmasked inner workings explained ... magic crumbles away stands revealed mere collection procedures ... observer says could written thought moves program question shelf marked intelligent reserved curios ... object paper cause re-evaluation program explained programs ever needed eliza key method operation copied chatbot designers ever since involves recognition clue words phrases input output corresponding pre-prepared pre-programmed responses move conversation forward apparently meaningful way e.g responding input contains word 'mother 'tell family thus illusion understanding generated even though processing involved merely superficial eliza showed illusion surprisingly easy generate human judges ready give benefit doubt conversational responses capable interpreted intelligent interface designers come appreciate humans readiness interpret computer output genuinely conversational—even actually based rather simple pattern-matching—can exploited useful purposes people prefer engage programs human-like gives chatbot-style techniques potentially useful role interactive systems need elicit information users long information relatively straightforward falls predictable categories thus example online help systems usefully employ chatbot techniques identify area help users require potentially providing friendlier interface formal search menu system sort usage holds prospect moving chatbot technology weizenbaum shelf ... reserved curios marked genuinely useful computational methods classic historic early chatbots eliza 1966 parry 1972 recent notable programs include a.l.i.c.e. jabberwacky d.u.d.e agence nationale de la recherche cnrs 2006 eliza parry used exclusively simulate typed conversation many chatbots include functional features games web searching abilities 1984 book called policeman beard half constructed published allegedly written chatbot racter though program released would capable one pertinent field ai research natural language processing usually weak ai fields employ specialized software programming languages created specifically narrow function required example a.l.i.c.e uses markup language called aiml specific function conversational agent since adopted various developers called alicebots nevertheless a.l.i.c.e still purely based pattern matching techniques without reasoning capabilities technique eliza using back 1966 strong ai would require sapience logical reasoning abilities jabberwacky learns new responses context based real-time user interactions rather driven static database recent chatbots also combine real-time learning evolutionary algorithms optimise ability communicate based conversation held still currently general purpose conversational artificial intelligence software developers focus practical aspect information retrieval chatbot competitions focus turing test specific goals two annual contests loebner prize chatterbox challenge latter offline since 2015 however materials still found web archives chatbots used diverse fashion across verticals many different types channel e.g websites social messaging etc business application accelerated rapidly 2019 leading van baker research vice president gartner predict “ 2020 50 medium large enterprises deployed product chatbots many companies chatbots run messaging apps simply via sms used b2c customer service sales marketing 2016 facebook messenger allowed developers place chatbots platform 30,000 bots created messenger first six months rising 100,000 september 2017 since september 2017 also part pilot program whatsapp airlines klm aeroméxico announced participation testing airlines previously launched customer services facebook messenger platform bots usually appear one user contacts sometimes act participants group chat many banks insurers media companies e-commerce companies airlines hotel chains retailers health care providers government entities restaurant chains used chatbots answer simple questions increase customer engagement promotion offer additional ways order 2017 study showed 4 companies used chatbots according 2016 study 80 businesses said intended one 2020 previous generations chatbots present company websites e.g ask jenn alaska airlines debuted 2008 expedia virtual customer service agent launched 2011 newer generation chatbots includes ibm watson-powered rocky introduced february 2017 new york city-based e-commerce company rare carat provide information prospective diamond buyers used marketers script sequences messages similar autoresponder sequence sequences triggered user opt-in use keywords within user interactions trigger occurs sequence messages delivered next anticipated user response user response used decision tree help chatbot navigate response sequnces deliver correct response message companies explore ways use chatbots internally example customer support human resources even internet-of-things iot projects overstock.com one reportedly launched chatbot named mila automate certain simple yet time-consuming processes requesting sick leave large companies lloyds banking group royal bank scotland renault citroën using automated online assistants instead call centres humans provide first point contact saas chatbot business ecosystem steadily growing since f8 conference facebook mark zuckerberg unveiled messenger would allow chatbots app large companies like hospitals aviation organizations architects designing reference architectures intelligent chatbots used unlock share knowledge experience organization efficiently reduce errors answers expert service desks significantly intelligent chatbots make use kinds artificial intelligence like image moderation natural language understanding nlu natural language generation nlg machine learning deep learning nowadays high majority high-tech banking organizations looking integration automated ai-based solutions chatbots customer service order provide faster cheaper assistance clients becoming increasingly technodexterous particularly chatbots efficiently conduct dialogue usually substituting communication tools email phone sms banking area major application related quick customer service answering common requests transactional support several studies accomplished analytics agencies juniper gartner report significant reduction cost customer services leading billions dollars economy next 10 years gartner predicts integration 2020 chatbots least 85 client applications customer service juniper study announces impressive amount 8 billion retained annually 2022 due use chatbots since 2016 facebook allows businesses deliver automated customer support e-commerce guidance content interactive experiences chatbots large variety chatbots facebook messenger platform developed 2016 russia-based tochka bank launched world first facebook bot range financial services particularly including possibility making payments july 2016 barclays africa also launched facebook chatbot making first bank africa france third largest bank total assets société générale launched chatbot called sobot march 2018 80 users sobot express satisfaction tested il never remplace expertise provided human advisor according sg deputy director bertrand cozzarolo several potential advantages using chatbots interaction customer banking chatbots also incorporated devices primarily meant computing toys hello barbie internet-connected version doll uses chatbot provided company toytalk previously used chatbot range smartphone-based characters children characters behaviors constrained set rules effect emulate particular character produce storyline ibm watson computer used basis chatbot-based educational toys companies cognitoys intended interact children educational purposes process building testing deploying chatbots done cloud-based chatbot development platforms offered cloud platform service paas providers oracle cloud platform snatchbot ibm watson cloud platforms provide natural language processing artificial intelligence mobile backend service chatbot development api companies like microsoft azure aarc currently providing bot engines chatbot platforms software developed malicious chatbots frequently used fill chat rooms spam advertisements mimicking human behavior conversations entice people revealing personal information bank account numbers commonly found yahoo messenger windows live messenger aol instant messenger instant messaging protocols also published report chatbot used fake personal ad dating service website tay ai chatbot learns previous interaction caused major controversy due targeted internet trolls twitter bot exploited 16 hours began send extremely offensive tweets users suggests although bot learnt effectively experience adequate protection put place prevent misuse text-sending algorithm pass human instead chatbot message would credible therefore human-seeming chatbots well-crafted online identities could start scattering fake news seem plausible instance making false claims presidential election enough chatbots might even possible achieve artificial social proof creation implementation chatbots still developing area heavily related artificial intelligence machine learning provided solutions possessing obvious advantages important limitations terms functionalities use cases however changing time common ones listed chatbots increasingly present businesses often used automate tasks require skill-based talents customer service taking place via messaging apps well phone calls growing numbers use-cases chatbot deployment gives organisations clear return investment call centre workers may particularly risk ai-driven chatbots study forrester june 2017 predicts 25 today jobs likely impacted ai technologies 2019 | [
3601,
3507,
2450,
7148,
1718,
1444,
4760,
7967,
8065,
7138,
715,
2555,
2284,
7170,
2201,
5122,
6624,
5304,
6629,
3292,
2215,
1751,
1014,
3466,
7372,
4887,
1958,
1210,
2048,
3651,
4349,
2054,
3050,
7397,
5885,
4089,
2880,
4634,
5429,
6486,... | Validation |
4,338 | 4 | DNS_rebinding:dns rebinding dns rebinding form computer attack attack malicious web page causes visitors run client-side script attacks machines elsewhere network theory same-origin policy prevents happening client-side scripts allowed access content host served script comparing domain names essential part enforcing policy dns rebinding circumvents protection abusing domain name system dns attack used breach private network causing victim web browser access computers private ip addresses return results attacker also employed use victim machine spamming distributed denial-of-service attacks malicious activities attacker registers domain attacker.com delegates dns server attacker control server configured respond short time live ttl record preventing dns response cached victim browses malicious domain attacker dns server first responds ip address server hosting malicious client-side code instance could point victim browser website contains malicious javascript flash scripts intended execute victim computer malicious client-side code makes additional accesses original domain name attacker.com permitted same-origin policy however victim browser runs script makes new dns request domain attacker replies new ip address instance could reply internal ip address ip address target somewhere else internet following techniques attempt prevent dns rebinding attacks | [
2451,
2043,
3861,
96,
7848,
5619,
1805
] | Test |
4,339 | 2 | Shadow_RAM_(Acorn):shadow ram acorn shadow ram acorn bbc microcomputer master-series microcomputer special framebuffer implementation free main memory permit double-buffered graphics bbc micro master-series machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kb ram 0x0000 0x7fff 16 kb sideways paged address space 0x8000 0xbfff 16 kb operating system space 0xc000 0xffff video memory allocated 0x7fff downwards necessary 1 kb teletext mode 7 20 kb modes 0-2 32 kb ram available video memory could eat sizable amount memory shadow ram 20 kb block ram sits outside real address space accessed via operating system calls framebuffer running shadow ram memory normally used video free program use shadow ram activated setting most-significant bit memory mode number example use mode 1 shadow ram enabled request mode 129 128 1 switching main shadow memory alternate frames double-buffered video could used acorn provided demonstration program basic showing scrolling cloud animation without double buffering video game firetrack would also use double buffering shadow ram present shadow ram fitted standard model b+ bbc micro bbc master series optional third-party extra feature model model b bbc micro systems | [
4540,
1254,
5877,
5571,
6662
] | Test |
4,340 | 2 | ColorOS:coloros coloros operating system created oppo electronics based google operating system android presently oppo launched 6th version major difference google stock android oppo coloros latter additional features features include customizable gestures screen screen communication phone manager lock screen magazines options long screen shot eye protection changing warmer color temperature ftp server others coloros respects looks similar ios made apple coloros removes many settings well ability restrict app background data usage removed data settings entry users may set alarms mobile data reaches certain limit opposed stock android also automatically turn mobile data moreover coloros manages ram peculiarly allows apps games run background forever apps n't force stopped apps individual settings list coloros releases 3.^ https //c.realme.com/in/board/detail/1057096670929485824 | [
3933,
5372,
6427,
1095,
740,
42,
3310,
2591,
5771,
5775,
7956,
5473,
474,
6183,
822,
136,
6209,
1582,
6937,
6232,
4116,
5195,
2003,
195,
6978,
7346,
561,
201,
2017,
5919,
7357,
5571,
2398,
2037,
2756,
7007,
7749,
2417,
2054,
2788,
3507,... | Test |
4,341 | 3 | Linux_console:linux console linux console system console internal linux kernel system console device receives kernel messages warnings allows logins single user mode linux console provides way kernel processes send text output user receive text input user user typically enters text computer keyboard reads output text computer monitor linux kernel supports virtual consoles consoles logically separate access physical keyboard display linux console linux virtual consoles implemented vt subsystem linux kernel rely user space software contrast terminal emulator user space process emulates terminal typically used graphical display environment linux console one first features kernel originally written linus torvalds 1991 see history linux two main implementations framebuffer text mode framebuffer implementation default modern linux distributions together kernel mode setting provides kernel-level support display hardware features showing graphics system booting legacy text mode implementation used pc-compatible systems cga ega mda vga graphics cards non-x86 architectures used framebuffer mode graphics cards implement text mode linux console uses fixed-size bitmap monospace fonts usually defaulting 8x16 pixels per character linux console optional kernel feature embedded linux systems enable systems typically provide alternative user interface e.g web based boot immediately graphical user interface use primary means interacting user implementations linux console include braille console support refreshable braille displays serial port console linux console provides way kernel processes output text-based messages user receive text-based input user linux several devices used system console virtual terminal serial port usb serial port vga text-mode framebuffer modern linux-based systems deprecated kernel based text-mode input output instead show graphical logo progress bar system booting followed immediate start graphical user interface e.g x.org server desktop distributions surfaceflinger android kernel boot console commonly used display boot log kernel boot log includes information detected hardware updates status boot procedure point time kernel software running hence logging via user-space e.g syslog possible console provides convenient place output information kernel finished booting runs init process also sending output console handles booting rest system including starting background daemons init boot process complete console used multiplex multiple virtual terminals accessible pressing ctrl-alt-f1 ctrl-alt-f2 etc. ctrl-alt-leftarrow ctrl-alt-rightarrow using chvt virtual terminal getty process run turn runs /bin/login authenticate user authentication command shell run virtual terminals like console supported linux kernel level linux console implements terminal type linux escape sequences uses console_codes man page virtual consoles allow storage multiple text buffers enabling different console programs run simultaneously interact user different contexts user point view creates illusion several independent consoles virtual console character set keyboard layout linux 2.6 introduced ability load different font virtual console kernel versions predating 2.6 change font demand text mode implementation used pc-based systems legacy cga/ega/mda/vga video card implements text-based video modes text mode kernel sends 2d array characters video card video card converts characters pixels display text buffer part vga memory describes content text screen terms code points character attributes code points text buffer font generally encoding used text terminal semantics put characters screen set glyphs screen determined current font text screen handled console.c consolemap.c drivers utility altering fonts terminal encodings called consolechars linux kernel keyboard.c driver almost complete support keyboard input keyboard layouts remains bit inconsistent interacts badly different character sets layouts loaded loadkeys utility two utilities corresponding data files packed linux console tools http //lct.sourceforge.net/ shipped many linux distributions efforts internationalization linux kernel level started early 1994 markus kuhn andries brouwer linux console capable supporting vga-style text mode kernel limited means set modes svgatextmode helps enable complex text modes standard ega vga modes fully compatible console tools conflicts dosemu svgalib display servers currently support different modes different virtual consoles microsoft windows version fully functional support console comparable feature application software win32 console linux framebuffer fbdev graphic hardware-independent abstraction layer originally implemented allow linux kernel emulate text console systems apple macintosh text-mode display offers kernel space text mode emulation platform advantage currently unmaintained svgatextmode reliance better hardware compatibility also permits overpass technical restrictions vga text modes linux framebuffer console differs vga one ways drawing characters processing keyboard events virtual consoles ’ support exactly linux serial console console implementation via serial port enabled option config_serial_console kernel configuration may used embedded systems servers direct interaction operator expected serial console allows mode access system usually slower speed due small bandwidth rs-232 serial console often used development software embedded systems sometimes left accessible via debug port console responds number control characters press escape key console also supports extended escape sequences ansi csi mode sequences dec private mode sequences extended sequences control colors visual effects like blinking underline intensity inverse video bell tone frequency duration vesa screen blanking interval aside textual blanking known way place vga adapter standby kmscon projects aims create modern user-space replacement linux console development priorities include support multi-monitor setups unicode font rendering pango xkb keyboard handling gpu opengl acceleration complaints current kernel implementation include user-interface kernel-space code poorly maintained handles keyboards badly produces bad font rendering misses mode-setting multi-head support contains multi-seat awareness limited hot-plugging handling limited vt102 compliance | [
3256,
2182,
3613,
7528,
7532,
5744,
6443,
2942,
6117,
5762,
412,
415,
3666,
2970,
7956,
4382,
5453,
4759,
5460,
7242,
1535,
1924,
6892,
5116,
1176,
1933,
5829,
1208,
6211,
4435,
5865,
7669,
3404,
1227,
1596,
165,
7312,
1607,
5884,
1991,
... | Test |
4,342 | 5 | Gateway_Load_Balancing_Protocol:gateway load balancing protocol gateway load balancing protocol glbp cisco proprietary protocol attempts overcome limitations existing redundant router protocols adding basic load balancing functionality addition able set priorities different gateway routers glbp allows weighting parameter set based weighting compared others virtual router group arp requests answered mac addresses pointing different routers thus default load balancing based traffic load rather number hosts use gateway router default glbp load balances round-robin fashion glbp elects one avg active virtual gateway group group members act backup case avg failure case two members second best avg placed standby state members placed listening state monitored using hello holdtime timers 3 10 seconds default elected avg assigns virtual mac address member glbp group including thus enabling avfs active virtual forwarders avf assumes responsibility forwarding packets sent virtual mac address could four avfs time default glbp routers use local multicast address 224.0.0.102 send hello packets peers every 3 seconds udp 3222 source destination cisco implemented ipv6 support glbp ios release 12.2 33 sxi | [
5634,
4783,
5181,
3797
] | Test |
4,343 | 3 | MirrorLink:mirrorlink mirrorlink device interoperability standard offers integration smartphone car infotainment system mirrorlink transforms smartphones automotive application platforms apps hosted run smartphone drivers passengers interact steering wheel controls dashboard buttons touch screens car in-vehicle infotainment ivi system mirrorlink utilizes set well-established non-proprietary technologies ip usb wi-fi bluetooth real-time protocol rtp audio universal plug play upnp addition mirrorlink uses virtual network computing vnc baseline protocol display user interface smartphone applications infotainment system screens communicate user input back mobile device mirrorlink started research project researcher jörg brakensiek nokia research center palo alto us took results nobounds project—invented researcher bernd steinke nokia research center bochum germany—and applied automotive domain initial approach applied bernd steinke contained three specialised sub-protocols optimal power efficiency 2d 3d media support 2d graphics composition via x11 mirroring needed requirements chosen source device nokia n800 mobile linux device desire speed demo availability show mirroring use cases opengl es used fast 3d graphics alpha based porter-duff compositing shine-through 2d effects make future relevant approach available limited n800 mesa 3d used local playback high definition media streaming implemented via openmax rtp timed sideband control allow synchronous displayed streaming original video file without transcoding initial implementations remoted gui games media content nokia n800 later n810 mobile linux device demonstration time expected capabilities mobile devices widely reported parallel member ce4a company seen initial results contacted nokia collaboration nokia ce4a started first ideas published demonstrated using nokia n810 internet tablet ieee ccnc 2009 conference together two researchers raja bose keun-young park nokia research center palo alto close collaboration consumer electronics automotive ce4a group german car manufacturer original terminal mode concept created name terminal mode originated name expert group within ce4a created positioning paper nokia together magneti marelli publicly demonstrated first terminal mode concept navteq connection event conjunction frankfurt international auto show iaa september 2009 first car integration shown geneva auto show march 2010 using nokia n97 prototype implementation terminal mode integrated valmet concept car draft 0.9 specification version released march 2010 july 2010 terminal mode presented integrated vw passat mobilebeat 2010 first real live demonstration seen september 2010 shortly terminal mode specification became public 6 october 2010 early adopters included continental alpine clarion collaboration nokia ce4a terminal mode led formation car connectivity consortium car connectivity consortium brought together major players automotive mobile device industries including large number tier-i suppliers even network providers 12 september 2011 terminal mode renamed mirrorlink became commercial trademark owned car connectivity consortium may 2012 car connectivity consortium 56 members included almost major automobile mobile device manufacturers world car connectivity consortium made various auto electronic manufacturers joined together establish industry standard certifying apps devices safe useful drivers called mirrorlink joint effort car manufacturers phone makers aimed developing open standards define operations smartphones linked cars unique element mirrorlink ability show smartphone interface variety mobile os platforms audio head-unit display mirrorlink currently works symbian phones nokia belle phones s60v5 phones many manufacturers samsung galaxy series android lollipop 5.0 sony xperia z series android phones sony audio launched two audio head units 2012 q2 mirrorlink compliant phone maker motorola audio head unit maker alpine also members group supporting mirrorlink alpine offer mirrorlink based aftermarket systems us 2013 vw offer mirrorlink based infotainment systems starting 2nd generation mib infotainment hardware starting 2014 new polo india maruti suzuki ciaz scross ertiga baleno hatchback vitara brezza car models also infotainment system mirrorlink feature | [
3821,
1066,
3524,
139,
5571,
5372,
740
] | Validation |
4,344 | 2 | TUNIS:tunis tunis toronto university system unix-like operating system developed university toronto early 1980s tunis portable operating system compatible unix v7 completely redesigned kernel written concurrent euclid programs ran unix v7 could run tunis modification tunis designed teaching intended provide model design well-structured highly portable easily understood unix-like operating systems made extensive use concurrent euclid modules isolate machine dependencies provide clean internal structure information hiding concurrent euclid built-in processes synchronization features make easy understand maintain tunis targeted pdp-11 motorola 6809 68000 national semiconductor 32016 architectures supported distribution across multiple cpus using concurrent euclid synchronization features | [
1522,
4751,
4478,
900,
2467,
2294,
5571,
2300,
2118,
6360,
578,
6367,
4447,
6577,
443,
7784
] | Test |
4,345 | 1 | Prepared_statement:prepared statement database management systems dbms prepared statement parameterized statement feature used execute similar database statements repeatedly high efficiency typically used sql statements queries updates prepared statement takes form template certain constant values substituted execution typical workflow using prepared statement follows compared executing statements directly prepared statements offer two main advantages hand query executed server-side prepared statements slower additional round-trip server implementation limitations may also lead performance penalties example versions mysql cache results prepared queries stored procedure also precompiled stored server later execution similar advantages unlike stored procedure prepared statement normally written procedural language use modify variables use control flow structures relying instead declarative database query language due simplicity client-side emulation prepared statements portable across vendors major dbmss including mysql oracle db2 microsoft sql server postgresql widely support prepared statements prepared statements normally executed non-sql binary protocol efficiency protection sql injection dbmss mysql prepared statements also available using sql syntax debugging purposes number programming languages support prepared statements standard libraries emulate client side even underlying dbms support including java jdbc perl dbi php pdo python db-api client-side emulation faster queries executed reducing number round trips server usually slower queries executed many times resists sql injection attacks equally effectively many types sql injection attacks eliminated disabling literals effectively requiring use prepared statements h2 supports feature example uses java jdbc java codice_1 provides setters codice_2 etc major built-in data types example uses php pdo example uses perl dbi example uses c ado.net ado.net codice_3 accept type codice_4 parameter codice_5 type conversion occurs automatically note use named parameters i.e codice_6 rather codice_7—this allows use parameter multiple times arbitrary order within query command text however addwithvalue method used variable length data types like varchar nvarchar .net assumes length parameter length given value rather getting actual length database via reflection consequence different query plan compiled stored different length general maximum number duplicate plans product lengths variable length columns specified database reason important use standard add method variable length columns paramlength length specified database since standard add method needs used variable length data types good habit use parameter types example uses python db-api example uses direct sql fourth generation language like edeveloper unipaas magic xpa magic software enterprises purebasic since v5.40 lts manage 7 types link following commands setdatabaseblob setdatabasedouble setdatabasefloat setdatabaselong setdatabasenull setdatabasequad setdatabasestring 2 different methods depending type database sqlite odbc mariadb/mysql use postgresql use 1 2 3 ... | [
623,
6029,
7213,
5983,
5965,
1096,
4640,
1792,
5956,
7715,
3776
] | Test |
4,346 | 4 | Reliance_authentication:reliance authentication reliance authentication part trust-based identity attribution process whereby second entity relies upon authentication processes put place first entity second entity creates element unique specific purpose retrieved accessed authentication processes first entity first met reliance authentication achieved one tokens random characteristics transmitted secure area controlled first entity secure area accessible person authorised use account secure area may online banking portal telephone banking system mobile banking application token often form single plural debit credits financial account numerical values debit credits form token whose numeric value confirmed account holder token retrieved cardholder accessing secure area first entity secure area protected accessible satisfying first entity authentication means case financial services authentication access secure area normally includes multi-factor sepa would likely involve strong authentication transmission requirement retrieve token adds challenge response factor overall authentication process considered point view second party generates transmits token token may generated second party dynamically thus act one-time password reliance authentication method particular application financial instruments credit cards e-mandate direct debit transactions whereby person may instigate transaction financial instrument however financial instrument verified belonging person person confirms value token reliance method often incorporates out-of-band response means tokens retrieved secure area reliance authentication uses multi-step inputs ensure user fraud everyone uses even aware examples include introduction strong customer authentication online payment transactions within european union links verified person account person identified accordance statutory requirements prior account opened reliance authentication makes use pre-existing accounts piggyback services upon accounts providing original source 'reliable concept reliability legal one derived various anti money laundering aml counter-terrorism funding ctf legislation usa eu28 australia singapore new zealand second parties may place reliance customer due diligence process first party first party say financial institution australian legislation 'reliance based upon section 38 anti-money laundering counter-terrorism financing act 2006 cth european commission proposal directive european parliament council prevention use financial system purpose money laundering terrorist financing reliance based upon article 11 1 reliance uk specific meaning relates process regulation 17 money laundering regulations 2007 reliance purpose aml reliance authentication although use similar concepts federal financial institutions examination council united states america ffiec issued authentication internet banking environment dated october 2005 reliance authentication outlined per final paragraph page 14 advantages reliance authentication methods disadvantages reliance authentication methods | [
8131,
3490,
7865,
4237,
3794
] | Validation |
4,347 | 2 | Virtual_memory_compression:virtual memory compression virtual memory compression also referred ram compression memory compression memory management technique utilizes data compression reduce size number paging requests auxiliary storage virtual memory compression system paging requests compressed stored physical memory usually random-access memory ram sent compressed auxiliary storage hard disk drive hdd solid-state drive ssd cases virtual memory range whose contents compressed paging request marked inaccessible attempts access compressed pages trigger page faults reversal process retrieval auxiliary storage decompression footprint data paged reduced compression process first instance freed ram returned available physical memory pool compressed portion kept ram second instance compressed data sent auxiliary storage resulting i/o operation smaller therefore takes less time implementations including zswap zram helix software company ’ hurricane entire process implemented software systems ibm mxt compression process occurs dedicated processor handles transfers local cache ram virtual memory compression distinct garbage collection gc systems remove unused memory blocks cases consolidate used memory regions reducing fragmentation improving efficiency virtual memory compression also distinct context switching systems connectix ram doubler though also online compression apple os 7.1 inactive processes suspended compressed whole reducing i/o activity caused paging requests virtual memory compression produce overall performance improvements degree performance improvement depends variety factors including availability compression co-processors spare bandwidth cpu speed i/o channel speed physical memory compressibility physical memory contents multi-core multithreaded cpus benchmarks show performance improvements 50 situations embedded devices auxiliary storage limited non-existent cases virtual memory compression allow virtual memory system operate otherwise virtual memory would disabled allows system run certain software would otherwise unable operate environment virtual memory flash memory certain endurance limitations maximum number erase cycles undergo low 100 erase cycles systems flash memory used auxiliary storage system implementing virtual memory compression reduce total quantity data written auxiliary storage improving system reliability one primary issues degree contents physical memory compressed real-world loads program code much data held physical memory often highly compressible since efficient programming techniques data architectures designed automatically eliminate redundancy data sets various studies show typical data compression ratios ranging 2:1 2.5:1 program data similar typically achieval compression ratios disk compression order virtual memory compression provide measurable performance improvements throughput virtual memory system must improved compared uncompressed equivalent thus additional amount processing introduced compression must increase overall latency however i/o-bound systems applications highly compressible data sets gains substantial physical memory used compression system reduces amount physical memory available processes system runs may result increased paging activity reduced overall effectiveness virtual memory compression relationship paging activity available physical memory roughly exponential meaning reducing amount physical memory available system processes results exponential increase paging activity circumstances amount free physical memory low paging fairly prevalent performance gains provided compression system compared paging directly auxiliary storage may offset increased page fault rate leads thrashing degraded system performance opposite state enough physical memory available paging activity low compression may impact performance enough noticeable middle ground two circumstanceslow ram high paging activity plenty ram low paging activityis virtual memory compression may useful however compressible program data pronounced performance improvements less physical memory needed hold compressed data example order maximize use compressed pages cache helix software company hurricane 2.0 provides user-configurable compression rejection threshold compressing first 256 512 bytes 4 kib page virtual memory compression system determines whether configured compression level threshold achieved particular page achievable rest page would compressed retained compressed cache otherwise page would sent auxiliary storage normal paging system default setting threshold 8:1 compression ratio hardware implementations technology also relies price differentials various components system example difference cost ram cost processor dedicated compression relative price/performance differences various components tend vary time example addition compression co-processor may minimal impact cost cpu typical virtual memory implementation paging happens least recently used basis potentially causing compression algorithm use cpu cycles dealing lowest priority data furthermore program code usually read-only therefore never paged-out instead code simply discarded re-loaded program ’ auxiliary storage file needed case bar compression higher since i/o cycle attempting eliminate much shorter particularly flash memory devices virtual memory compression gone favor technology price speed ram external storage plummeted due moore law improved ram interfaces ddr3 thus reducing need virtual memory compression multi-core processors server farms mobile technology together advent flash based systems make virtual memory compression attractive paul r. wilson proposed compressed caching virtual memory pages 1990 paper circulated acm oopsla/ecoop '90 workshop garbage collection issues strategies heap management memory hierarchies appearing acm sigplan notices january 1991 helix software company pioneered virtual memory compression 1992 filing patent application process october year 1994 1995 helix refined process using test-compression secondary memory caches video cards devices however helix release product incorporating virtual memory compression july 1996 release hurricane 2.0 used stac electronics lempel–ziv–stac compression algorithm also used off-screen video ram compression buffer gain performance benefits 1995 ram cost nearly 50 per megabyte microsoft windows 95 listed minimum requirement 4 mb ram due high ram requirement several programs released claimed use compression technology gain “ memory ” notorious softram program syncronys softcorp softram revealed “ placebo software ” include compression technology products including hurricane magnaram included virtual memory compression implemented run-length encoding poor results giving technology negative reputation 8 april 1997 issue pc magazine published comprehensive test performance enhancement claims several software virtual memory compression tools testing pc magazine found minimal 5 overall performance improvement use hurricane none packages however tests run intel pentium systems single core single threaded thus compression directly impacted system activity 1996 ibm began experimenting compression 2000 ibm announced memory expansion technology mxt mxt stand-alone chip acted cpu cache cpu memory controller mxt integrated compression engine compressed data heading to/from physical memory subsequent testing technology intel showed 5–20 overall system performance improvement similar results obtained pc magazine hurricane | [
4670,
5021,
13,
379,
3271,
3626,
5041,
7550,
405,
1855,
56,
65,
5781,
5783,
5442,
5088,
6500,
785,
2266,
788,
1522,
7605,
3351,
2633,
4759,
4397,
5116,
2300,
4786,
1208,
6922,
4810,
5161,
5865,
858,
861,
3751,
1992,
1616,
7325,
190,
8... | Test |
4,348 | 4 | OneSpan:onespan onespan formerly vasco data security international inc. publicly traded cybersecurity technology company based chicago illinois offices montreal brussels zurich company offers cloud-based open architected anti-fraud platform historically known multi-factor authentication electronic signature software founded t. kendall hunt 1991 held initial public offering ipo january 2000 onespan member fido alliance board 1984 t. kendall hunt founded vasco corp. consulting software services company corporate governmental agencies company acquired thumbscan inc. claimed first fingerprint reader device computer 1991 renamed vasco data security international inc. 1993 expanded offerings include data security vasco incorporated 1997 held initial public offering january 2000 vasco started developing digipass technology early 2000s company marketed technology internationally belgium 2009 vasco announced digipass two-factor authentication available app store iphone ipod touch forbes recognized vasco list america fastest-growing tech companies year january 2011 vasco acquired diginotar dutch certificate authority june 2011 diginotar hacked started issuing false security certificates news broke confidence shattered issued certificates cancelled company went bankrupt company established international headquarters dubai silicon oasis 2012 vasco announced would lower emea channel entry vars time became member fast identity online fido alliance june 2014 later recognized gartner magic quadrant user authentication october 2015 vasco acquired silanis technology inc. canadian document e-signature company 113 million early 2016 company cloud electronic signature software esignlive updated include integration salesforce vasco announced face recognition authentification feature digipass may 2016 company partnerships financial institutions including hsbc bank usa fedict rabobank arab bank riyadh bank may 30 2018 vasco changed name onespan trades ticker symbol ospn may 2018 company acquired dealflo uk canada-based financial agreement automation software company gbp 41 million solutions delivered onespan open cloud-based trusted identity tid platform | [
6788,
6312,
4133,
7867,
1037,
1805
] | Test |
4,349 | 0 | Trigram:trigram trigrams special case n -gram n 3 often used natural language processing performing statistical analysis texts cryptography control use ciphers codes context important varying analysis rankings percentages easily derived drawing different sample sizes different authors different document types poetry science-fiction technology documentation writing levels stories children versus adults military orders recipes typical cryptanalytic frequency analysis finds 16 common character-level trigrams english encrypted messages sent telegraph often omit punctuation spaces cryptographic frequency analysis messages includes trigrams straddle word boundaries causes trigrams edt occur frequently even though may never occur one word messages sentence quick red fox jumps lazy brown dog following word level trigrams word-level trigram quick red following character-level trigrams underscore marks space | [
3601,
1718,
1444,
4760,
8065,
715,
1353,
5304,
3292,
2215,
1751,
7372,
4337,
6829,
3651,
4089,
5429,
5528,
5612,
7138,
5885,
5008,
5796
] | Test |
4,350 | 4 | Federal_Desktop_Core_Configuration:federal desktop core configuration federal desktop core configuration list security settings recommended national institute standards technology general-purpose microcomputers connected directly network united states government agency fdcc list agreed upon microsoft windows operating system common core system functions applications files services changed configuration around framework secure security-reliable ms windows operating system created standards made mandatory every federal government computer effective feb 1 2008 wanted connect federal office computer network system meet exceed fdcc standard denied access fdcc applied windows xp vista desktop laptop computers replaced united states government configuration baseline usgcb included settings windows 7 red hat enterprise linux 5 windows 7 nist changed naming convention us government computer baseline usgcb ver 2.0 addition un-classifying general windows settings guide nist also publishes guides specifically windows firewall internet explorer guide vista-energy example created capture settings adhere energy conservation policies 20 march 2007 office management budget issued memorandum instructing united states government agencies develop plans using microsoft windows xp vista security configurations united states air force common security configurations windows xp proposed early model standards could developed fdcc baseline developed maintained national institute standards technology collaboration omb dhs doi disa nsa usaf microsoft input public comment applies windows xp professional vista systems only—these security policies tested according nist work windows 9 x /me/nt/2000 windows server 2003 major version 1.1 released 31 october 2008 new changed settings expanded scap reporting options previous versions standard applicable general-purpose workstations laptops end users windows xp vista systems use servers exempt standard also exempt embedded computers special purpose systems defined specialized scientific medical process control experimental systems though still recommends fdcc security configuration considered feasible appropriate fdcc settings generally speaking block open connections operating systems disables functions disables rarely used applications soho environment disables unnecessary services changes permissions items changes way log files collected recorded affects group policy object gpo settings alters entries windows system registry infoweek introduced fdcc mostly administrators engineers article titled ‘ feds ’ allow ’ written kelly jackson higgins darkreading.com published february 4 2008 due complexity guidelines response initially slow implementation took time settings internally researched government enterprise implementation techs nist nsa published guidelines hundreds-of-page texts introduced called scap files applications see wikipedia scap page windows platform built easy interoperability networking therefore left opportunities within operating systems types auto- semi-automatic connections computers ’ flaws programming mistakes purposefully built way example found looking windows remote connection program enabled default typical windows operating system installation fdcc/usgcb configuration instance reverses setting manually re-enable allow remote connections organizations required document fdcc compliance using scap tools 600+ settings average fdcc/usgcb document – usable average small home office soho computer instance released 20 june 2008 fdcc major version 1.0 specifies 674 settings example wireless interfaces disabled recognition recommended settings practical every system exceptions authorized enterprise wireless networks made documented fdcc deviation report strict implementation recommended settings known cause usability issues nist publishes list known issues found nowiki https //usgcb.nist.gov/usgcb/microsoft_content.html /nowiki third-party software vendors emerged claim tested settings soho environment however time general public still remains relatively unaware fdcc usgcb security settings developed put forward nist | [
4036,
1805
] | Validation |
4,351 | 5 | WHOIS++:whois++ whois++ protocol distributed directory system originally designed provide white pages search mechanism find humans could actually used arbitrary information retrieval tasks developed early 1990s bunyip information systems documented ietf whois++ devised extension pre-existing whois system whois early networked directory service originally maintained sri international defense data network whois protocol still widely used allow domain ownership records internet easily queried whois++ attempted address short comings original whois protocol become apparent years supported multiple languages character sets help i18n issues advanced query syntax ability generate forward knowledge form 'centroid data structures could used route queries one server another protocol designed backward compatible older whois standard whois++ clients could still extract meaningful information already deployed whois servers whilst whois++ white pages directory service never really took compared competitors x.500 gain notable amount use united kingdom underlying search retrieval protocol number subject based gateways funded part jisc electronic library programme achieved using software called roads provided whois++ base index servers cgi based web interfaces whois++ clients use centroids provide forward knowledge query routing allowed subject gateway provide resources academic users database also point jisc funded subject gateways might useful information whois++ protocol designated ietf historic protocol longer deployed new systems developed | [
2261,
7144,
2808
] | Train |
4,352 | 5 | SeaMonkey:seamonkey seamonkey free open-source internet suite continuation former mozilla application suite based source code grew netscape communicator formed base netscape 6 netscape 7 seamonkey created 2005 mozilla foundation decided focus standalone projects firefox thunderbird development seamonkey community-driven contrast mozilla application suite last released version 1.7.13 governed mozilla foundation new project-leading group called seamonkey council compared firefox seamonkey web browser keeps traditional-looking interface netscape mozilla suite many xul-based firefox thunderbird add-ons modified compatibility seamonkey although add-ons built webextensions architecture used newer firefox versions yet compatible seamonkey consists web browser descendant netscape family e-mail news client program seamonkey mail newsgroups shares code mozilla thunderbird html editor seamonkey composer software suite supports skins comes two skins default installation modern classic recent versions include irc client chatzilla installed extension seamonkey mail traditional e-mail client includes support multiple accounts junk mail detection message filters html message support address books among features shares code mozilla thunderbird thunderbird seamonkey built mozilla comm-central source tree seamonkey composer wysiwyg html editor main user interface features four tabs normal wysiwyg html tags html code browser preview generated code html 4.01 transitional seamonkey composer longer actively maintained underlying editor code shared mail component seamonkey project releases official builds linux macos windows also releases “ unofficial ” x86-64 builds linux avoid confusing organizations still want use original mozilla suite new product needed new name initial speculation members community july 2 2005 announcement confirmed seamonkey would officially become name internet suite superseding mozilla suite seamonkey lowercase refers brine shrimp used netscape mozilla foundation code name never-released netscape communicator 5 later mozilla suite originally name seamonkey derived netscape management replace buttmonkey developers chosen following internal contest codename.. seamonkey council trademarked name help mozilla foundation project uses separate numbering scheme first release called seamonkey 1.0 despite different name version number seamonkey 1.0 based code mozilla suite 1.7 trademark copyright reasons debian rebranded seamonkey distributed iceape 2013 march 10 2005 mozilla foundation announced would release official versions mozilla application suite beyond 1.7.x since focused standalone applications firefox thunderbird however foundation emphasized would still provide infrastructure community members wished continue development effect meant suite would still continue developed seamonkey council instead mozilla foundation seamonkey first released september 15 2005 seamonkey 1 released january 30 2006 core mozilla project source code licensed disjunctive tri-license changing mpl 2.0 gave choice one three following sets licensing terms mozilla public license version 1.1 later gnu general public license version 2.0 later gnu lesser general public license version 2.1 later seamonkey council team responsible project release management currently consists philip chee karsten düsterloh jens hatlak robert kaiser ian neal neil rashbrook justin wood parts table based seamonkey release notes roadmap meeting notes | [
4655,
4296,
6802,
5378,
2205,
7537,
6809,
393,
735,
1475,
3291,
2574,
2577,
6452,
6458,
3655,
4352,
5070,
1496,
4725,
4357,
5433,
1136,
7587,
6858,
2261,
84,
445,
1152,
448,
1525,
4755,
4759,
7975,
7628,
5821,
5127,
1190,
6540,
6908,
33... | Test |
4,353 | 4 | Network_enclave:network enclave network enclave section internal network subdivided rest network purpose network enclave limit internal access portion network necessary set resources differs general network surroundings typically network enclaves publicly accessible internal accessibility restricted use internal firewalls vlans network admissions control vpns network enclaves consist standalone assets interact information systems networks major difference dmz demilitarized zone network enclave dmz allows inbound outbound traffic access firewall boundaries traversed enclave firewall boundaries traversed enclave protection tools used provide protection within specific security domains mechanisms installed part intranet connect networks similar security requirements dmz established within enclave host publicly accessible systems ideal design build dmz separate network interface enclave perimeter firewall dmz traffic would routed firewall processing dmz would still kept separate rest protected network | [
651,
4014
] | Validation |
4,354 | 3 | AmigaOS_4_version_history:amigaos 4 version history new version amigaos released december 24 2006 five years development hyperion entertainment belgium license amiga inc. amigaone registered users five years development users amigaone machines could download hyperion repository pre-release versions amigaos 4.0 long made available witnessed many users amiga discussion forum sites versions stable reliable despite fact technically labeled pre-releases last stable version amigaos 4.0 amigaone computers july 2007 update released download 18 july 2007 registered users amigaone machines amigaos 4 classic released commercially older amiga computers cyberstormppc blizzardppc accelerator cards november 2007 previously available developers beta-testers new version powerpc-native finally abandoning motorola 68k processor amigaos 4.0 run powerpc hardware currently includes a1200 a3000 a4000 powerpc accelerator boards amigaone motherboards amiga inc. distribution policies amigaos 4.0 later versions require third-party hardware os must bundled sole exception amigas phase 5 powerpc accelerator boards os sold separately amigaos 4.0 final introduced new memory system based slab allocator features among others developer pre-release version snapshot amigaos 4.0 amigaone contained html installation guide english german french italian amigaos 4.0 sdk amigaos 4.0 sdk allowed creation new software migration existing amigaos versions 3.x source code os 4.0 amigaos 4.0 developer pre-release update came form full iso image 33 mb needed burned cd-r w user intended replace original amigaos 4.0 developer pre-release cd installation rescue purposes release date 10 october 2004 among features amigaos 4.0 developer pre-release update came form free download registered users update featured usb stack update i.e mass storage support numerous bug fixes enhancements core components system release date 27 december 2004 release date 14 june 2005 following non-exhaustive list features update 3 prominent features fourth amigaos 4.0 developer pre-release update return screen dragging ability petunia just-in-time 68k emulator release date 8 february 2006 new features pre-release include 24 december 2006 final update released came iso image ≈45 mb burned onto cd cd bootable may used standalone installation cd amigaos 4.0 final update introduced new memory system based slab allocator features amigaos 4.0 among others release date 18 july 2007 improvements amigaos 4.0 july 2007 update amigaos 4.0 amiga 1200 amiga 3000 amiga 4000 series computers equipped phase5 powerup powerpc accelerator cards put sale november 2007 feature set equal july 2007 update drivers amiga expansion cards devices minor improvements e.g amigainput update amigaos 4.0 classic amiga computers addressed issues compatibility problems release date 23 february 2008 amigaos 4.1 presented public july 11 2008 put sale september 2008 new version simple update features among others amigaos 4.1 presented public 11 july 2008 put sale september 2008 new version simple update features among others 21 june 2009 hyperion entertainment announced immediate availability quick fix package amigaone sam/sam flex pegasos ii features include 14 january 2010 hyperion entertainment announced immediate availability amigaos 4.1 update 1 first full update amigaos 4.1 features include upgrades following 30 april 2010 hyperion entertainment announced immediate availability update 2 amigaos 4.1 amigaone sam440ep pegasos ii registered users features 17 may 2011 amigaos 4.1 commodore amigas powerup accelerators released august 29 2011 hyperion entertainment made available update 3 amigaos 4.1 amigaone sam440ep sam 460 classic amigas ppc cards pegasos ii registered users final bugfixes updates amigaos 4.1 new features reserved os 4.2 december 22 2011 hyperion entertainment released minor update correct many bugfixes third update amigaos 4.1 introduces something new update 5 first public release amigaone x1000 28 january 2012 later 16 august 2012 update 5 released platforms update 6 released november 30 2012 rather unusual update regard included bug fixes except new ide xena kicklayout files amigaone x1000 update consisted mainly new efficient way delivering bug fixes new update software ... menu item workbench launch amiupdate handles future amigaos 4 software updates amigaos 4.1 final edition released 18 december 2014 new functionality amigaos 4.1 final edition includes | [
3688,
1534,
6002,
6431,
6009,
5128,
307,
5833,
5661,
4244,
7746,
931,
7384,
3222,
5965,
7942,
1237,
7775
] | Test |
4,355 | 2 | Susan_Kare:susan kare susan kare born february 5 1954 artist graphic designer created many interface elements typefaces apple macintosh 1980s also creative director one original employees next company formed steve jobs left apple 1985 worked microsoft ibm pinterest facebook kare born ithaca new york sister aerospace engineer jordin kare.in high school worked museum designer harry loucks introduced typography graphic design graduated harriton high school 1971 graduated summa cum laude b.a art mount holyoke college 1975 received ph.d. new york university 1978 next moved san francisco worked fine arts museums kare joined apple computer receiving call high school friend andy hertzfeld early 1980s member original apple macintosh design team worked apple starting 1982 badge 3978 kare originally hired macintosh software group design user interface graphics fonts business cards read hi macintosh artist later creative director apple creative services working director organization tom suiter designer many typefaces icons original marketing material original macintosh operating system descendants groundbreaking work still seen many computer graphics tools accessories especially icons lasso grabber paint bucket designs created first visual language apple new point-and-click computing presentation layers design conference san francisco revealed command icon apple keyboards originally symbol used denote notable interesting features swedish campgrounds kare early pioneer pixel art recognizable works time apple chicago typeface prominent user-interface typeface seen classic mac os interfaces system 1 1984 mac os 9 1999 well typeface used first four generations apple ipod interface geneva typeface original monospace monaco typeface clarus dogcow happy mac icon smiling computer welcomed mac users starting machines command key symbol apple keyboards icons drew many sources art history wacky gadgets forgotten hieroglyphics mac concept command symbol taken saint hannes cross symbol place interest leaving apple kare joined next designer working clients microsoft ibm projects microsoft included card deck windows 3.0 solitaire game well numerous icons design elements windows 3.0 many icons notepad various control panels remained essentially unchanged microsoft windows xp ibm produced icons design elements os/2 eazel contributed iconography nautilus file manager 2003 became member advisory board glam media mode media 2006 2010 produced icons gifts feature facebook initially profits gift sales donated susan g. komen cure foundation valentine day 2007 gift selection modified include new limited edition gifts necessarily pertain valentine day one gift icons titled big kiss also featured versions mac os x user account picture 2007 designed identity icons website chumby industries inc. well interface internet-enabled alarm clock since 2008 museum modern art store new york city carried stationery notebooks featuring designs 2015 moma also acquired notebooks sketches led early mac icons august 2012 called expert witness apple company patent-infringement trial industry competitor samsung see apple inc. v. samsung electronics co. 2015 kare hired pinterest product design lead heads digital design practice san francisco sells limited-edition signed fine-art prints currently uses adobe photoshop adobe illustrator make designs logos recognition design work kare awarded american institute graphic arts medal april 2018 married three sons | [
5101,
6971,
7245,
3001,
7259,
5571,
6814,
405,
7274,
6295,
5331,
246,
1599,
961,
5450,
360
] | Validation |
4,356 | 1 | Fabian_Pascal:fabian pascal fabian pascal consultant large software vendors ibm oracle corporation borland better known author seminar speaker born romania pascal lives san francisco ca area us works association christopher j date pascal known sharp criticisms data management industry trade press current state higher education western culture alleged media bias pascal advocates strict adherence principles relational model argues departing model name pragmatism responsible serious data management troubles criticism pascal advocacy often centers around polemical style perceive overly confrontational unprofessional political commentary postwest blog decline western education civilization middle east issues | [
2054,
7915
] | Validation |
4,357 | 8 | Daylife:daylife daylife offers on-demand features media apps served cloud provides digital media management tools content feeds publishers brand marketers developers daylife founded 2006 raised 15m investment date recently strategic investor getty images company headquartered downtown new york city daylife products include daylife publisher suite range apis set hosted solutions including smart topics smart galleries smart sections hosted solutions launched partnership getty images allow publishers source manage compose sites media components pages complete sections content daylife technology analyzes 100,000 curated content feeds allows publishers curate automate media enhance proprietary content clients include usa today bloomberg businessweek npr mashable sky news forbes thomson reuters 80 others daylife publisher suite allows publishers marketers deploy on-demand media features apps cloud onto digital channel clicks features apps managed simple browser-based dashboard smartgalleries suite tools allow publishers create image galleries customizable widgets full-page formats publishers hand-select images automatically fill galleries based keywords daylife getty images launched smartgalleries september 2009 conjunction investment announcement smarttopics tools publishers create media-rich pages specific topics linking proprietary content related media videos images links tweets selected publisher smartsections tools allow publishers compose launch full content sections verticals like travel basketball featuring real-time media proprietary outside sources selected editor daylife developer apis programming platform media highly flexible scalable serving 1.5 billion calls per month july 2011 apis let developers source combine synthesize news media content applications apis ingest parse analyze media content exposing hundreds ways query deliver scale free paid access available example semantic web daylife analyzes continuous stream media content maps connections news topics enables dynamic news navigation topic country journalist medium timeline geography daylife founded 2006 chief executive officer upendra shardanand company released apis 2008 2009 daylife named one top 50 tech startups businessweek top 50 real-time web companies readwriteweb daylife funded balderton capital arts alliance new york times getty images angel investors include michael arrington john borthwick andrew rasiej dave winer jeff jarvis partner daylife 2012 daylife acquired newscred | [
1152,
2812,
5984,
3172,
7063,
7975,
6092,
1276,
2842,
393,
7015,
3655,
3043,
4352,
5699,
6582,
7692
] | Validation |
4,358 | 4 | Sha1sum:sha1sum computer program calculates verifies sha-1 hashes commonly used verify integrity files variant installed default unix-like operating systems variants include permits sha-1 sha-512 hash functions selected manually use specific sha-2 hash function permits sha-3 sha3-512 shake rawshake keccak functions selected manually versions microsoft windows also exist activeperl distribution includes perl implementation shasum freebsd openbsd utilities called md5 sha1 sha256 sha512 versions offer slightly different options features additionally freebsd offers skein family message digests sha-1 variants proven vulnerable collision attacks users use example sha-2 variant sha256sum instead prevent tampering adversary included gnu core utilities busybox toybox create file sha1 hash one provided distributing one file .sha1 may appended filename e.g output contains one line per file form codice_1 note well hash digest creation performed text mode instead binary mode two space characters instead single space character asterisk example verify file downloaded correctly sha1sum create checksums one multiple files inside directory directory tree i.e subdirectories sub-subdirectories etc files contain possible using sha1sum combination commands find xargs optionally sort files sorted checksum file sha1deep create checksums directory tree also use sha1sum exec | [
362,
4867,
4759,
578,
4020
] | Validation |
4,359 | 9 | Intuitionistic_type_theory:intuitionistic type theory intuitionistic type theory also known constructive type theory martin-löf type theory type theory alternative foundation mathematics intuitionistic type theory created per martin-löf swedish mathematician philosopher first published 1972 multiple versions type theory martin-löf proposed intensional extensional variants theory early impredicative versions shown inconsistent girard paradox gave way predicative versions however versions keep core design constructive logic using dependent types martin-löf designed type theory principles mathematical constructivism constructivism requires existence proof contain witness proof exists prime greater 1000 must identify specific number prime greater 1000 intuitionistic type theory accomplished design goal internalizing bhk interpretation interesting consequence proofs become mathematical objects examined compared manipulated intuitionistic type theory type constructors built follow one-to-one correspondence logical connectives example logical connective called implication formula_1 corresponds type function formula_2 correspondence called curry–howard isomorphism previous type theories also followed isomorphism martin-löf first extend predicate logic introducing dependent types intuitionistic type theory 3 finite types composed using 5 different type constructors unlike set theories type theories built top logic like frege feature type theory double duty feature math logic unfamiliar type theory know set theory quick summary types contain terms like sets contain elements terms belong one one type terms like formula_3 formula_4 compute reduce canonical terms like 4 see article type theory 3 finite types 0 type contains 0 terms 1 type contains 1 canonical term 2 type contains 2 canonical terms 0 type contains 0 terms also called empty type used represent anything exist also written formula_5 represents anything unprovable proof exist result negation defined function formula_6 likewise 1 type contains 1 canonical term represents existence also called unit type often represents propositions proven therefore sometimes written formula_7 finally 2 type contains 2 canonical terms represents definite choice two values used boolean values propositions propositions considered 1 type may proven never proof 0 type may proven either way law excluded middle hold propositions intuitionistic type theory σ-types contain ordered pairs typical ordered pair 2-tuple types σ-type describe cartesian product formula_8 two types formula_9 formula_10 logically ordered pair would hold proof formula_9 proof formula_10 one may see type written formula_13 σ-types powerful typical ordered pair types dependent typing ordered pair type second term depend value first term example first term pair might natural number second term type might vector length equal first term type would written using set-theory terminology similar indexed disjoint unions sets case usual ordered pairs type second term depend value first term thus type describing cartesian product formula_15 written important note value first term formula_17 depended type second term formula_18 obviously σ-types used build longer dependently-typed tuples used mathematics records structs used programming languages example dependently-typed 3-tuple two integers proof first integer smaller second integer described type dependent typing allows σ-types serve role existential quantifier statement exists formula_17 type formula_21 formula_22 proven becomes type ordered pairs first item value formula_17 type formula_21 second item proof formula_22 notice type second item proofs formula_22 depends value first part ordered pair formula_17 type would π-types contain functions typical function types consist input type output type powerful typical function types however return type depend input value functions type theory different set theory set theory look argument value set ordered pairs type theory argument substituted term computation reduction applied term example type function given natural number formula_17 returns vector containing formula_17 real numbers written output type depend input value function type often simply written formula_32 thus formula_33 type functions natural numbers real numbers π-types correspond logical implication logical proposition formula_1 corresponds type formula_2 containing functions take proofs-of-a return proofs-of-b type could written consistently π-types also used logic universal quantification statement every formula_17 type formula_21 formula_22 proven becomes function formula_17 type formula_21 proofs formula_22 thus given value formula_17 function generates proof formula_44 holds value type would =-types created two terms given two terms like formula_3 formula_47 create new type formula_48 terms new type represent proofs pair reduce canonical term thus since formula_3 formula_4 compute canonical term formula_51 term type formula_48 intuitionistic type theory single way make terms =-types reflexivity possible create =-types formula_54 terms reduce canonical term unable create terms new type fact able create term formula_54 could create term formula_5 putting function would generating function type formula_57 since formula_58 intuitionistic type theory defines negation would formula_59 finally formula_60 equality proofs area active research proof theory led development homotopy type theory type theories inductive types allow creation complex self-referential types example linked list natural numbers either empty list pair natural number another linked list inductive types used define unbounded mathematical structures like trees graphs etc.. fact natural numbers type may defined inductive type either formula_61 successor another natural number inductive types define new constants zero formula_62 successor function formula_63 since formula_64 definition evaluated using substitution terms like formula_65 formula_66 become canonical terms natural numbers proofs inductive types made possible induction new inductive type comes inductive rule prove predicate formula_44 every natural number use following rule inductive types intuitionistic type theory defined terms w-types type well-founded trees later work type theory generated coinductive types induction-recursion induction-induction working types obscure kinds self-referentiality higher inductive types allow equality defined terms universe types allow proofs written types created type constructors every term universe type formula_69 mapped type created combination formula_70 inductive type constructor however avoid paradoxes term formula_69 maps formula_69 write proofs small types formula_69 must use formula_74 contain term formula_69 formula_74 similarly formula_77 predicative hierarchy universes quantify proof fixed constant formula_78 universes use formula_79 universe types tricky feature type theories martin-löf original type theory changed account girard paradox later research covered topics super universes mahlo universes impredicative universes formal definition intuitionistic type theory written using judgements example statement formula_9 type formula_10 type formula_82 type judgements type ... ... expression formula_82 judgement type defined second level type theory confusing particularly comes equality judgement term equality might say formula_84 statement two terms reduce canonical term also judgement type equality say formula_85 means every element formula_9 element type formula_10 vice versa type level type formula_84 contains terms proof formula_51 formula_3 reduce value obviously terms type generated using term-equality judgement lastly english-language level equality use word four symbol formula_51 refer canonical term formula_92 synonyms like called definitionally equal martin-löf description judgements based discussion nordström petersson smith formal theory works types objects type declared object exists type objects equal types equal type depends object another type declared removed substitution object depends object another type done two ways object abstracted written removed substitution object-depending-on-object also declared constant part recursive type example recursive type formula_64 constant object-depending-on-object associated abstraction constants like formula_64 removed defining equality relationship addition defined using equality using pattern matching handle recursive aspect formula_64 formula_64 manipulated opaque constant internal structure substitution objects types relations used express formulae theory following styles judgements used create new objects types relations existing ones convention type represents types called formula_114 formula_115 since formula_114 type member objects dependent type formula_117 maps object corresponding type texts formula_117 never written context statement reader almost always tell whether formula_9 refers type whether refers object formula_114 corresponds type complete foundation theory everything else derived implement logic proposition given type objects types represent different possible ways prove proposition obviously proof proposition type objects operators like work propositions introduce new types new objects formula_121 type depends type formula_9 type formula_10 objects dependent type defined exist every pair objects formula_9 formula_10 obviously formula_9 formula_10 proof empty type new type representing formula_128 also empty done types booleans natural numbers etc operators using language category theory r. a. g. seely introduced notion locally cartesian closed category lccc basic model type theory refined hofmann dybjer categories families categories attributes based earlier work cartmell category families category c contexts objects contexts context morphisms substitutions together functor c → fam set fam set category families sets objects pairs index set function b x → morphisms pairs functions f → g x → x b g f b words f maps b b functor assigns context g set types set terms axioms functor require play harmoniously substitution substitution usually written form af af type term f substitution g category c must contain terminal object empty context final object form product called comprehension context extension right element type context left element g context object final among contexts mappings p → g q tm ap logical framework martin-löf takes form closure conditions context dependent sets types terms type called set set type types closed forms dependent sum product forth theory predicative set theory expresses closure conditions types sets elements closed operations reflect dependent sum product various forms inductive definition fundamental distinction extensional vs intensional type theory extensional type theory definitional i.e. computational equality distinguished propositional equality requires proof consequence type checking becomes undecidable extensional type theory programs theory might terminate example theory allows one give type y-combinator detailed example found nordstöm petersson programming martin-löf type theory however n't prevent extensional type theory basis practical tool example nuprl based extensional type theory practical standpoint difference program n't terminate program takes million years terminate contrast intensional type theory type checking decidable representation standard mathematical concepts somewhat cumbersome since intensional reasoning requires using setoids similar constructions many common mathematical objects hard work ca n't represented without example integer numbers rational numbers real numbers integers rational numbers represented without setoids representation n't easy work cauchy real numbers ca n't represented without homotopy type theory works resolving problem allows one define higher inductive types define first order constructors values points higher order constructors i.e equalities elements paths equalities equalities homotopies ad infinitum different forms type theory implemented formal systems underlying number proof assistants many based per martin-löf ideas many added features axioms different philosophical background instance nuprl system based computational type theory coq based calculus co inductive constructions dependent types also feature design programming languages ats cayenne epigram agda idris per martin-löf constructed several type theories published various times much later preprints description became accessible specialists among others jean-yves girard giovanni sambin list attempts list theories described printed form sketch key features distinguished theories dependent products dependent sums disjoint unions finite types natural numbers theories reduction rules include η-reduction either dependent products dependent sums except mltt79 η-reduction dependent products added mltt71 first type theories created per martin-löf appeared preprint 1971 one universe universe name i.e type theory called today type type jean-yves girard shown system inconsistent preprint never published mltt72 presented 1972 preprint published theory one universe v identity types universe predicative sense dependent product family objects v object v example v assumed v. universe à la russell i.e. one would write directly t∈v t∈t martin-löf uses sign ∈ instead modern without additional constructor el mltt73 first definition type theory per martin-löf published presented logic colloquium 73 published 1975 identity types calls propositions since real distinction propositions rest types introduced meaning unclear later acquires name j-eliminator yet without name see pp 94–95 theory infinite sequence universes v ... v ... universes predicative a-la russell non-cumulative fact corollary 3.10 p. 115 says a∈v b∈v b convertible m=n means example would difficult formulate univalence theory—there contractible types v unclear declare equal since identity types connecting v v i≠j mltt79 presented 1979 published 1982 paper martin-löf introduced four basic types judgement dependent type theory since became fundamental study meta-theory systems also introduced contexts separate concept see p. 161 identity types j-eliminator already appeared mltt73 name also rule makes theory extensional p. 169 w-types infinite sequence predicative universes cumulative bibliopolis discussion type theory bibliopolis book 1984 somewhat open-ended seem represent particular set choices specific type theory associated | [
4039,
8174,
7071,
4322,
2659,
8097,
2662,
5751,
5938,
4254,
6128,
7296,
6223,
3753,
2617,
7777,
6593,
703,
1803
] | Test |
4,360 | 2 | SCSI_Pass-Through_Direct:scsi pass-through direct scsi pass direct sptd proprietary device driver application programming interface api developed duplex secure ltd. provides new method access scsi storage devices sptd api open public sptd used daemon tools alcohol 120 also utilized powerarchiver pro 2010 v11.60+ however configurable option available disable known incompatible kernel-mode debugging including windbg microsoft command line debuggers well softice certain versions freeware optical media burning software imgburn issue warning sptd detrimental effect drive performance application detects sptd active installed conexware inc. maker powerarchiver claims internal testing sptd improved optical drive performance 20 percent comparison old school scsi pass interface | [
6992,
7078,
4759,
5571,
2729
] | Test |
4,361 | 9 | XPL:xpl xpl programming language based pl/i portable one-pass compiler written language parser generator tool easily implementing similar compilers languages xpl designed 1967 way teach compiler design principles starting point students build compilers languages xpl designed implemented william m. mckeeman david b. wortman university california santa cruz james j. horning others stanford university xpl first announced 1968 fall joint computer conference methods compiler described detail 1971 textbook compiler generator called combined work 'compiler generator implies little language- target-specific programming required build compiler new language new target better label xpl translator writing system helps write compiler less new changed programming code xpl language simple small efficient dialect pl/i intended mainly task writing compilers xpl language also used purposes available xpl compiled easily modern machines simple compiler compiler internals written easily xpl code easy read pl/i language designed ibm committee 1964 comprehensive language replacing fortran cobol algol meeting customer internal needs ambitious goals made pl/i complex hard implement efficiently sometimes surprising used xpl small dialect full language xpl one added feature found pl/i string datatype dynamic lengths string values live separate text-only heap memory space automatic garbage collection stale values much simple compiler manipulating input text output byte streams feature helps simplify xpl-based compilers xpl compiler called xcom one-pass compiler using table-driven parser simple code generation techniques versions xcom exist different machine architectures using different hand-written code generation modules targets original target ibm system/360 proper subset ibm system/370 ibm system/390 ibm system z. xcom compiles xpl source code since xcom written xpl compile – self-compiling compiler reliant compilers several famous languages self-compiling compilers including burroughs b5000 algol pl/i c lisp java creating compilers chicken-and-egg conundrum language first implemented temporary compiler written language even interpreter often interpreter intermediate code bcpl intcode o-code xcom began algol program running burroughs machines translating xpl source code system/360 machine code xpl team manually turned algol source code xpl source code xpl version xcom compiled burroughs creating self-compiling xcom system/360 machines algol version thrown away improvements happened xpl version called bootstrapping compiler authors xpl invented tombstone diagram t-diagram document bootstrapping process retargeting compiler new machine architecture similar exercise except code generation modules need changed xcom one-pass compiler emitted code fix-up process forward branches loops defined situations emits machine code statement grammar rule within statement recognized rather waiting parsed entire procedure entire program parse trees required intermediate program forms loop-wide procedure-wide optimizations xcom however perform peephole optimization code generation response grammar rule attached rule immediate approach result inefficient code inefficient use machine registers offset efficiency implementation namely use dynamic strings mentioned earlier processing text compilation substring operations frequently performed fast assignment integer actual substring moved short quick easy teach short course fits modest-sized memories easy change different languages different target machines xcom compiler hand-written lexical scanner mechanically-generated parser syntax compiler input language case xpl described simplified bnf grammar xpl grammar analyzer tool analyzer xa turns set large data tables describing legal combinations syntax rules discern table generation step re-done language changed compiler runs data tables used small language-independent parsing algorithm parse respond input language style table-driven parser generally easier write entirely hand-written recursive descent parser xcom uses bottom-up parsing method compiler delay decision syntax rule encountered seen rightmost end phrase handles wider range programming languages top-down methods compiler must guess commit specific syntax rule early seen left end phrase xpl includes minimal runtime support library allocating garbage-collecting xpl string values source code library must included every program written xpl last piece xpl compiler writing system example compiler named skeleton xcom parse tables example toy grammar instead xpl full grammar starting point building compiler new language language differs much xpl xpl run control monitor xmon operating system-specific part system acts loader xcom programs developed using xcom also provides three auxiliary storage devices xcom use directly accessed block number originally published xmon optimized ibm 2311 disk drives ca 1964 efficient drives xmon 50 percent efficient ibm 2314 disk drives ca 1965 significantly less efficient subsequently introduced disk drives ibm 3330 ca 1970 3330-11 ca 1973 3350 ca 1975 dramatically less efficient devices much larger track capacities ibm 3390 ca 1989 converting xmon primitive use note point read/write disk operations precisely one block per track entire remainder track erased hence wasted space excp xdap n blocks per track n computed target device physical characteristics significantly greater 1 wasted space yields dramatic increase disk utilization efficiency corresponding reduction operating system overhead although originally developed os/360 xmon either original note point read/write implementation excp xdap enhancement run subsequently released ibm oses including os/370 xa os/390 z/os generally without changes xcom originally used now-obsolete bottom-up parse table method called mixed strategy precedence invented xpl team although officially released version retains msp parser include later-released peephole optimizations additional data types developed outside original implementation team msp generalization simple precedence parser method invented niklaus wirth pl360 simple precedence generalization trivially simple operator precedence methods work nicely expressions like a+b* c+d -e. msp tables include list expected triplets language symbols list grows larger cube grammar size becomes quite large typical full programming languages xpl-derived compilers difficult fit onto minicomputers 1970s limited memories msp also powerful enough handle likely grammars applicable language designer tweak language definition fit msp restrictions language widely used university toronto subsequently changed xcom xa instead use variant donald knuth lr parser bottom-up method xcom variant called simple lr slr handles grammars msp quite many grammars lalr full lr 1 differences lr 1 mostly table generator algorithms compile-time parser method xcom xa predate widespread availability unix yacc parser generator tool xa yacc similar purposes xpl open source system/360 version xpl distributed ibm share users organization groups ported xpl onto many larger machines 1970s various groups extended xpl used xpl implement moderate-sized languages xpl used develop number compilers various languages systems xpl continues ported current computers x86/freebsd port done 2000 x86/linux port 2015 xpl c translator 2017 | [
1616,
3931,
3509,
7331,
2379,
5218,
5932,
578,
7375,
3210,
931,
5678,
5190,
5424,
4543,
4366,
5081,
2803,
1516,
1435
] | Test |
4,362 | 6 | Fsn_(file_manager):fsn file manager file system navigator fsn pronounced fusion experimental application view file system 3d made sgi irix systems even though never developed fully functional file manager gained fame appearing movie jurassic park 1993 scene film character lex murphy played ariana richards finds computer displaying interface exclaims unix system know proceeds restart building access control system locking control room doors release film perceived visualization example media misrepresentation computers citing computer game-like display unrealistic hollywood mockup | [
4121,
5104,
3849,
3692,
5571,
578,
7990,
5055,
7010,
4802,
6922,
3567,
156,
970,
787
] | Test |
4,363 | 1 | MySQL_Federated:mysql federated mysql federated storage engine mysql relational database management system storage engine allows user create table local representation foreign remote table utilizes mysql client library api data transport treating remote data source way storage engines treat local data sources whether myd files myisam memory cluster heap tablespace innodb federated table defined one .frm data definition file containing information url data source actual data exist local remote mysql instance create federated table one specify url connection string connection url format upon creation federated table user must ensure remote data source indeed exist error issued mysql federated storage engine authored patrick galbraith brian aker currently maintained patrick galbraith antony curtis introduced 2005 mysql 5.0 | [
7957,
5717,
4759,
1359,
5126,
5571,
6279,
578,
4708,
5055,
4167,
3652,
6755,
5780,
6056,
1695,
2259,
3244,
971,
7598
] | Test |
4,364 | 4 | MailChannels:mailchannels mailchannels privately held anti-spam technology company based vancouver british columbia mailchannels specializes software services detect block sending spam phishing abusive email unlike anti-spam technology providers mailchannels positions leader blocking abusive email source installing software services within sending networks services isps web hosting providers combat outgoing spam mailchannels offers customers either cloud-based smtp relay service software installed customer within network mailchannels software derives open-source web proxy software nginx company makes claim software extremely scalable robust mailchannels customers include large web hosting companies internet service providers mailbox providers email service providers endurance international group sendgrid sherweb locaweb company founded 2004 former engineers activestate acquired sophos created one first commercial spam filters company first product smtp proxy provides tar-pitting transparent smtp proxy functionality inbound email filtering 2007 mit spam conference company founder ken simpson awarded best paper award 2007 mailchannels joined maawg closed series round led current former microsoft employees 2010 company launched outbound email filtering software claims capable filtering 30 millions messages per hour transparently network outbound email filtering involves scanning email traffic exits network identifying compromised accounts reducing risk ip addresses blocked receiving networks 2013 company launched outbound spam filtering service 2016 company launched reseller program 2018 company launch inbound spam filtering service | [
2961,
2291,
7470,
4734,
3017,
330,
1805,
6305
] | Test |
4,365 | 3 | R10000:r10000 r10000 code-named t5 risc microprocessor implementation mips iv instruction set architecture isa developed mips technologies inc. mti division silicon graphics inc. sgi chief designers chris rowen kenneth c. yeager r10000 microarchitecture known andes abbreviation architecture non-sequential dynamic execution scheduling r10000 largely replaces r8000 high-end r4400 elsewhere mti fabless semiconductor company r10000 fabricated nec toshiba previous fabricators mips microprocessors integrated device technology idt three others fabricate r10000 expensive r4000 r4400 r10000 introduced january 1996 clock frequencies 175 mhz 195 mhz 150 mhz version introduced o2 product line 1997 discontinued shortly due customer preference 175 mhz version r10000 available large volumes later year due fabrication problems mips foundries 195 mhz version short supply throughout 1996 priced us 3,000 result 25 september 1996 sgi announced r10000s fabricated nec march end july year faulty drawing much current causing systems shut operation sgi recalled 10,000 r10000s shipped systems result impacted company earnings 1997 version r10000 fabricated 0.25 µm process enabled microprocessor reach 250 mhz users r10000 include r10000 four-way superscalar design implements register renaming executes instructions out-of-order design departure previous mti microprocessors r4000 much simpler scalar in-order design relies largely high clock rates performance r10000 fetches four instructions every cycle instruction cache instructions decoded placed integer floating-point load/store instruction queues depending type instruction decode unit assisted pre-decoded instructions instruction cache append five bits every instruction enable unit quickly identify execution unit instruction executed rearrange format instruction optimize decode process instruction queues accept four instructions decoder avoiding bottlenecks instruction queues issue instructions execution units dynamically depending availability operands resources queues except load/store queue issue two instructions every cycle execution units load/store queue issue one instruction r10000 thus issue five instructions every cycle integer unit consists integer register file three pipelines two integer one load store integer register file 64 bits wide contains 64 entries 32 architectural registers 32 rename registers implement register renaming register file seven read ports three write ports integer pipelines adder logic unit however first pipeline barrel shifter hardware confirming prediction conditional branches second pipeline used access multiplier divider multiplies pipelined six-cycle latency 32-bit integers ten 64-bit integers division pipelined divider uses non-restoring algorithm produces one bit per cycle latencies 32-bit 64-bit divides 35 67 cycles respectively floating-point unit fpu consists four functional units adder multiplier divide unit square root unit adder multiplier pipelined divide square root units adds multiplies latency three cycles adder multiplier accept new instruction every cycle divide unit 12- 19-cycle latency depending whether divide single precision double precision respectively square root unit executes square root reciprocal square root instructions square root instructions 18- 33-cycle latency single precision double precision respectively new square root instruction issued divide unit every 20 35 cycles single precision double precision respectively reciprocal square roots longer latencies 30 52 cycles single precision 32-bit double precision 64-bit respectively floating-point register file contains sixty-four 64-bit registers thirty-two architectural remaining rename registers adder dedicated read write ports whereas multiplier shares divider square root unit divide square root units use srt algorithm mips iv isa multiply–add instruction instruction implemented r10000 bypass — result multiply bypass register file delivered add pipeline operand thus fused multiply–add four-cycle latency r10000 two comparatively large on-chip caches 32 kb instruction cache 32 kb data cache instruction cache two-way set-associative 128-byte line size instructions partially decoded appending four bits instruction length 32 bits placed cache 32 kb data cache dual-ported two-way interleaving consists two 16 kb banks bank two-way set-associative cache 64-byte lines uses write-back protocol virtually indexed physically tagged enable cache indexed clock cycle maintain coherency secondary cache external secondary unified cache supported capacities 512 kb 16 mb implemented commodity synchronous static random access memorys ssrams cache accessed via 128-bit bus protected 9-bits error correcting code ecc cache bus operate clock rate r10000 whose maximum frequency 200 mhz 200 mhz bus yielded peak bandwidth 3.2 gb/s cache two-way set associative avoid high pin count r10000 predicts way accessed mips iv 64-bit architecture reduce cost r10000 implement entire physical virtual address instead 40-bit physical address 44-bit virtual address thus capable addressing 1 tb physical memory 16 tb virtual memory r10000 uses avalanche bus 64-bit bus operates frequencies 100 mhz avalanche multiplexed address data bus 100 mhz yields maximum theoretical bandwidth 800 mb/s peak bandwidth 640 mb/s requires cycles transmit addresses system interface controller supports glue-less symmetrical multiprocessing smp four microprocessors systems using r10000 external logic scale hundreds processors example system origin 2000 r10000 consists approximately 6.8 million transistors approximately 4.4 million contained primary caches die measures 16.640 17.934 mm die area 298.422 mm fabricated 0.35 µm process packaged 599-pad ceramic land grid array lga r10000 introduced microprocessor report covering 1994 microprocessor forum reported packaged 527-pin ceramic pin grid array cpga vendors also investigated possibility using 339-pin multi-chip module mcm containing microprocessor die 1 mb cache r10000 extended multiple successive derivatives derivatives r12000 clock frequency kept low possible maintain power dissipation 15 20 w range densely packaged sgi high performance computing hpc systems r12000 derivative r10000 started mips completed sgi fabricated nec toshiba version fabricated nec called vr12000 microprocessor introduced november 1998 available 270 300 360 mhz r12000 developed stop-gap solution following cancellation beast project intended deliver successor r10000 r12000 users include nec siemens-nixdorf sgi tandem computers later compaq acquisition tandem r12000 improves upon r10000 microarchitecture inserting extra pipeline stage improve clock frequency resolving critical path increasing number entries branch history table improving prediction modifying instruction queues take account age queued instruction enabling older instructions executed newer ones possible r12000 fabricated nec toshiba 0.25 µm cmos process four levels aluminum interconnect new use new process mean r12000 simple die shrink tweaked microarchitecture layout die optimized take advantage 0.25 µm process nec fabricated vr12000 contained 7.15 million transistors measured 15.7 14.6 mm 229.22 mm r12000a derivative r12000 developed sgi introduced july 2000 operates 400 mhz fabricated nec 0.18 µm process aluminum interconnects r14000 development r12000 announced july 2001 r14000 operates 500 mhz enabled 0.13 µm cmos process five levels copper interconnect fabricated features improvements microarchitecture r12000 supporting double data rate ddr ssrams secondary cache 200 mhz system bus r14000a development r14000 announced february 2002 operates 600 mhz dissipates approximately 17 w fabricated nec corporation 0.13 µm cmos process seven levels copper interconnect r16000 code-named n0 last derivative r10000 developed sgi fabricated nec 0.11 µm process eight levels copper interconnect microprocessor introduced 9 january 2003 debuting 700 mhz fuel also used onyx4 ultimate vision april 2003 600 mhz version introduced origin 350 improvements 64 kb instruction data caches r16000a refers r16000 microprocessors clock rates higher 700 mhz first r16000a 800 mhz version introduced 4 february 2004 later 900 mhz version introduced version time fastest publicly known r16000a—sgi later revealed 1.0 ghz r16000s shipped selected customers r16000 users include hp sgi sgi uses microprocessor fuel tezro workstations origin 3000 servers supercomputers hp uses r16000a nonstop himalaya s-series fault-tolerant servers inherited tandem via compaq r18000 canceled development r10000 microarchitecture featured major improvements silicon graphics inc. described hot chips symposium 2001 r18000 designed specifically sgi ccnuma servers supercomputers node would two r18000s connected via multiplexed bus system controller would interface microprocessors local memory rest system via hypercube network r18000 improved floating-point instruction queues revised floating-point unit feature two multiply–add units quadrupling peak flops count division square-root would performed separate non-pipelined units parallel multiply–add units system interface memory hierarchy also significantly reworked would 52-bit virtual address 48-bit physical address bidirectional multiplexed address data system bus earlier models would replaced two unidirectional ddr links 64-bit multiplexed address write path 128-bit read path paths could shared another r18000 multiplexing bus could also configured sysad avalanche configuration backwards compatibility r10000 systems r18000 would 1 mb four-way set-associative secondary cache included on-die supplemented optional tertiary cache built single data rate sdr double data rate ddr ssram ddr sdram capacities 2 64 mb l3 cache would cache tags equivalent 400 kb located on-die reduce latency l3 cache would accessed via 144-bit bus 128 bits data 16 bits ecc l3 cache clock rate would programmable r18000 fabricated nec ux5 process 0.13 µm cmos process nine levels copper interconnect would used 1.2 v power supply dissipated less heat contemporary server microprocessors order densely packed systems | [
2903,
5804,
6074,
551,
4847,
8066,
5208,
6865,
5917,
5822,
5735,
4234,
650,
5740,
2117,
4959,
5055,
7010,
1112,
1023,
5680,
3567,
156,
2248,
4365,
5521,
4368,
4370,
3747,
2889,
4372,
7499,
2617,
536,
2443
] | Test |
4,366 | 2 | Michigan_Terminal_System:michigan terminal system michigan terminal system mts one first time-sharing computer operating systems developed 1967 university michigan use ibm s/360-67 s/370 compatible mainframe computers developed used consortium eight universities united states canada united kingdom period 33 years 1967 1999 university michigan multiprogramming supervisor ummps developed staff academic computing center university michigan operation ibm s/360-67 s/370 compatible computers software may described multiprogramming multiprocessing virtual memory time-sharing supervisor runs multiple resident reentrant programs among programs michigan terminal system mts command interpretation execution control file management accounting end-users interact computing resources mts using terminal batch server oriented facilities name mts refers mts used production basis 13 sites united states canada united kingdom brazil possibly yugoslavia several sites trial benchmarking basis mts developed maintained core group eight universities included mts consortium university michigan announced 1988 reliable mts service provided long users requiring ... mts may phased alternatives able meet users computing requirements ceased operating mts end-users june 30 1996 time services moved client/server-based computing systems typically unix servers various mac pc unix flavors clients university michigan shut mts system last time may 30 1997 rensselaer polytechnic institute rpi believed last site use mts production environment rpi retired mts june 1999 today mts still runs using ibm s/370 emulators hercules sim390 flex-es mid-1960s university michigan providing batch processing services ibm 7090 hardware control university michigan executive system umes interested offering interactive services using time-sharing time work computers could perform limited small real memory capacity ibm introduced system/360 family computers mid-1960s provide solution limitation within ibm conflicting views importance need support time-sharing paper titled program addressing structure time-sharing environment bruce arden bernard galler frank westervelt associate directors um academic computing center tom o'brian building upon basic ideas developed massachusetts institute technology mit published january 1966 paper outlined virtual memory architecture using dynamic address translation dat could used implement time-sharing year negotiations design studies ibm agreed make one-of-a-kind version s/360-65 mainframe computer dynamic address translation dat features would support virtual memory accommodate um desire support time-sharing computer dubbed model s/360-65m stood michigan ibm initially decided supply time-sharing operating system machine meanwhile number institutions heard project including general motors massachusetts institute technology mit lincoln laboratory princeton university carnegie institute technology later carnegie mellon university intrigued time-sharing idea expressed interest ordering modified ibm s/360 series machines demonstrated interest ibm changed computer model number s/360-67 made supported product requests 100 new model s/360-67s ibm realized market time-sharing agreed develop new time-sharing operating system called tss/360 tss stood time-sharing system delivery roughly time first model s/360-67 waiting model 65m arrive um computing center personnel able perform early time-sharing experiments using ibm system/360 model 50 funded arpa concomp conversational use computers project time-sharing experiment began half-page code written kitchen table combined small multi-programming system llmps mit lincoln laboratory modified became um multi-programming supervisor ummps turn ran mts job program earliest incarnation mts intended throw-away system used gain experience new ibm s/360 hardware would discarded ibm tss/360 operating system became available development tss took longer anticipated delivery date delayed yet available s/360-67 serial number 2 arrived computing center january 1967 time um decide whether return model 67 select another mainframe develop mts interim system use tss ready decision continue development mts staff moved initial development work model 50 model 67 tss development eventually canceled ibm reinstated canceled time um liked system developed longer considered interim mts would used um sites 33 years mts developed maintained used consortium eight universities us canada united kingdom several sites ran one mts system numac ran two first newcastle later durham michigan ran three mid-1980s um maize ub blue hg human genetics ubc ran three four different times mts-g mts-l mts-a mts-i general library administration instruction mts sites made contributions development mts sometimes taking lead design implementation new feature times refining enhancing critiquing work done elsewhere many mts components work multiple people multiple sites early days collaboration mts sites accomplished combination face-to-face site visits phone calls exchange documents magnetic tapes snail mail informal get-togethers share meetings later e-mail computer conferencing using confer *forum network file transfer e-mail attachments supplemented eventually largely replaced earlier methods members mts consortium produced series 82 mts newsletters 1971 1982 help coordinate mts development starting ubc 1974 mts consortium held annual mts workshops one member sites workshops informal included papers submitted advance proceedings published after-the-fact included session summaries mid-1980s several western workshops held participation subset mts sites ubc sfu uqv um possibly rpi annual workshops continued even mts development work began taper called simply community workshop continued mid-1990s share expertise common experiences providing computing services even though mts longer primary source computing campuses stopped running mts entirely addition eight mts consortium sites involved development mts run number sites including copy mts also sent university sarajevo yugoslavia though whether ever installed known inria french national institute research computer science control grenoble france ran mts trial basis university waterloo ontario canada southern illinois university naval postgraduate school amdahl corporation st systems mcgill university hospitals stanford university university illinois united states sites theory mts run ibm s/360-67 ibm s/370 series successors mts run following computers production benchmarking trial configurations university michigan installed ran mts first ibm s/360-67 outside ibm serial number 2 1967 second amdahl 470v/6 serial number 2 1975 first amdahl 5860 serial number 1 1982 first factory shipped ibm 3090-400 1986 numac ran mts first s/360-67 uk likely first europe university british columbia ubc took lead converting mts run ibm s/370 series ibm s/370-168 1974 university alberta installed first amdahl 470v/6 canada serial number p5 1975 1978 numac university newcastle upon tyne university durham moved main mts activity ibm s/370 series ibm s/370-168 mts designed support four processors ibm s/360-67 although ibm produced one simplex half-duplex two duplex processor configurations model 67 1984 rpi updated mts support 32 processors ibm s/370-xa extended addressing hardware series although 6 processors likely largest configuration actually used mts supports ibm vector facility available option ibm 3090 es/9000 systems early 1967 running single processor ibm s/360-67 um without virtual memory support mts typically supporting 5 simultaneous terminal sessions one batch job november 1967 virtual memory support added mts running ibm s/360-67 simultaneously supporting 50 terminal sessions 5 batch jobs august 1968 dual processor ibm s/360-67 replaced single processor system supporting roughly 70 terminal 8 batch jobs late 1991 mts um running ibm es/9000-720 supporting 600 simultaneous terminal sessions 3 8 batch jobs mts ipl-ed vm/370 mts sites ran mts native hardware without using virtual machine notable features mts include following notable programs developed mts following notable programs ported mts systems mts supports rich set programming languages developed mts others ported systems ummps supervisor complete control hardware manages collection job programs one job programs mts job program users interact mts operates collection command language subsystems clss one clss allows execution user programs mts provides collection system subroutines available clss user programs mts among things system subroutines provide standard access device support routines dsrs components perform device dependent input/output lists follow quite university michigan centric mts sites used material also produced manuals memos reports newsletters tailored needs site manual series mts michigan terminal system published 1967 1991 volumes 1 23 updated reissued irregularly initial releases volumes always occur numeric order volumes occasionally changed names updated republished general higher number specialized volume earliest versions mts volume ii different organization content mts volumes followed included internal well end user documentation second edition december 1967 covered following mts volumes published university michigan computing center available pdfs various aspects mts university michigan documented series computing center memos ccmemos published irregularly 1967 1987 numbered 2 924 though necessarily chronological order numbers 2 599 general memos various software hardware 600 series consultant notes series—short memos beginning intermediate users 800 series covers issues relating xerox 9700 printer text processing typesetting 900 series covers microcomputers 700 series 1989 series continued reference memos less focus mts long run newsletters targeted end-users university michigan titles computing center news computing center newsletter u-m computing news information technology digest published starting 1971 also introductory material presented user guide mts user guide tutorial series including following materials widely distributed included mts distributions university michigan released mts magnetic tape irregular basis full partial distributions full distributions d1.0 d2.0 ... included mts components partial distributions d1.1 d1.2 d2.1 d2.2 ... included components changed since last full partial distribution distributions 1.0 3.1 supported ibm s/360 model 67 distribution 3.2 supported ibm s/360-67 ibm s/370 architecture distributions d4.0 d6.0 supported ibm s/370 architecture extensions mts distributions included updates needed run licensed program products proprietary software mts base proprietary software obtained separately owners except ibm assembler h none licensed programs required run mts last mts distribution d6.0 released april 1988 consisted 10,003 files six 6250 bpi magnetic tapes 1988 distribution mts components done ad hoc fashion using network file transfer allow new sites get started scratch two additional magnetic tapes made available iplable boot tape contained minimalist version mts plus dasdi diskcopy utilities could used initialize restore one disk pack starter version mts second magnetic tape earliest days mts standalone tss dasdi dump/restore utilities rather mts used create one-disk starter system also less formal redistributions individual sites would send magnetic tapes containing new updated work coordinating site site would copy material common magnetic tape rd1 rd2 ... send copies tape sites contents redistribution tapes seem lost today complete materials six full ten partial mts distributions well two redistributions created 1968 1988 available bitsavers software archive university michigan deep blue digital archive working d6.0 distribution materials possible create iplable version mts new d6.0a distribution mts makes easier d6.0a based d6.0 version mts 1988 various fixes updates make operation hercules 2012 smoother future iplable version mts made available based upon version mts use university michigan 1996 shortly mts shut december 22 2011 mts distribution materials freely available terms creative commons attribution 3.0 unported license cc 3.0 earliest days mts made available free without need license sites interested running mts seemed knowledgeable staff required support mid-1980s licensing arrangements formalized university michigan acting agent granting licenses behalf mts consortium mts licenses available academic organizations annual fee 5,000 non-profit organizations 10,000 commercial organizations 25,000 license restricted mts used provide commercial computing services licensees received copy full set mts distribution tapes incremental distributions prepared year written installation instructions two copies current user documentation limited amount assistance organizations licensed mts several licensed mts order run single program confer fees collected used offset common expenses mts consortium | [
4566,
1522,
7605,
3764,
7331,
6518,
5020,
4670,
5021,
8066,
8173,
299,
5481,
5571,
5041,
7546,
5396,
5932,
7003,
3874,
402,
839,
931,
4428,
1994,
3807,
5948,
7382,
7383,
850,
5244,
2054,
1774,
1879,
336,
7579,
4361,
607,
2431,
4543,
684... | Test |
4,367 | 9 | Modelling_of_General_Systems:modelling general systems mgs general model simulation domain-specific language used specification simulation dynamical systems dynamical structure developed ibisc computer science integrative biology complex systems université d'évry val-d'essonne university évry mgs particularly aimed modelling biological systems mgs computational model generalisation cellular automata lindenmayer systems paun systems computational formalisms inspired chemistry biology manipulates collections sets positions filled values lattice user-defined topology | [] | Test |
4,368 | 3 | R3000:r3000 r3000 32-bit risc microprocessor chipset developed mips computer systems implemented mips instruction set architecture isa introduced june 1988 second mips implementation succeeding r2000 flagship mips microprocessor operated 20 25 33.33 mhz mips 1 instruction set small compared contemporary 80x86 680x0 architectures encoding commonly-used operations supporting addressing modes combined fixed instruction length three different types instruction formats simplified instruction decoding processing employed 5-stage instruction pipeline enabling execution rate approaching one instruction per cycle unusual time mips generation supports four co-processors addition cpu core r3000 microprocessor includes control processor cp contains translation lookaside buffer memory management unit cp works coprocessor besides cp r3000 also support external r3010 numeric coprocessor two external coprocessors r3000 cpu include level 1 cache instead on-chip cache controller operates external data instruction caches 256 kb access caches clock cycle r3000 found much success used many companies workstations servers users included r3000 also used embedded microprocessor advances technology rendered obsolete high-performance systems found continued use lower-cost designs companies lsi logic developed derivatives r3000 specifically embedded systems r3000 development r2000 minor improvements including larger tlb faster bus external caches r3000 die contained 115,000 transistors measured 75,000 square mils 48 mm mips fabless semiconductor company r3000 fabricated mips partners including integrated device technology idt lsi logic nec corporation performance semiconductor others fabricated 1.2 µm complementary metal–oxide–semiconductor cmos process two levels aluminium interconnect derivatives r3000 non-embedded applications include derivatives r3000 embedded applications include | [
2903,
5804,
6074,
5275,
2546,
551,
4479,
6256,
5208,
638,
6865,
5917,
5822,
5737,
4234,
650,
5740,
5055,
7010,
1112,
1761,
1023,
4799,
6922,
949,
4365,
1506,
4370,
3747,
7499,
4372,
4099,
536,
5446,
2443,
447
] | Validation |
4,369 | 2 | Talking_Moose:talking moose talking moose animated talking utility apple macintosh created 1986 canadian programmer steven halls first animated talking agent personal computer featured moose would appear periodic intervals joke witticism moose would also comment system events user actions could speak user typed using moose proof desk accessory according halls original purpose moose make use mac macintalk text-to-speech engine novel manner doonesbury strip characters commented talking computer provided inspiration halls found moose head antlers recognizable even low-resolution computer screens moose first facially animated talking agent lip synchronization became seed idea future talking agents clippy paperclip microsoft windows bonzi buddy prody parrot creative soundblaster talking moose used apple macintalk software first version famously made original never trust computer ca n't lift speech macintosh launch 1984 apple development macintalk petered granted halls permission use continue refining software free halls improve fluidity speech reliability interpretation gave moose library comedic observations wisecracks gave distinctive character around 1990 version talking moose software commercially published baseline publishing commercial release talking moose included color graphics additional software allowed users create edit phrases spoken stripped-down version baseline release talking moose distributed bob levitus book stupid mac tricks 1989 1990s moose rewritten uli kusterer name uli moose later obtained steve halls blessing moose included bob levitus imac ibook book n't know could version 1.0 talking moose released 1986 steve halls version 2.0 released 1987 ran macintosh systems 6.0.4 7.1 macintalk voice used moose 'fred around 1990 baseline publishing commercially published talking moose released version 4 introducing new characters cartoon carnival supposedly run titular ungulate uli kusterer next author moose got rid cartoon carnival worked spirit original moose releasing new versions starting 1.0 supported mac os 7.1 9.2 released initially compuserve later internet also developed first os x native version v 3.0 latest macintosh version moose v3.5.7 works versions os x 10.3 10.7 includes universal binaries january 8 2009 talking moose posting periodic comments twitter account | [
5571
] | Test |
4,370 | 3 | R4000:r4000 r4000 microprocessor developed mips computer systems implements mips iii instruction set architecture isa officially announced 1 october 1991 one first 64-bit microprocessors first mips iii implementation early 1990s risc microprocessors expected replace cisc microprocessors intel i486 r4000 selected microprocessor advanced computing environment ace industry standard intended define common risc platform ace ultimately failed number reasons r4000 found success workstation server markets three configurations r4000 r4000pc entry-level model support secondary cache r4000sc model secondary cache multiprocessor capability r4000mc model secondary cache support cache coherency protocols required multiprocessor systems r4000 scalar superpipelined microprocessor eight-stage integer pipeline first stage virtual address instruction generated instruction translation lookaside buffer tlb begins translation address physical address second stage translation completed instruction fetched internal 8 kb instruction cache instruction cache direct-mapped virtually indexed physically tagged 16- 32-byte line size architecturally could expanded 32 kb third stage rf instruction decoded register file read mips iii defines two register files one integer unit floating-point register file 64 bits wide contained 32 entries integer register file two read ports one write port floating-point register file two read ports two write ports execution begins stage four ex integer floating-point instructions written back register files completed stage eight wb results may bypassed possible r4000 arithmetic logic unit alu shifter multiplier divider load aligner executing integer instructions alu consists 64-bit carry-select adder logic unit pipelined shifter 32-bit barrel shifter performs 64-bit shifts two cycles stalling pipeline result design chosen save die area multiplier divider pipelined significant latencies multiplies 10- 20-cycle latency 32-bit 64-bit integers respectively whereas divides 69- 133-cycle latency 32-bit 64-bit integers respectively instructions single cycle latency alu adder also used calculating virtual addresses loads stores branches load store instructions executed integer pipeline access on-chip 8 kb data cache r4000 on-die ieee 754-1985-compliant floating-point unit fpu referred r4010 fpu coprocessor designated cp1 mips isa defined four coprocessors designated cp0 cp3 fpu operate two modes 32- 64-bit selected setting bit fr bit cpu status register 32-bit mode 32 floating-point registers become 32 bits wide used hold single-precision floating-point numbers used hold double-precision numbers 16 floating-point registers registers paired fpu operate parallel alu unless data resource dependency causes stall contains three sub-units adder multiplier divider multiplier divider execute instruction parallel adder use adder final stages execution thus imposing limits overlapping execution thus certain conditions execute three instructions time one unit fpu capable retiring one instruction per cycle adder multiplier pipelined multiplier four-stage multiplier pipeline clocked twice clock frequency microprocessor adequate performance uses dynamic logic achieve high clock frequency division 23- 36-cycle latency single- double-precision operations square-root 54- 112-cycle latency division square-root uses srt algorithm memory management unit mmu uses 48-entry translation lookaside buffer translate virtual addresses r4000 uses 64-bit virtual address implements 40 64-bits 1 tb virtual memory remaining bits checked ensure contain zero r4000 uses 36-bit physical address thus able address 64 gb physical memory r4000 sc mc configurations supports external secondary cache capacity 128 kb 4 mb cache accessed via dedicated 128-bit data bus secondary cache configured either unified cache split instruction data cache latter configuration cache capacity 128 kb 2 mb secondary cache physically indexed physically tagged programmable line size 128 256 512 1,024 bytes cache controller on-die cache built standard static random access memory sram data tag buses ecc-protected r4000 uses 64-bit system bus called sysad bus sysad bus address data multiplexed bus used set wires transfer data addresses reduces bandwidth also less expensive providing separate address bus requires pins increases complexity system sysad bus configured operate half third quarter internal clock frequency sysad bus generates clock signal dividing operating frequency r4000 contains 1.2 million transistors designed 1.0 µm two-layer metal complementary metal–oxide–semiconductor cmos process mips fabless company r4000 fabricated partners processes 0.8 µm minimum feature size r4000 generates various clock signals master clock signal generated externally operating frequency r4000 multiplies master clock signal two use on-die phase-locked loop pll r4000pc packaged 179-pin ceramic pin grid array cpga r4000sc r4000mc packaged 447-pin ceramic staggered pin grid array spga pin r4000mc different r4000sc pins unused r4000sc used signals implement cache coherency r4000mc pin-out r4000pc similar pga-packaged r4200 r4600 microprocessors characteristic enables properly designed system use three microprocessors r4400 development r4000 announced early november 1992 samples microprocessor shipped selected customers general availability january 1993 r4400 operates higher clock frequencies 100 133 150 200 250 mhz major improvement r4000 larger primary caches doubled capacity 16 kb 8 kb contained 2.3 million transistors r4400 licensed integrated device technology idt lsi logic nec performance semiconductor siemens ag toshiba idt nec siemens toshiba fabricated marketed microprocessor lsi logic used r4400 custom products performance semiconductor sold logic division cypress semiconductor mips microprocessor products discontinued nec marketed version vr4400 first version 150 mhz part announced november 1992 early versions fabricated 0.6 µm process mid-1995 250 mhz part began sampling fabricated 0.35 µm four-layer-metal process nec also produced mr4401 ceramic multi-chip module mcm contained vr4400sc ten 1 mbit sram chips implemented 1 mb secondary cache mcm pin-compatible r4x00pc first version 150 mhz part announced 1994 1995 200 mhz part announced toshiba marketed version tc86r4400 200 mhz part containing 2.3 million transistors measuring 134 mm fabricated 0.3 µm process introduced mid-1994 r4400pc priced 1,600 r4400sc 1,950 r4400mc 2,150 quantities 10,000 r4400 used r4000 r4400 require external core logic interface system commercially available proprietary core logic developed microprocessors proprietary designs developed system vendors sgi use systems commercial chipsets developed acer mips microprocessors fabricators nec toshiba acer developed pica chipset toshiba developed tiger shark chipset adapted sysad bus i486-compatible system bus | [
2903,
4755,
5804,
6074,
551,
6256,
8066,
1727,
5208,
1452,
6865,
5917,
5822,
3188,
5735,
5737,
4234,
650,
5740,
4959,
5055,
7010,
1112,
4799,
1023,
4816,
2248,
4365,
5521,
2699,
4368,
4370,
3747,
7499,
4372,
3156,
4099,
441,
2617,
536,
... | Train |
4,371 | 4 | Blue_Pill_(software):blue pill software blue pill codename rootkit based x86 virtualization blue pill originally required amd-v pacifica virtualization support later ported support intel vt-x vanderpool well designed joanna rutkowska originally demonstrated black hat briefings august 3 2006 reference implementation microsoft windows vista kernel name reference red pill blue pill concept 1999 film matrix blue pill concept trap running instance operating system starting thin hypervisor virtualizing rest machine previous operating system would still maintain existing references devices files nearly anything including hardware interrupts requests data even system time could intercepted fake response sent hypervisor original concept blue pill published another researcher ieee oakland may 2006 name vmbr virtual-machine based rootkit joanna rutkowska claims since detection program could fooled hypervisor system could 100 undetectable since amd virtualization seamless design virtualized guest supposed able query whether guest therefore way blue pill could detected virtualization implementation functioning specified assessment repeated numerous press articles disputed amd issued statement dismissing claim full undetectability security researchers journalists also dismissed concept implausible virtualization could detected timing attack relying external sources time 2007 group researchers led thomas ptacek matasano security challenged rutkowska put blue pill rootkit detector software year black hat conference deal deemed no-go following rutkowska request 384,000 funding prerequisite entering competition rutkowska alexander tereshkin countered detractors claims subsequent black hat speech arguing proposed detection methods inaccurate source code blue pill since made public following license unauthorized use including publishing distribution software requires valid license copyright holder software provided educational use black hat training conference red pill technique detect presence virtual machine also developed joanna rutkowska | [
1594,
5765,
3486,
6823
] | Test |
4,372 | 3 | R8000:r8000 r8000 microprocessor chipset developed mips technologies inc. mti toshiba weitek first implementation mips iv instruction set architecture r8000 also known tfp tremendous floating-point name development development r8000 started early 1990s silicon graphics inc. sgi r8000 specifically designed provide performance circa 1990s supercomputers microprocessor instead central processing unit cpu built many discrete components gate arrays time performance traditional supercomputers advancing rapidly reduced instruction set computer risc microprocessors predicted risc microprocessors would eventually match performance expensive larger supercomputers fraction cost size making computers level performance accessible enabling deskside workstations servers replace supercomputers many situations first details r8000 emerged april 1992 announcement mips computer systems detailing future mips microprocessors march 1992 sgi announced acquiring mips computer systems became subsidiary sgi called mips technologies inc. mti mid-1992 development r8000 transferred mti continued r8000 expected introduced 1993 delayed mid-1994 first r8000 75 mhz part introduced 7 june 1994 priced us 2,500 time mid-1995 90 mhz part appeared systems sgi r8000 high cost narrow market technical scientific computing restricted market share although popular intended market largely replaced cheaper generally better performing r10000 introduced january 1996 users r8000 sgi used power indigo2 workstation power challenge server power challengearray cluster power onyx visualization system november 1994 top500 list 50 systems 500 used r8000 highest ranked r8000-based systems four power challenges positions 154 157 18 r8000s chip set consisted r8000 microprocessor r8010 floating-point unit two tag rams streaming cache r8000 superscalar capable issuing four instructions per cycle executes instructions program order five-stage integer pipeline r8000 controlled chip set executed integer instructions contained integer execution units integer register file primary caches hardware instruction fetch branch prediction translation lookaside buffers tlbs stage one four instructions fetched instruction cache instruction cache 16 kb large direct-mapped virtually tagged virtually indexed 32-byte line size instruction decoding register reads occur stage two branch instructions resolved well leading one-cycle branch mispredict penalty load store instructions begin execution stage three integer instructions stage four integer execution delayed stage four integer instructions use result load operand may issued cycle load results written integer register file stage five integer register file nine read ports four write ports four read ports supply operands two integer execution units branch unit considered part integer unit another four read ports supply operands two address generators four ports needed rather two base register index register address style added mips iv isa r8000 issues one integer store per cycle one final read port delivers integer store data two register file write ports used write results two integer functional units r8000 issues two integer loads per cycle two write ports used write results integer loads register file level 1 data cache organized two redundant arrays one read port one write port integer stores written arrays two loads could processed parallel one array integer functional units consisted two integer units shift unit multiply-divide unit two address generator units multiply divide instructions executed multiply-divide unit pipelined result latency multiply instruction four cycles 32-bit operands six cycles 64-bit latency divide instruction depends number significant digits result thus varies 21 73 cycles loads stores begin execution stage three r8000 two address generation units agus calculate virtual address loads stores stage four virtual addresses translated physical addresses dual-ported tlb contains 384 entries three-way set associative 16 kb data cache accessed cycle dual-ported accessed via two 64-bit buses service two loads one load one store per cycle cache protected parity error correcting code ecc event cache miss data must loaded streaming cache eight-cycle penalty cache virtually indexed physically tagged direct mapped 32-byte line size uses write-through allocate protocol loads hit data cache result written integer register file stage five r8010 executed floating-point instructions provided instruction queue r8000 queue decoupled floating-point pipeline integer pipeline implementing limited form out-of-order execution allowing floating-point instructions execute possible integer instructions group issued pipelines decoupled help mitigate streaming cache latency contained floating-point register file load queue store queue two identical floating-point units instructions except divide square-root pipelined r8010 implements iterative division square-root algorithm uses multiplier key part requiring pipeline stalled unit duration operation arithmetic instructions except compares four-cycle latency single double precision divides latencies 14 20 cycles respectively single double precision square-roots latencies 14 23 cycles respectively streaming cache external 1 16 mb cache serves r8000 l2 unified cache r8010 l1 data cache operates clock rate r8000 built commodity synchronous static rams scheme used attain sustained floating point performance requires frequent access data small low-latency primary cache would contain enough data frequently miss necessitating long latency refiles reduce performance streaming cache two-way interleaved two independent banks containing data even odd addresses therefore perform two reads two writes read write every cycle provided two accesses separate banks bank accessed via two 64-bit unidirectional buses one reads writes scheme used avoid bus turnover required bidirectional buses avoiding bus turnover cache read one cycle written next cycle without intervening cycle turnover resulting improved performance streaming cache tags contained two tag ram chips one bank chips contain identical data chip contains 1.189 mbit cache tags implemented four-transistor sram cells chips implemented 0.7 μm bicmos process two levels polysilicon two levels aluminium interconnect bicmos circuitry used decoders combined sense amplifier comparator portions chip reduce cycle time tag ram 14.8 mm 14.8 mm large packaged 155-pin cpga dissipates 3 w 75 mhz addition providing cache tags tag rams responsible streaming cache four-way set associative avoid high pin count cache tags four-way set associative logic selects set access lookup instead usual way implementing set-associative caches access streaming cache pipelined mitigate latency pipeline five stages stage one addresses sent tag rams accessed stage two stage three signals tag rams propagate ssrams stage four ssrams accessed data returned r8000 r8010 stage five r8000 contained 2.6 million transistors measured 17.34 mm 17.30 mm 299.98 mm² r8010 contained 830,000 transistors total two chips contained 3.43 million transistors fabricated toshiba vhmosiii process 0.7 µm triple-layer metal complementary metal–oxide–semiconductor cmos process packaged 591-pin ceramic pin grid array cpga packages chips used 3.3 v power supply r8000 dissipated 13 w 75 mhz | [
2903,
5804,
6074,
4847,
551,
5208,
6865,
5917,
5737,
4234,
650,
5740,
4959,
1012,
5055,
7010,
1023,
2248,
4365,
4368,
4370,
3747,
7499,
4202,
536,
2443
] | Test |
4,373 | 3 | Macintosh_IIcx:macintosh iicx macintosh iicx personal computer designed manufactured sold apple computer inc. march 1989 march 1991 introduced half year macintosh iix iicx resembles iix great extent provides performance seven inches narrower ten pounds lighter somewhat quieter due smaller internal fan relative compactness results three nubus slots available compared six iix new case apple first designed operate either horizontal vertical orientation remained use successors macintosh iici quadra 700 idea vertical orientation one first minitower cases suggested apple ceo john sculley running space desk despite fact new layout actually took space monitor taken account model designated iicx compact echoing earlier apple iic compact model apple ii series x apple designation 68030 processor users liked mac iicx part components parts ram nubus slots power supply snapped place inside case without need screws one central safety screw tied assembly together though often reinstalled ever removed iicx introduction jean-louis gassée demonstrated iicx modular design assembling one parts front audience made less expensive build easier repair earned heavy praise warm reception amongst mac community machine also lightest apple lineup time however unlike ii iix cpu soldered logic board therefore upgraded case also unable accommodate 5 1/4 full-height hard disk drives model superseded macintosh iici used case | [
7890,
5732,
722,
1094,
2926,
5037,
5752,
405,
2954,
7572,
6482,
6142,
7226,
2978,
7601,
4749,
5097,
3346,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
6200,
6202,
3387,
3390,
1216,
2331,
4820,
4453,
1234,
1237,
7311,
889,
550,
552,
59... | Test |
4,374 | 4 | Screened_subnet:screened subnet network security screened subnet refers use one logical screening routers firewall define three separate subnets external router sometimes called access router separates external network perimeter network internal router sometimes called choke router separates perimeter network internal network perimeter network also called border network demilitarized zone dmz intended hosting servers sometimes called bastion hosts accessible access internal external networks purpose screened subnet dmz establish network heightened security situated external presumed hostile network internet extranet internal network screened subnet essential concept e-commerce entity presence world wide web using electronic payment systems network services prevalence hackers advanced persistent threats computer worms botnets threats networked information systems separating firewall system two separate component routers achieves greater potential throughput reducing computational load router component router screened subnet firewall needs implement one general task router less complex configuration screened subnet dmz also achieved single firewall device three network interfaces term demilitarized zone military context refers area treaties agreements contending groups forbid military installations activities often along established frontier boundary two military powers alliances similarity network security screened network dmz reduced fortifications intended points ingress external network presumed hostile appears term demilitarized zone dmz popularized sales marketing term sometime development screened routers firewalls often used synonym may different meaning whereas screened subnet firewall employs two screened routers create three subnets screened host firewall employs one screened router define two subnets external network internal network screened subnet firewall secure intruder must traverse two filtered routes reach internal network bastion dmz host compromised intruder must still bypass second filtered route reach internal network hosts | [
5014,
651,
6779,
84,
3449
] | Validation |
4,375 | 6 | YAFFS:yaffs yaffs yet another flash file system designed written charles manning whitecliffs new zealand company aleph one yaffs1 first version file system designed then-current nand chips 512 byte page size 16 byte spare oob out-of-band area work started 2002 first released later year initial work sponsored toby churchill ltd brightstar engineering older chips also generally allow 2 3 write cycles per page yaffs takes advantage dirty pages marked writing specific spare area byte newer nand flash chips larger pages first 2k pages 64 bytes oob later 4k stricter write requirements page within erase block 128 kilobytes must written sequential order page must written designing storage system enforces write rule write property several advantages yaffs2 designed accommodate newer chips based yaffs1 source code major difference internal structures fixed assume 512 byte sizing block sequence number placed written page way older pages logically overwritten without violating write rule released late 2003 yaffs robust log-structured file system holds data integrity high priority secondary yaffs goal high performance yaffs typically outperform alternatives also designed portable used linux wince psos rtems ecos threadx various special-purpose oses variant 'yaffs/direct used situations os embedded oses bootloaders core filesystem simpler interfacing higher lower level code nand flash hardware yaffs codebase licensed gpl per-product licenses available aleph one special procedure initialize yaffs filesystem beyond simply erasing flash memory bad block encountered yaffs follows smart media scheme marking fifth byte block spare area blocks marked remain unallocated write file data yaffs initially writes whole page chunk yaffs terminology describes file metadata timestamps name path etc new file assigned unique object id number every data chunk within file contain unique object id within spare area yaffs maintains tree structure ram physical location chunks chunk longer valid file deleted parts file overwritten yaffs marks particular byte spare area chunk ‘ dirty ’ entire block 32 pages marked dirty yaffs erase block reclaim space filesystem free space low yaffs consolidates group good pages onto new block yaffs reclaims space used dirty pages within original blocks yaffs system mounts nand flash device must visit block check valid data scanning spare area information reconstitutes memory-resident tree data structure yaffs2 similar concept yaffs1 shares much code yaffs2 code base supports yaffs1 data formats backward compatibility main difference yaffs2 needs jump significant hoops meet write requirement modern nand flash yaffs2 marks every newly written block sequence number monotonically increasing sequence chunks inferred block sequence number chunk offset within block thereby yaffs2 scans flash detects multiple chunks identical objectids chunknumbers choose use taking greatest sequence number efficiency reasons yaffs2 also introduces concept shrink headers example file resized smaller size yaffs1 mark affected chunks dirty yaffs2 due write rule yaffs2 instead writes shrink header indicates certain number pages point invalid lets yaffs2 reconstruct final state filesystem system reboots yaffs2 uses abstract definition nand flash allowing used wider variety flash parts different geometries bad block handling rules etc yaffs2 later added support checkpointing bypasses normal mount scanning allowing fast mount times performance vary mount times 3 seconds 2 gb reported | [
3599,
2547,
7161,
4672,
3270,
6431,
3626,
5049,
6117,
759,
5775,
7581,
6854,
5437,
6500,
6505,
5457,
460,
1534,
5110,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
27... | Test |
4,376 | 2 | Apple_Developer:apple developer apple developer formerly apple developer connection adc apple inc. developer network designed make available resources help software developers write software macos tvos watchos ios platforms applications created xcode programs created apple inc.. ios applications uploaded app store ios watchos applications attached ios applications tvos applications uploaded app store tvos mac applications ’ common find world wide web download app store macos several leaks secret apple software prerelease program notably mac os x 10.4 tiger leaks apple sued three men allegedly leaked mac os x 10.4 prerelease builds bittorrent os x lion os x mountain lion os x mavericks leaked several times well however combat issue apple installed alert system preview builds alerting uploaded tester bittorrent system july 18 2013 intruder attempted access sensitive personal information apple developer servers information encrypted apple could guarantee information developers may accessed developer website taken maintenance thursday said undergoing maintenance sunday apple posted notice site notifying users attempted hack stated re-building servers developer system prevent happening future | [
6788,
7890,
4320,
4690,
734,
5752,
405,
6125,
2954,
6847,
4003,
6142,
2609,
1897,
84,
5091,
5450,
4749,
7601,
6165,
3001,
7259,
120,
1940,
2300,
3025,
499,
502,
2679,
2327,
6565,
2331,
3050,
163,
1599,
1234,
3412,
7308,
889,
6971,
552,
... | Validation |
4,377 | 2 | Windows_10_version_history:windows 10 version history windows 10 operating system developed microsoft microsoft described windows 10 operating system service would receive ongoing updates features functionality augmented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches five-year lifespan mainstream support terry myerson executive vice president microsoft windows devices group said goal model reduce fragmentation across windows platform windows 10 insider preview builds delivered insiders three different rings insiders fast ring receive updates prior slow ring might experience bugs issues insiders release preview ring receive updates version almost available public comparatively stable mainstream builds windows 10 labeled yymm yy representing two-digit year mm representing month planned release example version 1507 refers builds initially released july 2015 original version windows 10 codenamed threshold 1 retroactively named version 1507 released july 2015 carries build number 10.0.10240 microsoft stated designated release manufacturing rtm build windows 10 build 10240 described rtm build various media outlets retroactively named version 1507 microsoft per naming conventions future stable releases operating system notable changes version include final release made available windows insiders july 15 2015 followed public release july 29 2015 support version 1507 ended may 9 2017 devices current branch current branch business however devices configured receive updates current branch current branch business continued receive updates june 27 2018 windows 10 november update also known version 1511 codenamed threshold 2 first major update windows 10 second version operating system carries build number 10.0.10586 new features version windows 10 include first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 unlike initial release windows branch also made available existing windows phone 8.1 devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile devices support version users current branch cb current branch business cbb ended october 10 2017 last public update released april 10 2018 enterprise education versions windows 10 anniversary update also known version 1607 codenamed redstone 1 second major update windows 10 first series updates redstone codenames carries build number 10.0.14393 first preview released december 16 2015 final release made available windows insiders july 18 2016 followed public release august 2 release windows 10 supported users current branch cb current branch business cbb long-term support branch ltsb windows 10 creators update also known version 1703 codenamed redstone 2 third major update windows 10 second series updates redstone codenames carries build number 10.0.15063 first preview released insiders august 11 2016 final release made available windows insiders march 20 2017 followed public release april 5 via update assistant began roll april 11 windows 10 fall creators update also known version 1709 codenamed redstone 3 fourth major update windows 10 third series updates redstone codenames carries build number 10.0.16299 first preview released insiders april 7 2017 final release made available windows insiders september 26 2017 released public october 17 windows 10 april 2018 update also known version 1803 codenamed redstone 4 fifth major update windows 10 fourth series updates redstone codenames carries build number 10.0.17134 first preview released insiders august 31 2017 final release made available windows insiders april 16 2018 followed public release april 30 began roll may 8 windows 10 october 2018 update also known version 1809 codenamed redstone 5 sixth major update windows 10 fifth series updates redstone codenames carries build number 10.0.17763 first preview released insiders february 14 2018 update originally made available public consumers october 2 2018 rollout halted october 6 2018 due serious bug deletes users personal files updating october 9 2018 microsoft re-released update insiders stating known issues update including file deletion bug identified fixed october 25 2018 microsoft confirmed existence another bug overwrites files without confirmation extracting zip file zip bug fixed insiders october 30 2018 public rollout update resumed november 13 2018 windows 10 may 2019 update also known version 1903 codenamed 19h1 seventh major update windows 10 first use descriptive codename including year order released instead redstone threshold codename first preview released insiders opted exclusive skip ahead ring july 25 2018 update began rolling may 21 2019. notable changes may 2019 update include next feature release windows 10 codenamed 19h2 eighth major update windows 10 second use descriptive codename update intended delivered cumulative update may 2019 update first preview released insiders opted slow ring july 1 2019 next feature release windows 10 codenamed 20h1 ninth major update windows 10 third use descriptive codename first preview released insiders opted exclusive skip ahead ring february 14 2019 | [
1812,
3937,
3263,
378,
2196,
2198,
6092,
6427,
6096,
4687,
1097,
1475,
6110,
7553,
5410,
7564,
422,
6844,
6136,
2245,
7214,
5781,
432,
435,
5442,
4377,
4017,
3340,
444,
5090,
5794,
447,
7602,
448,
6164,
458,
4759,
7616,
1534,
6885,
1536... | Validation |
4,378 | 7 | Optical_mesh_network:optical mesh network optical mesh network type optical telecommunications network employing wired fiber-optic communication wireless free-space optical communication mesh network architecture optical mesh networks use fiber-optic communication operated internet service providers metropolitan regional also national international scenarios faster less error prone network architectures support backup recovery plans established networks case disaster damage failure currently planned satellite constellations aim establish optical mesh networks space using wireless laser communication transport networks underlying optical fiber-based layer telecommunications networks evolved digital cross connect system dcs -based mesh architectures 1980s sonet/sdh synchronous optical networking/synchronous digital hierarchy ring architectures 1990s dcs-based mesh architectures telecommunications carriers deployed restoration systems ds3 circuits fastar fast automatic restoration mci real time restoration rtr restoring circuits minutes network failure sonet/sdh rings carriers implemented ring protection sonet unidirectional path switched ring upsr also called sub-network connection protection scnp sdh networks sonet bidirectional line switched ring blsr also called multiplex section shared protection ring ms-spring sdh networks protecting recovering network failure 50 ms less significant improvement recovery time supported dcs-based mesh restoration key driver deployment sonet/sdh ring-based protection attempts improving and/or evolving traditional ring architectures overcome limitations trans-oceanic ring architecture defined itu-t rec g.841 p-cycles protection next-generation sonet/sdh equipment handle multiple rings ability close working protection ring side share protection capacity among rings e.g. virtual line switched ring vlsr technological advancements optical transport switches first decade 21st century along continuous deployment dense wavelength-division multiplexing dwdm systems led telecommunications service providers replace sonet ring architectures mesh-based architectures new traffic new optical mesh networks support fast recovery previously available ring networks achieving better capacity efficiency resulting lower capital cost fast recovery tens hundreds milliseconds case failures e.g. network link node failure achieved intelligence embedded new optical transport equipment allows recovery automatic handled within network part network control plane without relying external network management system optical mesh networks refer transport networks built directly mesh-like fiber infrastructure deployed metropolitan regional national international e.g. trans-oceanic areas deploying optical transport equipment capable switching traffic wavelength sub-wavelength level incoming fiber outgoing fiber addition switching wavelengths equipment typically also able multiplex lower speed traffic wavelengths transport groom traffic long equipment so-called opaque see subsection transparency finally equipment also provide recovery traffic case network failure transport networks evolve toward mesh topologies utilizing intelligent network elements optical cross-connects optical switches provisioning recovery services new approaches developed design deployment operations management mesh optical networks optical switches build companies sycamore ciena sts-1 granularity switching tellium sts-48 granularity switching deployed operational mesh networks calient built all-optical switches based 3d mems technology optical mesh networks today provide trunking capacity higher-layer networks inter-router inter-switch connectivity ip mpls ethernet-centric packet infrastructure also support efficient routing fast failure recovery high-bandwidth point-to-point ethernet sonet/sdh services several planned satellite constellations spacex starlink intended global internet provisioning aim establish optical mesh networks space constellations consisting several hundred thousand satellites use laser communication high-throughput optical inter-satellite links interconnected network architecture allows direct routing user data satellite satellite enables seamless network management continuity service optical mesh networks support establishment circuit-mode connection-oriented services multiple recovery mechanisms provide different levels protection restoration different failure modes available mesh networks channel- link- segment- path- protection common protection schemes p-cycles another type protection leverages extends ring-based protection restorationis another recovery method work complement faster protection schemes case multiple failures path-protected mesh networks connections unprotected others protected single multiple failures various ways connection protected single failure defining backup path diverse primary path taken connection mesh network backup path associated resources dedicated connection dedicated backup path protection aka dedicated 1+1 path protection subnetwork connection protection sncp sdh networks upsr sonet ring networks shared among multiple connections shared backup path protection typically ones whose primary paths likely fail time thereby avoiding contention shared resources case single link node failure number protection schemes use pre-emptible paths partially diverse backup paths implemented finally multiple diverse routes designed connection multiple recovery routes recover even multiple failures examples mesh networks across atlantic pacific oceans traditional transport networks made optical fiber-based links telecommunications offices multiple wavelengths multiplexed increase capacity fiber wavelengths terminated electronic devices called transponders undergoing optical-to-electrical conversion signal reamplification reshaping retiming 3r inside telecommunications office signals handled switched transport switch aka optical cross-connect optical switch either dropped office directed outgoing fiber link carried wavelengths multiplexed fiber link towards next telecommunications office act going optical-electrical-optical o-e-o conversion telecommunications office causes network considered opaque incoming wavelengths undergo optical-to-electrical conversion switched telecommunications office optical domain using all-optical switches also called photonic cross-connect optical add-drop multiplexer reconfigurable optical add-drop multiplexer roadm systems network considered transparent hybrid schemes leverage optical bypasses provide limited o-e-o conversions key locations across network referred translucent networks roadm-based transparent optical mesh networks deployed metropolitan regional networks since mid-2000s early 2010s operational long distance networks still tend remain opaque transmission limitations impairments prevent extension transparency beyond certain point routing key control operational aspect optical mesh networks transparent all-optical networks routing connections tightly linked wavelength selection assignment process so-called routing wavelength assignment rwa due fact connection remains wavelength end-to-end throughout network sometimes referred wavelength continuity constraint absence devices translate wavelengths optical domain opaque network routing problem one finding primary path connection protection needed backup path diverse primary path wavelengths used link independently several algorithms used combined determine primary path diverse backup path without sharing resource along backup path connection service shortest path including dijkstra algorithm k-shortest path yen algorithm edge node-diverse disjoint routing including suurballe algorithm numerous heuristics general however problems optimal routing dedicated backup path protection arbitrary shared risk link groups srlgs shared backup path protection np-complete deployment optical mesh networks enabling new services applications service providers offer customers also supports new network paradigms mesh networking general wireless mesh networking particular telecommunications networking telecommunications equipment packet networking connection-oriented networking availability | [
3821,
1738,
6987,
3724,
6335,
1916,
1844,
7543,
2117,
1988
] | Test |
4,379 | 6 | TeraCopy:teracopy teracopy freemium file transfer utility designed alternative built-in windows explorer file transfer feature focus data integrity file transfer reliability ability pause resume file transfers teracopy uses dynamically adjusted buffers reduce seek times asynchronous copy speeds file transfer two physical hard drives processes paused resumed case transfer errors teracopy try several times skips faulty file proceeds rest operation teracopy also shows failed file transfers allows user fix problem recopy problematic files teracopy offers explanation skipped files simply reports skipped may skip copying numerous reasons user could correct known too-long file name teracopy replace windows explorer copy move functions author asserts full unicode support teracopy example freemium licensing model basic edition offered freeware may used non-commercial environments teracopy pro shareware version utility adds additional features list favorite folders used copy destination ability modify copy queue 2007 ionut ilascu softpedia.com commended utility ability error recovery functionality concluded teracopy lot faster windows explorer xp proper defragmentation vista moves tad slower even defragmentation disk performed 2009 jason fitzpatrick lifehacker praised usability stating n't overwhelm plethora settings options also called advanced enough subsequently lifehacker visitors voted teracopy large margin best windows file copier four contestants 2010 review cnet called nifty piece freeware recommended windows users | [
73,
5571,
7046
] | Test |
4,380 | 2 | List_of_BlackBerry_products:list blackberry products following partial list blackberry products blackberry line wireless handheld devices first introduced 1996 manufactured canadian company blackberry formerly known research motion rim two-way pager models thumb keyboards thumbwheel scrolling monochrome text display first model inter ctive pager announced september 18 1996 within year yankee group estimating devices like inter ctive pager use fewer 400,000 people expected two-way wireless messaging services attract 51 million users 2002 provided e-mail wap services limited html access provided via third party software wolfetech pocketgenie goamerica browser built use two 1g data-only packet switched networks mobitex datatac support java without use java virtual machine add-on models first blackberry models built-in mobile phone first models natively ran java transmitted data normal 2g cellular network rim began advertise devices email-capable mobile phones rather two-way pagers time primary market still businesses rather consumers 5810 released march 4 2002 aberration list 5790 released much later date niche model 2004 many color blackberry models non-phone blackberry made available due demand java-based model could run mobitex data-only network 5810/5820 shared physical casing keyboard layout earlier 957 device 6000 series launched 2003 6210 entering influential time time 100 gadgets list 2003 monochrome models revised include color screen retaining form factor casing early color models 7230 typically used dim electroluminescent backlight leading initial reputation poor image quality later color models 7290 typically used led backlight yielding much better screen quality color lcd screens used series either reflective transflective screens yielded better image quality direct sunlight even backlight turned nearly models list 16 mb models bluetooth model 32 mb bluetooth 7290 last model released early blackberry form factor first blackberry model bluetooth 7290 also first quad-band blackberry aberration list 7270 first wi-fi blackberry released later built old form factor vein 7200 series rim expanded market introducing first blackberry models without discrete qwerty keyboard candybar form factor developed predictive text technology called suretype qwerty-like layout using two keys per button using two letters per button rather three letters per button t9 using ten-digit keypads predictive text accuracy could improved dramatically use qwerty-like layout took advantage people memory computer keyboard since button roughly relative key time size blackberry could dramatically reduced keyboards needed 5-buttons wide rather 10-buttons wide blackberries became popular mass market became similarly sized competing consumer-market cellphones models among first blackberry models aggressively marketed consumers rather businesses rim continued manufacture qwerty models give market choice traditional qwerty thumb keyboard compressed suretype keyboard beginning 8700-series models 2006 rim began aggressively add consumer features blackberry models aim capture consumer market competitors treo motorola q progression models additions include better quality screens memory built-in chat software first cameraphone microsd memory card slot built-in mapping software consumer-specific features blackberry pearl 8100 first blackberry without trackwheel replaced miniature trackball enable full 4-way mouse-style navigation blackberry look new trackball gave pearl name 9000 series launched 2008 | [
1544,
6550,
2048,
2795,
6336,
2233,
4101,
291
] | Test |
4,381 | 4 | The_Project_Formerly_Known_As_Kindle_Forkbomb:project formerly known kindle forkbomb project project formerly known kindle forkbomb work done swiss-austrian-american duo known ubermorgen artists known creative use digital media combined means performance various offline medium convey ideas project showcased ubermorgen website www.uuuuuuuntitled.com project name project formerly known kindle forkbomb broken better understand meaning behind work forkbomb term used computing describing attack computer process continuously self-replicates machine resources depleted system crashes art project depicts machine process strips comments youtube uses algorithm compile comments finally titling work video title respective uploader make book book uploaded kindle publishing service placed kindle store machine monitors books making sure enough sales made keep alive store n't thriving store machine directed purchase copies thus prolonging shelf-life using process artists message intent show easily could clog store rapidly multiplying number books hence kindle forkbomb example critique digital world problems poses merely demonstration makes easier visualize world live ubermorgen describes media created human-machine combination creation new genre decentralized fiction writing artist group says books compressed form contemporary world describe snapshot frozen time type work form art sometimes referred uncreative spurred famous writer kenneth goldsmith efforts uncreative writing examples works produced project one thing note cover books feature uploader video title underneath everything text string bash shell version computer forkbomb following reference link takes website aloud read full pdf version books one project similar stephanie barber american artist uses many forms media art project relates kindle forkbomb book titled night moves book grouping youtube comments bob seger song night moves | [] | Validation |
4,382 | 5 | Syslog:syslog computing syslog standard message logging allows separation software generates messages system stores software reports analyzes message labeled facility code indicating software type generating message assigned severity level computer system designers may use syslog system management security auditing well general informational analysis debugging messages wide variety devices printers routers message receivers across many platforms use syslog standard permits consolidation logging data different types systems central repository implementations syslog exist many operating systems syslog developed 1980s eric allman part sendmail project readily adopted applications since become standard logging solution unix-like systems variety implementations also exist operating systems commonly found network devices routers syslog originally functioned de facto standard without authoritative published specification many implementations existed incompatible internet engineering task force documented status quo rfc 3164 standardized rfc 5424 various companies attempted claim patents syslog implementations little effect use standardization protocol information provided originator syslog message includes facility code severity level syslog software adds information information header passing entry syslog receiver components include originator process id timestamp hostname ip address device facility code used specify type program logging message messages different facilities may handled differently list facilities available defined standard mapping facility code keyword uniform different operating systems syslog implementations list severities also defined standard meaning severity levels emergency debug relative application example purpose system process transactions update customer account balance information error final step assigned alert level however error occurring attempt display zip code customer may assigned error even warning level server process handles display messages usually includes lower severe levels display less severe levels requested messages separated individual severity warning level entry also included filtering notice info debug messages rfc 3164 message component known msg specified fields tag name program process generated message content contains details message described rfc 5424 msg called content rfc 3164 tag part header single field tag split app-name procid msgid totally resemble usage tag provides functionality cases popular syslog tools rsyslog conform new standard content field encoded utf-8 character set octet values traditional ascii control character range avoided generated log messages may directed various destinations including console files remote syslog servers relays implementations provide command line utility often called logger well software library send messages log display monitor collected logs one needs use client application access log file directly system basic command line tools tail grep log servers configured send logs network addition local files implementations include reporting programs filtering displaying syslog messages operating network syslog uses client-server architecture server listens well-known registered port protocol requests clients historically common transport layer protocol network logging user datagram protocol udp server listening port 514 udp lacks congestion control mechanisms support transport layer security required implementations recommended general use transmission control protocol tcp port 6514 since process application operating system written independently little uniformity payload log message reason assumption made formatting contents syslog message formatted rfc 5424 gives augmented backus–naur form abnf definition msg field network protocol simplex communication means acknowledging delivery originator various groups working draft standards detailing use syslog network security event logging proposed application within healthcare environment regulations sarbanes-oxley act pci dss hipaa many others require organizations implement comprehensive security measures often include collecting analyzing logs many different sources syslog format proven effective consolidating logs many open-source proprietary tools reporting analysis logs utilities exist conversion windows event log log formats syslog managed security service providers attempt apply analytical techniques artificial intelligence algorithms detect patterns alert customers problems syslog protocol defined request comments rfc documents published internet engineering task force internet standards following list rfcs define syslog protocol | [
362,
7796,
99,
6711,
5560,
3273,
5920,
7637,
3540,
2219,
6022,
664,
2858,
4341,
5951,
334,
1882,
5780,
7405,
1987,
4100,
4650
] | Test |
4,383 | 5 | Signaling_Compression:signaling compression signaling compression sigcomp compression method designed especially compression text-based communication data sip rtsp sigcomp originally defined rfc 3320 later updated rfc 4896 negative acknowledgement mechanism signaling compression defined rfc 4077 sigcomp work performed rohc working group transport area ietf sigcomp specifications describe compression schema located application layer transport layer e.g sip udp implemented upon virtual machine configuration executes specific set commands optimized decompression purposes namely udvm universal decompressor virtual machine one strong point sigcomp bytecode decode messages sent sigcomp allows use kind compression schema given expressed bytecode udvm thus sigcomp compatible device may use compression mechanisms exist released without firmware change additionally decoders may already standardised sigcomp may recall code needed sent connection assure message decodable requirement udvm code available compression messages executed virtual machine native code used independent system mechanism signal application conversation e.g given sip session compartment mechanism used given application may given number different independent conversations persisting session status needed/specified per compression schema udvm code | [
7170
] | Train |
4,384 | 2 | Ehcache:ehcache ehcache open source java distributed cache general purpose caching java ee ehcache available apache open source license ehcache developed greg luck starting 2003 2009 project purchased terracotta provides paid support software still open source new major functionalities fast restartability consistency available commercial products like enterprise ehcache bigmemory open source march 2011 wikimedia foundation announced would use ehcache improve performance wiki projects however quickly abandoned testing revealed problems approach name ehcache palindrome | [
1640,
2519,
3915,
3371,
5571,
6362,
1564
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.