node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,385
0
Zeta_distribution:zeta distribution probability theory statistics zeta distribution discrete probability distribution x zeta-distributed random variable parameter probability x takes integer value k given probability mass function ζ riemann zeta function undefined 1 multiplicities distinct prime factors x independent random variables riemann zeta function sum terms formula_8 positive integer k appears thus normalization zipf distribution terms zipf distribution zeta distribution often used interchangeably note zeta distribution probability distribution associated zipf law exponent see also yule–simon distribution zeta distribution defined positive integers formula_9 probability mass function given formula_11 parameter formula_12 riemann zeta function cumulative distribution function given formula_14 generalized harmonic number n th raw moment defined expected value x series right series representation riemann zeta function converges values s-n greater unity thus note ratio zeta functions well defined even n − 1 series representation zeta function analytically continued change fact moments specified series therefore undefined large n moment generating function defined series definition polylogarithm valid formula_19 taylor series expansion function necessarily yield moments distribution taylor series using moments usually occur moment generating function yields obviously well defined finite value since moments become infinite large n use analytically continued terms instead moments obtain series representation polylogarithm formula_23 formula_24 given h harmonic number ζ 1 infinite harmonic series case 1 meaningful however set positive integers density i.e exists n n number members less equal n equal density latter limit also exist cases density example set positive integers whose first digit density nonetheless second limit given exists proportional benford law zeta distribution constructed sequence independent random variables geometric distribution let formula_31 prime number formula_32 random variable geometric distribution parameter formula_33 namely formula_34 random variables formula_35 independent random variable formula_36 defined formula_37 zeta distribution formula_38 stated differently random variable formula_39 infinitely divisible lévy measure given following sum dirac masses formula_40 power-law distributions
[ 2611, 7348 ]
Test
4,386
4
Comparison_of_backup_software:comparison backup software feature comparison backup software general comparison see list backup software
[ 1910, 6606, 891, 7801, 2101, 4594, 5382, 7258, 2566, 1281, 2936, 3720, 6917, 2682, 2430, 8029, 3827, 6859, 7046, 2082, 5889 ]
Validation
4,387
3
Uptime:uptime uptime measure system reliability expressed percentage time machine typically computer working available uptime opposite downtime often used measure computer operating system reliability stability time represents time computer left unattended without crashing needing rebooted administrative maintenance purposes conversely long uptime may indicate negligence critical updates require reboots platforms 2005 novell reported server 6-year uptime although might sound unusual actually common servers maintained industrial context host critical applications banking systems netcraft maintains uptime records many thousands web hosting computers server running novell netware reported shut 16 years uptime due failing hard disk versions microsoft windows include uptime field windows task manager performance tab format hh mm ss days hours minutes seconds output codice_1 command includes system time system boot time field exact text format dependent language locale time given codice_1 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_3 command codice_4 sub-command provides date time computer started codice_5 codice_6 variants command codice_7 shorthand codice_6 exact text date format dependent configured language locale uptime determined via windows management instrumentation wmi querying codice_9 property codice_10 class command prompt done using codice_11 command timestamp uses format codice_12 example computer last booted 8 may 2011 16:17:51.822 text lastbootuptime timestamp format vary language locale wmi also queried using variety application programming interfaces including vbscript powershell microsoft formerly provided downloadable utility called codice_13 reports elapsed time days hours minutes seconds time given codice_13 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_15 command also available freedos version developed m. aitchison users linux systems use bsd uptime utility also displays system load averages past 1 5 15 minute intervals shows long system since last restarted first number total number seconds system second number much time machine spent idle seconds multi core systems linux versions second number sum idle time accumulated cpu bsd-based operating systems freebsd mac os x sysvr4 uptime command see also method using sysctl call system last boot time openvms systems codice_16 command used dcl command prompt obtain system uptime first line resulting display includes system uptime displayed days followed hours minutes seconds following example command qualifier codice_17 suppresses display per-process detail lines information
[ 361, 362, 6789, 1812, 6088, 2204, 5735, 5738, 1112, 2589, 1140, 4020, 4759, 1537, 2999, 7979, 5480, 7637, 1554, 5138, 1213, 3417, 5181, 1992, 4464, 204, 207, 3106, 5571, 6997, 578, 923, 1655, 3797, 5234, 5942, 5946, 2048, 6658, 2811, 28...
Test
4,388
4
Trusted_Network_Connect:trusted network connect trusted network connect tnc open architecture network access control promulgated trusted network connect work group tnc-wg trusted computing group tcg tnc architecture first introduced rsa conference 2005 tnc originally network access control standard goal multi-vendor endpoint policy enforcement 2009 tcg announced expanded specifications extended specifications systems outside enterprise network additional uses tnc reported include industrial control system ics scada security physical security specifications introduced tnc work group partial list vendors adopted tnc standards also networking u.s. army planned use technology enhance security computer networks south carolina department probation parole pardon services tested tnc-scap integration combination pilot program
[ 496, 3764, 2723, 1698, 4482, 5511 ]
Test
4,389
3
Macintosh_Quadra_650:macintosh quadra 650 macintosh quadra 650 originally called macintosh centris 650 personal computer designed manufactured sold apple computer february 1993 september 1994 centris 650 introduced alongside smaller centris 610 replacement macintosh iici iivi quadra 700 intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers – quadra business lc education performa home – folded centris 650 quadra family quadra 650 discontinued without direct replacement september 1994 although recently introduced power macintosh 7100 iivx form factor 650 similar target audience sold price range standard equipment centris 650 models includes onboard video vga support via adapter 3 nubus slots processor direct slot two adb two serial ports external scsi connector four simm slots support 4 8 16 32 mb simms allowing maximum 132 136 mb ram depending configuration ethernet-capable models aaui port system 7.1 included standard minimum required version introduced february 10 1993 introduced october 21 1993
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 3346, 5100, 6165, 5463, 102, 5469, 4768, 3008, 5477, 2294, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 5...
Train
4,390
2
Open_source_in_Kosovo:open source kosovo first project open source kosovo adjustment open office packet december 2003 28 july 2004 albanian team users linux ggsl one first public organizations purpose getting information field open source conference called software freedom day software freedom day known first initiative foss kosovo level conference purpose conference promote free open software issues discussed linux free software open sources general another issue discussed conference operative system linux benefits kde gnome last issues discussed conference ati-kos made surveys five municipal assemblies kosovo may 2005 according survey 98.6 wanted software box mother tongue albanian another survey majority participants believed software box like open office would help increasing productivity different fields interface albanian free libre open source software kosova flossk floss kosova non-governmental organization established march 2009 promotes free open-source software initiative undertaken james michael dupont association volunteers kosovo first results organization seen august year faculty electrical computer engineering held first conference organization conference became tradition held every year conference resulted biggest conference region called “ software freedom kosova 2009 ” promoted free open-source software growth knowledge maps active members members around kosovo abroad february 2009 first person started teaching lessons operative system linux kosovo james micheal dupont courses held idi mainly concerned basic elements using linux benefits systems june year students continued teach lessons linux open street map one projects contributes mostly open source kosovo many members open street map community worked project companies like 'logisticplus companies well beginnings seen map made brod town brod town endangered environmental damages mountains sharri project introduced joachim bergerhoff told flossk un-habitat project flossk helped development project map created community included cities towns brod gjilan gjakovë ferizaj prizren pejë prishtinë interesting project also project shkodra 2010 community helped survivors flooding find streets project 'kumevotu.info project youngsters flossk less two weeks duty project help people find place vote project held 12 december 2010 dedicated especially elections year 2010 project based open street map user gives personal data interesting map find place vote project useful even youngsters participated creating olpc one attractive projects open source kosovo dedicated children olpc project dedicated poor places basic thing laptop used children learn system linux laptop based version fedora basic applications also equipped wifi people could browse internet learn new things project supported since first steps flossk different conferences project welcomed kosovo albanian community open source kosovo active field wikipedia wikimedia community dealing mainly promoting open knowledge wikipedia translating albanian made easier community informed everything initiative made flossk resulted 31,458 articles albanian language 2013 conference held called 'wikiacademykosovo direct way adding articles wikipedia project 'fedora one open source projects also active kosovo promoted distributed two ambassadors kosovo ardian haxha gent thaqi flossk association ambassadors fedras kosovo always organizes parties announce new versions mozilla firefox community active kosovo one projects flossk also promoting mozilla project ambassadors kosovo altin ukshini gent thaqi heroid shehu active promoting mozilla project kosovo also projects platform drupal flossk association unicef lab managed organize training project 6 may dave hall member free software counselor administrator systems australia participants trained knowledge drupal ways using developing cms 29 30 august 2009 first annual conference “ software freedom kosova 2009 ” held premises faculty engineering organized free libre open source software kosova flossk university pristina conference presented public figures world free open source software presented kosovo also james michael dupont – co-founder flossk conference promoted free open-source software also aim exchange experiences speakers audiences 40 topics lectures various fields ranging issues related wikipedia free encyclopedia linux intellectual property licenses building communities programming languages php python given features mentioned conference freely called one extensive southeast europe “ software freedom kosova 2010 ” held second time 25-26 september capital city kosovo prishtina sfk10 organized floss kosovo faculty electrical engineering computer fiek university pristina conference time last time focused 24 lectures kosovo region world main lecturers also guests honor conference renowned hacker fk10 prepared thanks job almost year organizing committee also topics also offered conference held premises faculty electrical computer engineering time spending tradition continued almost middle november exactly 12th 2011 organized next conference “ software freedom kosova 2011 ” one largest activities field 300 participants conference one successful held till local regional speakers full intensive day much topics touched world free software one held day focused topic “ business open source ” introductory remarks made public curious topics presented first half day second part day presentations finally long-awaited final presentation held omer keser google executive spoke google mobile applications detailing number users mobile devices numbers territories world development mobile phone use across different states conference focused aim meeting point network individuals companies sponsoring also initiating projects benefit people kosovo establishing one european centers floss soon possible result commercial benefits country aim could achieve kosovo businesses public introduce low cost alternatives rather expensive proprietary software promote respect legal licenses introduce public best methods localization software knowledge kind activity present lecturers business world use floss commercial development projects also present examples companies region using floss competitive leg outsourcing european market moreover presenting free code build helps entry level professionals companies build skills work leader towards value added projects open source software conference related developments knowledge culture mapping held prishtina kosovo largest conference kind region conference organized free libre open source kosova flossk kosovo association information oommunication technology ipko foundation faculty electrical engineering university pristina conference focused web technologies standards-based vendor html5 javascript like especially important consider recent developments global scene related touch-optimized applications mobile web fact software development kosovo centers web technologies conference held 8-9 september faculty electrical computer engineering prishtina software freedom kosova 2013 nonprofit conference 5th time edition organized flossk new details released regarding agenda speakers presented 7 september 2013 first day conference topics discussed include mobile open web hacker spaces data protection freelancing code sharing scaling cloud one first time changed traditional location organizing faculty education university pristina 170 participants many speakers welcome note done arianit dobroshi altin ukshini ardian haxha thankful anyone presented speakers donators lecture presented alex lakatos java script developer mozilla representative based cluj-napoca redon skikuli mozilla representative one co-founders design everview tirana arianit dobroshi one main member since beginning flossk arbnor hasani currently involved innovations lab kosovo design center ana risteska contributor gnome project burim shala wordpress theme developer two next days conference held place focused practical things participants like tuning postagre sql bert desmet awesome html5/css3 vleran dushi wordpress template development burim shala wmkit arduino workshop redon sikuli november 2004 klina municipality started project change computer network linux openoffice.org first part project charged firefox openoffice.org second part charged linux 3rd 6 november year 70 municipality computer network english language openoffice.org firefox albanian proliferation open source software products benefits many companies government kosovo costs significantly lower security higher undp foss club also trained municipal employees survey conducted end training 100 employees stated prefer software albanian language project translation openoffice.org albanian language started year undp foss team consisted members bulgaria kosovo 4 june 2010 richard stallman activist programmer free software visited kosovo lectured topic free digital society national library kosovo lecture freedom digital society threats welcomed large number participants lecture richard stallman mentioned many countries digital freedom directly violated denmark australia countries many webpages closed unclear reasons emphasized presence free software freedom educational institutions really necessary countries want advance societies use free software want dependent software pay also emphasized today meeting minister education kosovo offered help implementation free software schools kosovo help country develop free independent weak working project powerful give others also opportunity get knowledge freedom software richard stallman end richard stallman answered many questions put forth participants room 22-24 february faculty education near university pristina held first academy called wikiacademykosovo idea conference promote kosovo digital world emphasize good things new qualitative articles pictures wikimedia propaganda present kosovo threat idea kosovo country academy revealed articles cultural heritage social issue geography institutions economy tourism also starting point improve actual image kosovo number mentors wikipedia present event advised writers writings result writings became qualitative winners academy writings academy supported ministry internal affairs republic kosovo great britain ambassy royal ambassy norway british council ipko foundation kosovar organization flossk
[ 6029, 2451, 6674, 6586, 578 ]
Test
4,391
4
Detection_of_Intrusions_and_Malware,_and_Vulnerability_Assessment:detection intrusions malware vulnerability assessment detection intrusions malware vulnerability assessment dimva event annual conference designed serve general forum discussing malware vulnerability computing systems attacks advancing computer security exchange ideas one projects german informatics society gi according official dimva website 2017 event year dimva brings together international experts academia industry government present discuss novel research areas said conference held 6 july 7 july city bonn germany sponsored entities google rohde schwarz vmray conference report demonstrated externally manipulate alfa romeo giulietta networked safety systems essentially hack vehicle attracted notice publications fiat chrysler authority
[ 3932, 5274, 1122, 1805 ]
Validation
4,392
5
Channel_bank:channel bank telecommunications channel bank device performs multiplexing demultiplexing demux group communications channels analog digital telephone lines one channel higher bandwidth higher digital bit rate ds-1 t1 circuit channels sent simultaneously single cable called trunkline channel bank may located telephone exchange enterprise telephone closet enclosure breaks individual telephone lines high-capacity telephone trunk line connected central telephone office enterprise pbx system
[ 5714, 1976, 1374, 2117, 2236 ]
Train
4,393
6
LizardFS:lizardfs lizardfs open source distributed file system posix-compliant licensed gplv3 released 2013 fork moosefs lizardfs distributed scalable fault-tolerant file system achieved spreading data several physical servers associated physical data storage storage presented end-user single logical name space file system designed possible add disks servers “ fly ” without need server reboots shut-downs lizardfs used underlying distributed file system product developed cloudweavers uses opennebula cloud management platform marketed hyper-converged infrastructure possible use cases include storage cloud hosting services render farms backups high availability native microsoft windows client licensed features available support contract alternatively time-limited trial version windows client available high availability achieved manually scripting
[ 2763, 1624, 4759, 5571, 578, 2536 ]
Test
4,394
3
Hundra_(video_game):hundra video game hundra action game developed spanish studio zeus software published dinamic software amstrad cpc msx zx spectrum 1988 loosely inspired 1983 film hundra based hundra well received spanish press including review scores 44/50 amstrad accion 9/10 micromania game famous erotic cover art best title art 1988 award microhobby
[]
Test
4,395
3
Canon_T90:canon t90 canon t90 introduced 1986 top line canon series 35 mm single-lens reflex slr cameras last professional-level manual-focus camera canon last professional camera use canon fd lens mount although overtaken autofocus revolution canon new incompatible eos electro-optical system year production t90 pioneered many concepts seen high-end canon cameras present day particularly user interface industrial design high level automation due ruggedness t90 nicknamed tank japanese photojournalists many still rated highly even 20+ years introduction previous canon cameras wholly in-house design projects t90 canon brought german industrial designer luigi colani collaboration canon designers final design composed colani ideas kunihisa ito ods co. ltd. incorporating colani distinctive bio-form curvaceous shapes canon considered colani contribution important enough present first production t90 body engraved name computer-aided design techniques introduced canon t90 well use computer controlled cnc milling machines make molding dies shell much work went human factors engineering create ergonomic user interface camera form previous cameras largely dictated required locations mechanical controls body film advance lever rewind crank shutter speed dial shutter release etc t90 film transport control longer required others longer mechanically linked gave designers freedom shape camera make easier control hold place controls way suited user rather mechanical design t90 introduced features still used slr cameras today use lcd screen top camera right hand side new t90 – introduced t70 – t90 refined show even camera information control wheel located behind shutter release convenient right index finger used adjust camera settings conjunction buttons located right thumb left-hand side camera design still used canon digital slrs current production t90 includes integral motor driven film advance focal plane shutter mirror aperture cocking rewind functions canon broke new ground powered features camera previously cameras used one powerful electric motor geared functions instead t90 three coreless micromotors within body close functions drive maximum mechanical advantage one used wind film achieving rate 4.5 frames per second second prepares shutter mirror etc next shot third motor powers rewind function driven four aa batteries base camera control camera systems t90 uses dual cpu architecture main low-power cpu runs 32 khz sub-cpu runs 1 mhz powered needed main cpu handles lcd display overall state sub-cpu handles exposure calculations viewfinder display control camera motors architecture provides lower power usage cpus plus integrated circuits components mounted several flexible circuit boards fit around camera structure coin-type lithium battery main circuit board retains camera settings aa batteries removed user-serviceable part fails camera brought service center battery replaced canon technician expected battery life order five years although depends variety factors including duration periods without main battery 4xaa power t90 canon developed sophisticated light-metering system yet although introduced novel metering techniques assembled majority metering techniques developed one easy-to-use system first took metering options new f-1—center-weighted average metering partial area metering spot metering—and makes available press button turn command dial new f-1 requires focusing screen change switch metering patterns t90 partial area metering uses center 13 picture area spot metering uses center 2.7 canon copied metering options found olympus om-4 multi-spot metering allows photographer average eight spot meter readings different parts scene another feature borrowed olympus separate highlight shadow spot readings could taken adjust camera metering decisions ensure extremes tonal range muted grey final exposure two built-in sensors used implement metering options center-weighted partial area metering performed double-area silicon photocell spc canon standard location eyepiece spot metering performed another spc located bottom mirror box light reaches sensor via half-silvered area main mirror secondary mirror located beneath spot metering cell also allows automatic ttl off-the-film flash metering borrowed olympus notably lacking common metering mode slr cameras matrix metering nikon introduced fa 1983 canon follow suit 1987 eos 650 eight exposure modes available program ae auto-exposure mode puts exposure control completely hands camera variable shift program ae allows photographer bias camera towards narrow aperture three wide angle settings fast shutter speed three telephoto settings well standard mode manual control aperture priority ae shutter-speed priority ae allow photographer set one exposure variable manually camera chooses either latter two modes safety shift feature allows camera adjust fixed parameter obtain correct exposure otherwise example aperture priority mode photographer aperture fixed wide open photograph bright scene correct shutter speed expose correctly aperture might faster camera capable safety shift lets camera reduce aperture achieve correct exposure maximum shutter speed safety shift feature turned pressing two buttons back camera near base automation exposure desired manual mode available camera metering acts sophisticated light-meter decisions made photographer use older lenses automated aperture diaphragm stopped-down aperture priority ae stopped-down manual used instruct camera currently set aperture taking aperture therefore adjust metering calculations accordingly finally flash ae mode available flash photography t90 first canon camera support through-the-lens ttl flash metering measures actual light levels reaching film measuring reflected light film otf shutting flash unit film sufficiently exposed measurement calculated using average reflectivity color negative film system also used canon new eos system making t90 non-eos canon body compatible ttl canon flashes t90 x-sync speed 1/250 second fastest canon achieved better cameras available time production new dedicated flash unit speedlite 300tl launched alongside t90 support new flash modes zoomable head capable adjustment moving head cover fields view 24 35 50 85 mm lenses bounce flash head rotated 90° vertically 180° left 90° right well plain ttl mode 300tl supports a-ttl advanced ttl flash-to-subject distance calculated using infrared pulse detector mounted flash body bounce mode however uses 1/20th power pre-flash instead pre-flash also used fe lock mode flash exposure lock mode pre-flash used conjunction spot metering determine correct exposure advance taking picture thus camera moved reframe main subject off-center still expose correctly exposures slower x-sync speed previous slr flash systems triggered flash start exposure soon first shutter curtain finished travel however motion blurs light trails longer exposure method gives impression backwards movement since motion trails front moving object flash t90 became first mass-market camera support second-curtain flash flash fires end exposure second shutter curtain starts close although identical current 2009 canon speedlite 580 ex ii supports t90 well canon also produced dedicated macro ring flash camera ml-2 supports ttl manual models contains two flash tubes one either side fired separately together system consists flash ring fits onto end lens control unit screws hot shoe atop camera later ml-3 ring flash introduced eos system cameras also supports t90 t90 support vast range accessories available canon f-1 f-1n new f-1 number significant accessories available pentaprism interchangeable focusing screen eight different screens available different applications standard new split/microprism screen offers three common focusing aids simultaneously central circle split image prism surrounded microprism ring rest screen laser matte two optional data backs available t90 first command back 90 allows date data imprinting photographs also allowed various forms time-lapse photography second sold canon certain markets data memory back 90 stores 16 shot variables 156 exposures six variables 338 exposures computer interface data memory back 90 supports msx home computer standard third parties adapted connectors computer systems wired 60t3 remote control unit plugs socket fitted beneath right handgrip infrared remote control kit also available lc-2 unit also supports auto sensing mode completely unmanned photography trips shutter whenever something blocked path transmitter receiver—useful wildlife photography example number modifications t90 performed years canon third parties order add features missing camera as-built canon ceased supporting camera 1998 spare parts longer available subsequent difficulty obtaining repair services likely discourage remaining professional use cameras one issue lcd liquid crystal display life problem unique t90 lcd displays age wear varying rate dependent environmental conditions use factors commonly quoted lifespans five ten years thus many t90s displays nearing end lives even replaced spare part longer available third-party replacement emerged plastic battery holder t90 somewhat susceptible breakage cause camera become inoperative used cameras carefully checked broken/repaired battery holder compartments another common problem failure second internal battery retains frame number/iso settings replacement requires service person skilled soldering techniques camera disassembly another serious problem concerns shutter t90 shutter appears become sticky camera ages prone locking case camera lcd displays eee message help appears viewfinder display commonly called eee syndrome among users problem likely crop camera left unused time thus best way prevent regular use camera seem cause inaccurate shutter speeds failure problem corrected knowledgeable technician without replacing shutter mechanism reportedly caused dirt shutter magnets affecting performance left unused extended period time circuit need replaced expensive time-consuming proposition sticky shutter problem relates rubber washer involved operation shutter age atmospheric conditions tends deteriorate become sticky impedes operation shutter frequent use delay stickiness 'glueing shutter started long-term remedy shutter repaired rubber washer replaced another 10 years enjoyed camera working correctly good short term solution lightly clean shutter diaphragm cotton ball lighter fluid electronically controlled slr film cameras working canon t90 bargain used market prices used camera dealers providing warranties range approximately us 120–140 camera working condition approximately us 240–260 camera body mint condition accessories box manual canon fd lenses however remain quite affordable compared ef counterparts
[ 1237, 4922 ]
Test
4,396
4
ArpON:arpon arpon arp handler inspection computer software project improve network security attracted interest among network managers academic researchers frequently cited means protecting arp-based attacks address resolution protocol arp security issues include man middle mitm attack arp spoofing arp cache poisoning arp poison routing attacks arpon host-based solution make arp standardized protocol secure order avoid man middle mitm attack arp spoofing arp cache poisoning arp poison routing attack possible using three kinds anti arp spoofing techniques goal arpon therefore provide secure efficient network daemon provides sarpi darpi harpi anti arp spoofing technique thus making arp standardized protocol secure foreign intrusion
[ 651, 4208, 5571, 2894, 57, 578, 3797, 1435, 1805 ]
Validation
4,397
2
Bus_error:bus error computing bus error fault raised hardware notifying operating system os process trying access memory cpu physically address invalid address address bus hence name modern use architectures much rarer segmentation faults occur primarily due memory access violations problems logical address permissions posix-compliant platforms bus errors usually result sigbus signal sent process caused error sigbus also caused general device fault computer detects though bus error rarely means computer hardware physically broken—it normally caused bug software bus errors may also raised certain paging errors see least three main causes bus errors software instructs cpu read write specific physical memory address accordingly cpu sets physical address address bus requests hardware connected cpu respond results answer specific address hardware responds cpu raises exception stating requested physical address unrecognized whole computer system note covers physical memory addresses trying access undefined virtual memory address generally considered segmentation fault rather bus error though mmu separate processor tell difference cpus byte-addressable unique memory address refers 8-bit byte cpus access individual bytes memory address generally access larger units 16 bits 32 bits 64 bits without units aligned specific boundary x86 platform notable exception example multi-byte accesses must 16 bit-aligned addresses given bytes 0 2 4 6 would considered aligned therefore accessible addresses 1 3 5 would considered unaligned similarly multi-byte accesses must 32-bit aligned addresses 0 4 8 12 would considered aligned therefore accessible addresses would considered unaligned attempting access unit larger byte unaligned address cause bus error systems may hybrid depending architecture used example hardware based ibm system/360 mainframe including ibm system z fujitsu b8000 rca spectra univac series 90 instructions must 16-bit boundary execution addresses must start even byte attempts branch odd address results specification exception data however may retrieved address memory may one byte longer depending instruction cpus generally access data full width data bus times address bytes access memory full width data bus mask shift address individual byte systems tolerate inefficient algorithm essential feature software especially string processing unlike bytes larger units span two aligned addresses would thus require one fetch data bus possible cpus support functionality rarely required directly machine code level thus cpu designers normally avoid implementing instead issue bus errors unaligned memory access freebsd linux solaris signal bus error virtual memory pages paged e.g disappeared e.g accessing memory-mapped file executing binary image truncated program running just-created memory-mapped file physically allocated disk full x86 exists older memory management mechanism known segmentation application loads segment register selector non-present segment posix-compliant oses done assembly language exception generated oses used swapping linux generates sigbus example unaligned memory access written c programming language assembly syntax compiling running example posix compliant os x86 demonstrates error gdb debugger shows immediate value 0x2a stored location stored eax register using x86 assembly language example register indirect addressing printing low order bits address shows aligned word boundary dword using x86 terminology
[ 1807, 4297, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 4347, 1880, 65, 5079, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 6892, 5116, 2300, 126, 6907, 4786, 4423, 6197, 4061, 1208...
Train
4,398
4
Ghost_(disk_utility):ghost disk utility ghost acronym general hardware-oriented system transfer disk cloning backup tool originally developed murray haszard 1995 binary research technology acquired 1998 symantec backup recovery functionality replaced symantec system recovery ssr although ghost imaging technology still actively developed available part symantec ghost solution suite binary research developed ghost auckland new zealand symantec acquisition functions translation languages moved elsewhere main development remained auckland october 2009 time much moved india technologies developed 20/20 software integrated ghost acquisition symantec april 2000 first versions ghost supported cloning entire disks however version 3.1 released 1997 supports cloning individual partitions ghost could clone disk partition another disk partition image file ghost allows writing clone image second disk machine another machine linked parallel network cable network drive tape drive version 4.0 ghost added multicast technology following lead competitor imagecast multicasting supports sending single backup image simultaneously machines without putting greater stress network sending image single machine version also introduced ghost explorer windows program supports browsing contents image file extract individual files explorer subsequently enhanced support adding deleting files image fat later ext2 ext3 ntfs file systems 2007 ghost explorer could edit ntfs images ghost explorer could work images older versions slowly version 4 images contain indexes find files rapidly version 4.0 also moved real-mode dos 286 protected mode additional memory available allows ghost provide several levels compression images provide file browser 1998 ghost 4.1 supports password-protected images version 5.0 moved 386 protected mode unlike text-based user interface earlier versions 5.0 uses graphical user interface gui binary research logo two stars revolving around plays main screen program idle 1998 gdisk script-based partition manager integrated ghost gdisk serves role similar fdisk greater capabilities norton ghost version novell netware called 2.0 released around 1999 supports nss partitions although runs dos like others ghost 6.0 released 2000 includes management console managing large numbers machines console communicates client software managed computers allows system administrator refresh disk machine remotely dos-based program ghost requires machines running windows reboot dos run ghost 6.0 requires separate dos partition used console released march 31 2001 norton ghost version 7.0 retail marketed norton ghost 2002 personal edition released december 14 2001 ghost 7.5 creates virtual partition dos partition actually exists file within normal windows file system significantly eased systems management user longer set partition tables ghost 7.5 write images cd-r discs later versions write dvds ghost 8.0 run directly windows well-suited placement bootable media bartpe′s bootable cd corporate edition supports unicast multicast peer-to-peer transfers via tcp/ip ghost 8.0 supports ntfs file system although ntfs accessible dos program off-line version ghost runs bootable media place installed operating system originally faced number driver support difficulties due limitations increasingly obsolete 16-bit dos environment driver selection configuration within dos non-trivial beginning limited space available floppy disks made disk cloning several different disk controllers difficult task different scsi usb cd-rom drives involved mouse support possible often left due limited space drivers floppy disk devices usb often work using newer features usb 2.0 instead operating 1.0 speeds taking hours taken minutes widespread support dos went decline became increasingly difficult get hardware drivers dos newer hardware disk imaging competitors ghost dealt decline dos moving recovery environments freebsd linux windows pe draw current driver development able image newer models disk controllers nevertheless dos version ghost compatible hardware configurations works much faster *nix based image backup tools ghost 8 later windows programs run windows pe bartpe hiren bootcd use plug play hardware drivers standard desktop computer making hardware support ghost much simpler norton ghost 2003 consumer edition ghost released september 6 2002 available independent product norton ghost 2003 also included component norton systemworks 2003 professional simpler non-corporate version ghost norton ghost 2003 include console windows front-end script ghost operations create bootable ghost diskette machine still needs reboot virtual partition user need interact dos symantec deprecated liveupdate support norton ghost 2003 early 2006 released november 15 2004 symantec renamed enterprise version ghost symantec ghost solution suite 1.0 helped clarify difference consumer business editions product defined february 2006 release norton save restore also known norton backup restore standalone backup application based ghost 10.0 ghost solution suite 1.1 bundle updated version ghost symantec client migration user data settings migration tool former powerquest equivalent deploycenter using pqi images ghost solution suite 1.1 released december 2005 create image file larger 2 gb ghost 8.2 earlier image files automatically split two segments segment maximum size 2 gb new features include comprehensive manufacturing tools ability create universal boot disk end 2003 symantec acquired largest competitor disk-cloning field powerquest august 2 2004 norton ghost 9.0 released new consumer version ghost based powerquest′s drive image version 7 provides live imaging windows system ghost 9 continues leverage powerquest file format meaning backward compatible previous versions ghost however version ghost 8.0 included ghost 9 recovery disk support existing ghost customers ghost 9.0 released august 2 2004 represents significant shift consumer product line ghost 2003 several ways since ghost 9 support older .gho format disk images separate cd containing ghost 2003 included retail packaging users needing access older images limitations ghost 9 compared ghost 2003 well-communicated symantec resulted many dissatisfied customers purchased ghost 9 expecting previous version′s features like making images bootable ghost environment installation required product activation supports creating images cds dvds iomega zip jaz disks well ieee 1394 firewire usb mass storage devices supports encrypting images maxtor external hard disk drives maxtor onetouch buttons ghost 10.0 compatible previous versions future versions norton save restore 1.0 released february 2006 renamed consumer version ghost used ghost 10.0′s engine addition features allow backup restoration individual files ghost solution suite 2.0 released november 2006 version provides significant improvements performance well ability edit ntfs images version also adds support windows vista x64 versions windows guid partition table gpt disks however software fully support systems extensible firmware interface efi firmware ghost 11.0 supports saving restoring native ghost image format .gho .ghs raw images .img .raw ghost 12.0 includes windows vista support updated thorough user interface supports full system backup individual files folders backup version provides lightsout restore feature restores system on-disk software recovery environment similar windows thereby allowing recovery without bootable cd upon system startup menu asks whether start operating system lightsout recovery environment lightsout restore would augment iso image comes ghost latter contains recovery environment recover system without working operating system nsr 2.0 fewer features comparison norton ghost 12 nsr 2.0 offers one-time backups file folder backup simplified schedule editor maxtor onetouch integration modifiable symantec recovery disc version supports 32-bit 64-bit versions windows xp vista version 14.0 uses volume snapshot service vss make backups store backups ftp site ghost connect threatcon symantec service monitors malware activity around world performs incremental backups specific threat level reached features include ability back network-attached storage devices support ntfs partitions 16tb ghost manage installations version 12.0 later across network version longer supports opening .gho image files stores images .v2i format incremental backup images created norton ghost saved .iv2i filename extensions alone original full backup .v2i filename extension regular basis older .gho image files restored using ghost explorer separate utility ghost software enterprise including ghost 11.5 released may 2008 new features include january 6 2010 latest build live update 11.5.1.2266 live update 5 lu5 updates ghost solution suite 2.5.1 provides support windows 7 windows server 2008 r2 furthermore ghost 11.5 compatible bartpe bootable cd using pe builder plug-in symantec ghost 11 according norton community symantec′s site following features available norton ghost 15 ghost software enterprise including ghost 12.0 deployment solution 6.9 announced march 2015 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 7 march 2016 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 18 may 2017 release update 3 released 22 september 2017 added support ext4 filesystem ghost software enterprise including ghost 12.0 deployment solution 6.9 released 31 october 2018 release added support ghost solution suite web console ipxe windows server 2016 smart raw imaging 4k native drive support ghost marketed os deployment solution capture deployment environment requires booting windows pe environment accomplished creating iso burn dvd usb bootable disk installed client automation folder delivered pxe server provides environment perform offline system recovery image creation ghost mount backup volume recover individual files ghost copy contents one volume another convert volume contents virtual disk vmdk vhd format initially ghost supported fat file system although could copy resize file systems performing sector-by-sector transfer ghost added support ntfs later 1996 also provided program ghostwalker change security id sid made windows nt systems distinguishable ghostwalker capable modifying name windows nt computer interface ghost added support ext2 file system 1999 ext3 subsequently support ext4 added september 2017 norton ghost discontinued april 30 2013 support via chat knowledge base available june 30 2014 removed symantec ghost web page invited ghost customers try symantec system recovery described software backup disaster recovery
[ 3842, 4759, 6256, 1534, 7616, 5552, 4398, 4138, 2390, 5571, 8092, 6360, 2032, 578, 6731, 7738, 2488, 6289, 1666, 5856, 858, 7306, 1793, 2350, 4645, 174, 7597, 6962 ]
Test
4,399
3
Nukernel:nukernel nukernel microkernel developed apple computer early 1990s written scratch apple designed using concepts mach 3.0 extensive additions soft real-time scheduling improve multimedia performance intended used basis copland operating system one version seen publicly copland alpha release proved extremely unstable development apparently ended cancellation copland 1996 ers external reference specification nukernel contained entirety object oriented message passing system method filed march 19 1996 granted december 31 1996 one-time technical lead nukernel jeff robbin one driving forces behind itunes ipod apple nukernel name confused nukernel name custom kernel beos
[ 1959, 5275, 6921, 7823, 5571, 5021, 3751, 7775, 6385, 4175, 3544, 7554 ]
Test
4,400
3
Ångström_distribution:ångström distribution ångström distribution linux distribution variety embedded devices distribution result work developers openzaurus openembedded opensimpad projects graphical user interfaces guis available opie gpe among options ångström distribution cooptition poky linux ångström based openembedded project specifically openembedded-core oe-core layer ångström poky linux based oe-core mostly utilize toolchain officially yocto compatible poky linux officially part yocto project ångström primarily differs poky linux binary distribution like e.g debian fedora opensuse ubuntu linux distributions using opkg package management hence essential part ångström builds binary package feed allowing simply install software distributed opkg packages without compile first one might install binary package aptitude dpkg according ångström wiki ångström developed least following devices
[ 6788, 3933, 2, 2187, 7528, 2559, 2564, 5391, 740, 1108, 7555, 5062, 5068, 2240, 424, 7587, 1893, 781, 5794, 6158, 7954, 7956, 1522, 5453, 5803, 6515, 1167, 1535, 7251, 1176, 474, 2300, 5486, 1941, 6209, 3039, 1582, 1227, 5872, 5523, 482...
Test
4,401
2
Gaël_Duval:gaël duval gaël duval born 1973 french entrepreneur july 1998 created mandrake linux mandriva linux linux distribution originally based red hat linux kde also co-founder mandrakesoft merged mandriva jacques le marois frédéric bastok gaël duval responsible communication mandriva management team laid company march 2006 round cost-cutting duval suspected part reason dismissal disagreement management company future strategy resulting lawsuit company duval chairman chief technology officer ulteo company bought aznetwork group 2015 2016 co-founded nfactory.io incubator-accelerator startups november 2017 gael duval created /e/ mobile operating system fork android-based lineageos accompanied set online services /e/ released first beta september 12th 2018 operating system emphasizes data privacy use proprietary google services 2018 duval founded e foundation maintains /e/ duval graduate university caen normandy france studied networks documentary applications
[ 3938, 3084, 462, 7429, 1351, 1822, 5292, 474, 3780, 5829, 1192, 578, 7740, 7463, 7559, 5759, 589, 412, 4435, 7108, 3133, 2689, 3404, 7855, 966, 968, 2260, 8149 ]
Test
4,402
4
NProtect_GameGuard_Personal_2007:nprotect gameguard personal 2007 nprotect gameguard personal 2007 often referred nprotect ggp2007 anti-virus security suite microsoft windows 2000 xp vista developed inca internet users playing online computer games includes real-time protection forms malware including viruses trojans spyware worms keyloggers rootkits well game optimization feature like many security products nprotect gameguard personal 2007 cause collisions executed security products simultaneously collisions mainly occur running on-access scanning real-time scanning simultaneously nprotect gameguard personal 2007 available free non-free edition former lacking treatment abilities malware
[ 5949, 5571, 5401 ]
Test
4,403
2
Mike_Lesk:mike lesk michael e. mike lesk born 1945 american computer scientist 1960s michael lesk worked smart information retrieval system project wrote much retrieval code many retrieval experiments well obtaining ba degree physics chemistry harvard college 1964 phd harvard university chemical physics 1969 1970 1984 lesk worked bell labs group built unix lesk wrote unix tools word processing tbl refer standard ms macro package troff compiling lex networking uucp also wrote portable i/o library predecessor stdio.h c contributed significantly development c language preprocessor 1984 left work bellcore managed computer science research group lesk worked specific information systems applications mostly geography system driving directions dictionaries system disambiguating words context 1990s lesk worked large chemical information system core project cornell online computer library center american chemical society chemical abstracts service 1998 2002 lesk headed national science foundation division information intelligent systems oversaw phase 2 nsf digital library initiative currently professor faculty library information science department school communication information rutgers university lesk received flame award lifetime achievement usenix 1994 fellow acm 1996 2005 elected national academy engineering authored number books selected books michael lesk
[ 5429, 2455, 7710, 1751, 2402, 1435 ]
Test
4,404
2
Christmas_Tree_EXEC:christmas tree exec christmas tree exec first widely disruptive computer worm paralyzed several international computer networks december 1987 written student clausthal university technology rexx scripting language drew crude christmas tree text graphics sent entry target email contacts file way spread onto european academic research network earn bitnet ibm worldwide vnet systems caused massive disruption core mechanism iloveyou worm 2000 essentially christmas tree although ran pcs rather mainframes spread different network scripted using vbscript rather rexx name actually christma exec ibm vm systems originally required file names formatted 8+space+8 characters additionally ibm required rexx script files file type exec name sometimes written christmas exec adding 9th character make name readable user prompted ... type christmas ... —and fact launched worm displays message program run forwards mailbox addresses contained user address file
[ 2733, 6460, 8183, 7050 ]
Test
4,405
9
Gordon_Plotkin:gordon plotkin gordon david plotkin born 9 september 1946 theoretical computer scientist school informatics university edinburgh plotkin probably best known introduction structural operational semantics sos work denotational semantics particular notes structural approach operational semantics influential contributed many areas computer science plotkin educated university glasgow university edinburgh gaining bachelor science degree 1967 phd 1972 supervised rod burstall plotkin remained edinburgh burstall robin milner co-founder laboratory foundations computer science lfcs former doctoral students include luca cardelli philippa gardner doug gurr eugenio moggi lǐ wèi plotkin elected fellow royal society frs 1992 fellow royal society edinburgh frse member academia europæa also winner royal society wolfson research merit award plotkin received milner award 2012 fundamental research programming semantics lasting impact principles design programming languages nomination royal society reads
[ 7009, 1274, 7707, 6995, 3895, 920, 2775, 1243, 4240, 2778, 7005, 4512, 6642 ]
Validation
4,406
6
Filesystem-level_encryption:filesystem-level encryption filesystem-level encryption often called file-based encryption fbe file/folder encryption form disk encryption individual files directories encrypted file system contrast full disk encryption entire partition disk file system resides encrypted types filesystem-level encryption include advantages filesystem-level encryption include unlike cryptographic file systems full disk encryption general-purpose file systems include filesystem-level encryption typically encrypt file system metadata directory structure file names sizes modification timestamps problematic metadata needs kept confidential words files stored identifying file names anyone access physical disk know documents stored disk although contents documents one exception encryption support added zfs filesystem filesystem metadata filenames ownership acls extended attributes stored encrypted disk zfs metadata relating storage pool stored plaintext possible determine many filesystems datasets available pool including ones encrypted content stored files directories remain encrypted another exception cryfs replacement encfs cryptographic file systems specialized general-purpose file systems specifically designed encryption security mind usually encrypt data contain – including metadata instead implementing on-disk format block allocation file systems often layered top existing file systems e.g residing directory host file system many file systems also offer advanced features deniable encryption cryptographically secure read-only file system permissions different views directory structure depending key user ... one use cryptographic file system part existing file system synchronized 'cloud storage cases cryptographic file system could 'stacked top help protect data confidentiality
[ 3599, 2547, 7161, 4672, 6431, 3626, 2566, 5049, 6117, 759, 6854, 5437, 5440, 4375, 6500, 6505, 5457, 460, 1534, 7976, 7258, 821, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 177, 588...
Test
4,407
2
Nokia_E73_Mode:nokia e73 mode nokia e73 mode feature phone nokia e series range manufactured nokia company successor nokia e73 nokia e73 mode enterprise-based feature phone nokia eseries devices standard features including mobile email calendar instant messaging among many others like nokia e72
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 5068, 597, 7393...
Test
4,408
3
Cell_(microprocessor):cell microprocessor cell multi-core microprocessor microarchitecture combines general-purpose powerpc core modest performance streamlined coprocessing elements greatly accelerate multimedia vector processing applications well many forms dedicated computation developed sony toshiba ibm alliance known sti architectural design first implementation carried sti design center austin texas four-year period beginning march 2001 budget reported sony approaching us 400 million cell shorthand cell broadband engine architecture commonly abbreviated cbea full cell part first major commercial application cell sony playstation 3 game console mercury computer systems dual cell server dual cell blade configuration rugged computer pci express accelerator board available different stages production toshiba announced plans incorporate cell high definition television sets seems abandoned idea exotic features xdr memory subsystem coherent element interconnect bus eib interconnect appear position cell future applications supercomputing space exploit cell processor prowess floating point kernels cell architecture includes memory coherence architecture emphasizes power efficiency prioritizes bandwidth low latency favors peak computational throughput simplicity program code reasons cell widely regarded challenging environment software development ibm provides linux-based development platform help developers program cell chips architecture widely used unless adopted software development community however cell strengths may make useful scientific computing regardless mainstream success mid-2000 sony computer entertainment toshiba corporation ibm formed alliance known sti design manufacture processor sti design center opened march 2001 cell designed period four years using enhanced versions design tools power4 processor 400 engineers three companies worked together austin critical support eleven ibm design centers period ibm filed many patents pertaining cell architecture manufacturing process software environment early patent version broadband engine shown chip package comprising four processing elements patent description known power processing element ppe processing element contained 8 apus referred spes current broadband engine chip chip package widely regarded run clock speed 4 ghz 32 apus providing 32 gigaflops fp8 quarter precision broadband engine shown 1 teraflops raw computing power design fabricated using 90 nm soi process march 2007 ibm announced 65 nm version cell production plant time globalfoundries east fishkill new york bandai namco entertainment used cell processor 357 arcade board well subsequent 369 february 2008 ibm announced begin fabricate cell processors 45 nm process may 2008 ibm introduced high-performance double-precision floating-point version cell processor powerxcell 8i 65 nm feature size may 2008 opteron- powerxcell 8i-based supercomputer ibm roadrunner system became world first system achieve one petaflops fastest computer world third quarter 2009 world three energy efficient supercomputers represented green500 list similarly based powerxcell 8i 45 nm cell processor introduced concert sony playstation 3 slim august 2009 november 2009 ibm discontinued development cell processor 32 apus still developing cell products may 17 2005 sony computer entertainment confirmed specifications cell processor would shipping then-forthcoming playstation 3 console cell configuration one ppe core eight physical spes silicon playstation 3 one spe locked-out test process practice helps improve manufacturing yields another one reserved os leaving 6 free spes used games code target clock-frequency introduction 3.2 ghz introductory design fabricated using 90 nm soi process initial volume production slated ibm facility east fishkill new york relationship cores threads common source confusion ppe core dual threaded manifests software two independent threads execution active spe manifests single thread playstation 3 configuration described sony cell processor provides nine independent threads execution june 28 2005 ibm mercury computer systems announced partnership agreement build cell-based computer systems embedded applications medical imaging industrial inspection aerospace defense seismic processing telecommunications mercury since released blades conventional rack servers pci express accelerator boards cell processors fall 2006 ibm released qs20 blade module using double cell processors tremendous performance certain applications reaching peak 410 gigaflops fp8 quarter precision per module qs22 based powerxcell 8i processor used ibm roadrunner supercomputer mercury ibm uses fully utilized cell processor eight active spes april 8 2008 fixstars corporation released pci express accelerator board based powerxcell 8i processor sony high performance media computing server zego uses 3.2 ghz cell/b.e processor cell broadband engine cell commonly known microprocessor intended hybrid conventional desktop processors athlon 64 core 2 families specialized high-performance processors nvidia ati graphics-processors gpus longer name indicates intended use namely component current future online distribution systems may utilized high-definition displays recording equipment well hdtv systems additionally processor may suited digital imaging systems medical scientific etc physical simulation e.g scientific structural engineering modeling simple analysis cell processor split four components external input output structures main processor called power processing element ppe two-way simultaneous-multithreaded powerpc 2.02 core eight fully functional co-processors called synergistic processing elements spes specialized high-bandwidth circular data bus connecting ppe input/output elements spes called element interconnect bus eib achieve high performance needed mathematically intensive tasks decoding/encoding mpeg streams generating transforming three-dimensional data undertaking fourier analysis data cell processor marries spes ppe via eib give access via fully cache coherent dma direct memory access main memory external data storage make best eib overlap computation data transfer nine processing elements ppe spes equipped dma engine since spe load/store instructions access local scratchpad memory spe entirely depends dmas transfer data main memory spes local memories dma operation transfer either single block area size 16kb list 2 2048 blocks one major design decisions architecture cell use dmas central means intra-chip data transfer view enabling maximal asynchrony concurrency data processing inside chip ppe capable running conventional operating system control spes start stop interrupt schedule processes running spes end ppe additional instructions relating control spes unlike spes ppe read write main memory local memories spes standard load/store instructions despite turing complete architectures spes fully autonomous require ppe prime useful work horsepower system comes synergistic processing elements use dma method data transfer limited local memory footprint spe pose major challenge software developers wish make horsepower demanding careful hand-tuning programs extract maximal performance cpu ppe bus architecture includes various modes operation giving different levels memory protection allowing areas memory protected access specific processes running spes ppe ppe spe risc architectures fixed-width 32-bit instruction format ppe contains 64-bit general purpose register set gpr 64-bit floating point register set fpr 128-bit altivec register set spe contains 128-bit registers used scalar data types ranging 8-bits 64-bits size simd computations variety integer floating point formats system memory addresses ppe spe expressed 64-bit values theoretic address range 2 bytes 16 exabytes 16,777,216 terabytes practice bits implemented hardware local store addresses internal spu synergistic processor unit processor expressed 32-bit word documentation relating cell word always taken mean 32 bits doubleword means 64 bits quadword means 128 bits 2008 ibm announced revised variant cell called powerxcell 8i available qs22 blade servers ibm powerxcell manufactured 65 nm process adds support 32 gb slotted ddr2 memory well dramatically improving double-precision floating-point performance spes peak 12.8 gflops 102.4 gflops total eight spes coincidentally peak performance nec sx-9 vector processor released around time ibm roadrunner supercomputer world fastest 2008-2009 consisted 12,240 powerxcell 8i processors along 6,562 amd opteron processors powerxcell 8i powered super computers also dominated top 6 greenest systems green500 list highest mflops/watt ratio supercomputers world beside qs22 supercomputers powerxcell processor also available accelerator pci express card used core processor qpace project since powerxcell 8i removed rambus memory interface added significantly larger ddr2 interfaces enhanced spes chip layout reworked resulted larger chip die packaging cell chip number different configurations basic configuration multi-core chip composed one power processor element ppe sometimes called processing element pe multiple synergistic processing elements spe ppe spes linked together internal high speed bus dubbed element interconnect bus eib ppe powerpc based dual-issue in-order two-way simultaneous-multithreaded core 23-stage pipeline acting controller eight spes handle computational workload ppe limited order execution capabilities perform loads order delayed execution pipelines ppe work conventional operating systems due similarity 64-bit powerpc processors spes designed vectorized floating point code execution ppe contains 64 kib level 1 cache 32 kib instruction 32 kib data 512 kib level 2 cache size cache line 128 bytes additionally ibm included altivec vmx unit fully pipelined single precision floating point altivec 1 support double precision floating-point vectors 32-bit fixed point unit fxu 64-bit register file per thread load store unit lsu 64-bit floating-point unit fpu branch unit bru branch execution unit bxu ppe consists three main units instruction unit iu execution unit xu vector/scalar execution unit vsu iu contains l1 instruction cache branch prediction hardware instruction buffers dependency checking login xu contains integer execution units fxu load-store unit lsu vsu contains execution resources fpu vmx ppe complete two double precision operations per clock cycle using scalar fused-multiply-add instruction translates 6.4 gflops 3.2 ghz eight single precision operations per clock cycle vector fused-multiply-add instruction translates 25.6 gflops 3.2 ghz ppe designed specifically cell processor development microsoft approached ibm wanting high performance processor core xbox 360 ibm complied made tri-core xenon processor based slightly modified version ppe added vmx128 extensions spe dual issue order processor composed synergistic processing unit spu memory flow controller mfc dma mmu bus interface spes n't branch prediction hardware hence heavy burden compiler spe 6 execution units divided among odd even pipelines spe spu runs specially developed instruction set isa 128-bit simd organization single double precision instructions current generation cell spe contains 256 kib embedded sram instruction data called local storage mistaken local memory sony documents refer vram visible ppe addressed directly software spe support 4 gib local store memory local store operate like conventional cpu cache since neither transparent software contain hardware structures predict data load spes contain 128-bit 128-entry register file measures 14.5 mm 90 nm process spe operate sixteen 8-bit integers eight 16-bit integers four 32-bit integers four single-precision floating-point numbers single clock cycle well memory operation note spu directly access system memory 64-bit virtual memory addresses formed spu must passed spu spe memory flow controller mfc set dma operation within system address space one typical usage scenario system load spes small programs similar threads chaining spes together handle step complex operation instance set-top box might load programs reading dvd video audio decoding display data would passed spe spe finally ending tv another possibility partition input data set several spes performing kind operation parallel 3.2 ghz spe gives theoretical 25.6 gflops single precision performance compared personal computer contemporaries relatively high overall floating point performance cell processor seemingly dwarfs abilities simd unit cpus like pentium 4 athlon 64 however comparing floating point abilities system one-dimensional application-specific metric unlike cell processor desktop cpus suited general purpose software usually run personal computers addition executing multiple instructions per clock processors intel amd feature branch predictors cell designed compensate compiler assistance prepare-to-branch instructions created double-precision floating point operations sometimes used personal computers often used scientific computing cell performance drops order magnitude still reaches 20.8 gflops 1.8 gflops per spe 6.4 gflops per ppe powerxcell 8i variant specifically designed double-precision reaches 102.4 gflops double-precision calculations tests ibm show spes reach 98 theoretical peak performance running optimized parallel matrix multiplication toshiba developed co-processor powered four spes ppe called spursengine designed accelerate 3d movie effects consumer electronics spe local memory 256 kb total spes 2 mb local memory eib communication bus internal cell processor connects various on-chip system elements ppe processor memory controller mic eight spe coprocessors two off-chip i/o interfaces total 12 participants ps3 number spu vary industrial applications eib also includes arbitration unit functions set traffic lights documents ibm refers eib participants 'units eib presently implemented circular ring consisting four 16 bytes wide unidirectional channels counter-rotate pairs traffic patterns permit channel convey three transactions concurrently eib runs half system clock rate effective channel rate 16 bytes every two system clocks maximum concurrency three active transactions four rings peak instantaneous eib bandwidth 96 bytes per clock 12 concurrent transactions 16 bytes wide 2 system clocks per transfer figure often quoted ibm literature unrealistic simply scale number processor clock speed arbitration unit imposes additional constraints discussed bandwidth assessment section ibm senior engineer david krolak eib lead designer explains concurrency model participant eib one 16 byte read port one 16 byte write port limit single participant read write rate 16 byte per eib clock simplicity often regarded 8 byte per system clock note spu processor contains dedicated dma management queue capable scheduling long sequences transactions various endpoints without interfering spu ongoing computations dma queues managed locally remotely well providing additional flexibility control model data flows eib channel stepwise around ring since twelve participants total number steps around channel back point origin twelve six steps longest distance pair participants eib channel permitted convey data requiring six steps data must take shorter route around circle direction number steps involved sending packet little impact transfer latency clock speed driving steps fast relative considerations however longer communication distances detrimental overall performance eib reduce available concurrency despite ibm original desire implement eib powerful cross-bar circular configuration adopted spare resources rarely represents limiting factor performance cell chip whole worst case programmer must take extra care schedule communication patterns eib able function high concurrency levels david krolak explained 3.2 ghz channel flows rate 25.6 gb/s viewing eib isolation system elements connects achieving twelve concurrent transactions flow rate works abstract eib bandwidth 307.2 gb/s based view many ibm publications depict available eib bandwidth greater 300 gb/s number reflects peak instantaneous eib bandwidth scaled processor frequency however technical restrictions involved arbitration mechanism packets accepted onto bus ibm systems performance group explained quote apparently represents full extent ibm public disclosure mechanism impact eib arbitration unit snooping mechanism interrupt generation segment page translation faults well described documentation set yet made public ibm practice effective eib bandwidth also limited ring participants involved nine processing cores sustain 25.6 gb/s read write concurrently memory interface controller mic tied pair xdr memory channels permitting maximum flow 25.6 gb/s reads writes combined two io controllers documented supporting peak combined input speed 25.6 gb/s peak combined output speed 35 gb/s add confusion older publications cite eib bandwidth assuming 4 ghz system clock reference frame results instantaneous eib bandwidth figure 384 gb/s arbitration-limited bandwidth figure 256 gb/s things considered theoretic 204.8 gb/s number often cited best one bear mind ibm systems performance group demonstrated spu-centric data flows achieving 197 gb/s cell processor running 3.2 ghz number fair reflection practice well cell contains dual channel rambus xio macro interfaces rambus xdr memory memory interface controller mic separate xio macro designed ibm xio-xdr link runs 3.2 gbit/s per pin two 32-bit channels provide theoretical maximum 25.6 gb/s i/o interface also rambus design known flexio flexio interface organized 12 lanes lane unidirectional 8-bit wide point-to-point path five 8-bit wide point-to-point paths inbound lanes cell remaining seven outbound provides theoretical peak bandwidth 62.4 gb/s 36.4 gb/s outbound 26 gb/s inbound 2.6 ghz flexio interface clocked independently typ 3.2 ghz 4 inbound 4 outbound lanes supporting memory coherency companies leadtek released pci-e cards based upon cell allow faster real time transcoding h.264 mpeg-2 mpeg-4 video august 29 2007 ibm announced bladecenter qs21 generating measured 1.05 giga–floating point operations per second gigaflops per watt peak performance approximately 460 gflops one power efficient computing platforms date single bladecenter chassis achieve 6.4 tera–floating point operations per second teraflops 25.8 teraflops standard 42u rack may 13 2008 ibm announced bladecenter qs22 qs22 introduces powerxcell 8i processor five times double-precision floating point performance qs21 capacity 32 gb ddr2 memory on-blade ibm discontinued blade server line based cell processors january 12 2012 several companies provide pci-e boards utilising ibm powerxcell 8i performance reported 179.2 gflops sp 89.6 gflops dp 2.8 ghz sony playstation 3 video game console first production application cell processor clocked 3.2 ghz containing seven eight operational spes allow sony increase yield processor manufacture six seven spes accessible developers one reserved os toshiba produced hdtvs using cell presented system decode 48 standard definition mpeg-2 streams simultaneously 1920×1080 screen enable viewer choose channel based dozens thumbnail videos displayed simultaneously screen ibm supercomputer ibm roadrunner hybrid general purpose x86-64 opteron well cell processors system assumed 1 spot june 2008 top 500 list first supercomputer run petaflops speeds gained sustained 1.026 petaflops speed using standard linpack benchmark ibm roadrunner used powerxcell 8i version cell processor manufactured using 65 nm technology enhanced spus handle double precision calculations 128-bit registers reaching double precision 102 gflops per chip clusters playstation 3 consoles attractive alternative high-end systems based cell blades innovative computing laboratory group led jack dongarra computer science department university tennessee investigated application depth terrasoft solutions selling 8-node 32-node ps3 clusters yellow dog linux pre-installed implementation dongarra research first reported wired october 17 2007 interesting application using playstation 3 cluster configuration implemented astrophysicist gaurav khanna physics department university massachusetts dartmouth replaced time used supercomputers cluster eight playstation 3s subsequently next generation machine called playstation 3 gravity grid uses network 16 machines exploits cell processor intended application binary black hole coalescence using perturbation theory particular cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects generated numerical data published multiple times relevant scientific research literature cell processor version used playstation 3 main cpu 6 spes available user giving gravity grid machine net 16 general-purpose processors 96 vector processors machine one-time cost 9,000 build adequate black-hole simulations would otherwise cost 6,000 per run conventional supercomputer black hole calculations memory-intensive highly localizable well-suited architecture khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 computational biochemistry biophysics lab universitat pompeu fabra barcelona deployed 2007 boinc system called ps3grid collaborative computing based cellmd software first one designed specifically cell processor united states air force research laboratory deployed playstation 3 cluster 1700 units nicknamed condor cluster analyzing high-resolution satellite imagery air force claims condor cluster would 33rd largest supercomputer world terms capacity lab opened supercomputer use universities research help computing power half million playstation 3 consoles distributed computing project folding home recognized guinness world records powerful distributed network world first record achieved september 16 2007 project surpassed one petaflops never previously attained distributed computing network additionally collective efforts enabled ps3 alone reach petaflops mark september 23 2007 comparison world second-most powerful supercomputer time ibm bluegene/l performed around 478.2 teraflops means folding home computing power approximately twice bluegene/l although cpu interconnect bluegene/l one million times faster mean network speed folding home may 7 2011 folding home runs 9.3 x86 petaflops 1.6 petaflops generated 26,000 active ps3s alone late 2008 cluster 200 playstation 3 consoles used generate rogue ssl certificate effectively cracking encryption ibm announced april 25 2007 would begin integrating cell broadband engine architecture microprocessors company line mainframes led gameframe architecture processor makes better suited hardware-assisted cryptographic brute force attack applications conventional processors due flexible nature cell several possibilities utilization resources limited different computing paradigms ppe maintains job queue schedules jobs spes monitors progress spe runs mini kernel whose role fetch job execute synchronize ppe kernel scheduling distributed across spes tasks synchronized using mutexes semaphores conventional operating system ready-to-run tasks wait queue spe execute spes use shared memory tasks configuration spe runs distinct program data comes input stream sent spes spe terminated processing output data sent output stream provides flexible powerful architecture stream processing allows explicit scheduling spe separately processors also able perform streaming tasks limited kernel loaded 2005 patches enabling cell support linux kernel submitted inclusion ibm developers arnd bergmann one developers aforementioned patches also described linux-based cell architecture linuxtag 2005 release 2.6.16 march 20 2006 linux kernel officially supports cell processor ppe spes programmable c/c++ using common api provided libraries fixstars solutions provides yellow dog linux ibm mercury cell-based systems well playstation 3 terra soft strategically partnered mercury provide linux board support package cell support development software applications various cell platforms including ibm bladecenter js21 cell qs20 mercury cell-based solutions terra soft also maintains y-hpc high performance computing cluster construction management suite y-bio gene sequencing tools y-bio built upon rpm linux standard package management offers tools help bioinformatics researchers conduct work greater efficiency ibm developed pseudo-filesystem linux coined spufs simplifies access use spe resources ibm currently maintaining linux kernel gdb ports sony maintains gnu toolchain gcc binutils november 2005 ibm released cell broadband engine cbe software development kit version 1.0 consisting simulator assorted tools web site development versions latest kernel tools fedora core 4 maintained barcelona supercomputing center website august 2007 mercury computer systems released software development kit playstation r 3 high-performance computing november 2007 fixstars corporation released new cvcell module aiming accelerate several important opencv apis cell series software calculation tests recorded execution times 3.2 ghz cell processor 6x 27x faster compared software 2.4 ghz intel core 2 duo illustrations different generations cell/b.e processors powerxcell 8i images scale cell/b.e packages measures 42.5×42.5 mm powerxcell 8i measures 47.5×47.5 mm
[ 2177, 7512, 4661, 7514, 3936, 1075, 4299, 3268, 1083, 5737, 2929, 5042, 3633, 4702, 5055, 746, 2226, 4718, 6474, 6130, 763, 2601, 424, 1131, 7581, 2248, 2257, 4011, 3674, 441, 5446, 4748, 7232, 450, 3348, 4761, 814, 6177, 3005, 4408, 48...
Test
4,409
4
National_Cyber_Security_Policy_2013:national cyber security policy 2013 national cyber security policy policy framework department electronics information technology deity ref name= http //meity.gov.in/content/national-cyber-security-policy-2013-1 /ref aims protecting public private infrastructure cyber attacks policy also intends safeguard information personal information web users financial banking information sovereign data particularly relevant wake us national security agency nsa leaks suggested us government agencies spying indian users legal technical safeguards ministry communications information technology india defines cyberspace complex environment consisting interactions people software services supported worldwide distribution information communication technology india cyber security policy 2013 2013 hindu newspaper citing documents leaked nsa whistleblower edward snowden alleged much nsa surveillance focused india domestic politics strategic commercial interests sparked furor among people pressure government unveiled national cyber security policy 2013 2 july 2013 build secure resilient cyberspace citizens business government also protect anyone intervening privacy protect information information infrastructure cyberspace build capabilities prevent respond cyber threat reduce vulnerabilities minimize damage cyber incidents combination institutional structures people processes technology cooperation ministry communications information technology india define objectives follows -to improve visibility integrity ict products services establishing infrastructure testing validation security product
[ 6756, 1805 ]
Test
4,410
2
Interleaved_memory:interleaved memory computing interleaved memory design made compensate relatively slow speed dynamic random-access memory dram core memory spreading memory addresses evenly across memory banks way contiguous memory reads writes using memory bank turn resulting higher memory throughputs due reduced waiting memory banks become ready desired operations different multi-channel memory architectures primarily interleaved memory adding channels main memory memory controller however channel interleaving also possible example freescale i.mx6 processors allow interleaving done two channels interleaved memory memory addresses allocated memory bank turn example interleaved system two memory banks assuming word-addressable memory logical address 32 belongs bank 0 logical address 33 would belong bank 1 logical address 34 would belong bank 0 interleaved memory said n-way interleaved banks memory location resides bank interleaved memory results contiguous reads common multimedia execution programs contiguous writes used frequently filling storage communication buffers actually using memory bank turn instead using one repeatedly results significantly higher memory throughput bank minimum waiting time reads writes main memory random-access memory ram usually composed collection dram memory chips number chips grouped together form memory bank possible memory controller supports interleaving lay memory banks memory banks interleaved traditional flat layouts memory banks allocated continuous block memory addresses simple memory controller gives equal performance completely random access scenarios compared performance levels achieved interleaving however reality memory reads rarely random due locality reference optimizing close together access gives far better performance interleaved layouts note way memory addressed effect access time memory locations already cached impact memory locations need retrieved dram early research interleaved memory performed ibm 60s 70s relation ibm 7030 stretch computer development went decades improving design flexibility performance produce modern implementations
[ 1855, 7654, 7499, 1670, 5732 ]
Test
4,411
2
Netgear_WGR614L:netgear wgr614l wgr614l also known wgr614v8 802.11b/g wireless network router created netgear officially launched june 30 2008 wgr614l runs open source linux firmware supports installation third party packages dd-wrt tomato openwrt wgr614l designed used home business environments often used connection third-party firmware solutions sputniknet titan hotspots router also used wireless client bridge utilizing openwrt firmware wireless repeater bridge using dd-wrt firmware
[ 2086, 578 ]
Test
4,412
4
Client_to_Authenticator_Protocol:client authenticator protocol client authenticator protocol ctap enables roaming user-controlled cryptographic authenticator smartphone hardware security key interoperate client platform laptop computer ctap complementary web authentication webauthn standard published world wide web consortium w3c webauthn ctap primary outputs fido2 project joint effort fido alliance w3c ctap based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard specifically fido u2f 1.2 proposed standard july 11 2017 became starting point ctap proposed standard latest version published january 30 2019 ctap specification refers two protocol versions ctap1/u2f protocol ctap2 protocol authenticator implements ctap2 called fido2 authenticator also called webauthn authenticator authenticator implements ctap1/u2f well backward compatible u2f protocol uses cbor binary data serialization format
[ 7380, 2319, 87, 4133 ]
Test
4,413
3
North_&_South_(video_game):north amp south video game north south combined strategy action game released 1989 commodore amiga atari st ported later nes amstrad cpc msx dos zx spectrum developed published infogrames north south offshoot belgian comic series les tuniques bleues raoul cauvin louis salverius/willy lambillotte dupuis based american civil war player basically acts civil war choosing play either north south player may choose start game year 1861 year civil war erupted 1864 year different array armies states side starts north south contains lot humorous elements example features parodies national anthems accessible player selects one different languages supported game english french spanish german italian addition game filled numerous comical situations gags taking simplified board interface game features strategic map united states separated states territories army units moved around state owns railway station fort capture leads player overtaking whole state otherwise capturing state involves simple movement unless another army state armies reinforced two ways turning option main menu player controlling state north carolina get periodic reinforcements ship also railways generate money turn generates soldiers moving army units player may expand westwards unoccupied territory two antagonistic armies clash result battle option main menu player turn in-game missions battles make purely like board game whenever opposing armies meet board-game mode results battles left chance outcome weighted towards larger army either army may retreat battles whenever side attempts capture enemy fort rob train result also randomised battle screen one action elements game different strategic map player starts opposite sides screen controls army consisting infantry cavalry artillery standard army consists six infantry three cavalry one cannon armies increased three times standard size merging together team six infantry three cavalry three cannons battlefield one time human player control one class units one time although cavalry starts charge left moving automatically forward straight line player focuses either cannon infantry computer-controlled opponent move three classes units infantry cavalry aggressive units class move fire simultaneously infantry move direction including backwards short-range weapon cavalry melee units much faster infantry move backwards cavalry instead return battle field every time reach end seconds cavalry returns way stop moving returning start position left-right axis unhindered movement up-down axis note cavalry movement started stop moving forwards unless player actively pulls horse reigns pushing backwards control method choice cannons move vertically sideways cannon fired nine times battle automatically withdraw battle army wins cannons withdrawn battle cannons available next battle however rest army killed cannons withdrawn cannons also lost middle battle map may river chasm case bridge serves choke point fighters likely meet bridge destroyed cannons one hit leave hole bridge units fall die instantly two hits bridge destroy every battlefield either river canyon narrow indestructible passage across cannons long-range weapons aiming – rather determining exact range – always easy care taken firing cannons avoid friendly fire battle usually deathmatch although player may retreat attacking army retreats return state beginning turn defending army decides retreat move adjacent state still control surrendering state battle enemy defenders retreat adjacent states retreating result loss cannons army army computer-controlled opponent retreat cannons destroyed enemy three times units states train station player must short side-scrolling mission fort capture state player controls single soldier runs towards goal clock reaches end meeting obstacles enemy soldiers dynamite crates dogs help knives punches send enemies towards sky asterix style occasions player also gets opportunity capture enemy train similar manner attacker running along train long see leave successfully capturing enemy train gets gold option turned storm cloud sit one state turn cloud move adjacent state twice month player turn army state cloud able move turn option main menu turned two non-player sides pose threat player armies native american lives west territory might hurl giant tomahawk randomly one westernmost states destroying army unfortunate enough garrisoned similarly sombrero-clad mexican living southwest might suddenly wake siesta toss bomb texas result option turned side controls north carolina chance turn free reinforcements arrive state via ship computer gaming world gave north south one-plus stars five wargamers three five arcade gamers 2011 wirtualna polska ranked tenth best amiga game june 2012 microïds anuman interactive ’ adventure game label released bluecoats north vs south remake ios android compatible devices windows ios version received metascore 60 metacritic another remake titled north south game released ios november 6 2012 bitcomposer entertainment ag
[]
Test
4,414
5
Multipath_TCP:multipath tcp multipath tcp mptcp ongoing effort internet engineering task force ietf multipath tcp working group aims allowing transmission control protocol tcp connection use multiple paths maximize resource usage increase redundancy january 2013 ietf published multipath specification experimental standard rfc 6824 currently ietf works update version 1 mptcp protocol obsolete rfc 6824 approved 2019 redundancy offered multipath tcp enables inverse multiplexing resources thus increases tcp throughput sum available link-level channels instead using single one required plain tcp multipath tcp backward compatible plain tcp multipath tcp particularly useful context wireless networks using wi-fi mobile network typical use case addition gains throughput inverse multiplexing links may added dropped user moves coverage without disrupting end-to-end tcp connection problem link handover thus solved abstraction transport layer without special mechanisms network link level handover functionality implemented endpoints without requiring special functionality subnetworks accordance internet end-to-end principle multipath tcp also brings performance benefits datacenter environments contrast ethernet channel bonding using 802.3ad link aggregation multipath tcp balance single tcp connection across multiple interfaces reach high throughput order facilitate deployment multipath tcp presents socket interface tcp implies standard tcp application used multipath tcp fact spreading data across several subflows applications could benefit enhanced api control underlying multipath tcp stack two different apis proposed expose features multipath tcp stack applications api extends netlink linux enhanced socket api july 2013 mptcp working group reported five independent implementations multipath tcp including reference implementation linux kernel currently available implementations july 2014 oracle reported implementation solaris developed june 2015 work progress mptcp wg meeting ietf 93 sunghoon seo announced kt deployed since mid june commercial service allows smartphone users reach 1 gbit/s using mptcp proxy service multipath tcp designed backward compatible regular tcp support application however specific deployments leverage ability simultaneously using different paths apple uses multipath tcp support siri application iphone siri sends voice samples https session apple servers servers reply information requested users according apple engineers main benefits multipath tcp application deployment use multipath tcp aggregate bandwidth different networks example several types smartphones notably korea use multipath tcp bond wifi 4g socks proxies another example hybrid access networks deployed network operators willing combine xdsl lte networks deployment multipath tcp used efficiently balance traffic xdsl lte network multipath tcp uses options described detail rfc 6824 multipath tcp options encoded tcp options option kind 30 reserved iana multipath tcp option kind 30 length variable remainder content begins 4-bit subtype field iana created maintain sub-registry entitled mptcp option subtypes transmission control protocol tcp parameters registry subtype fields defined follows values 0x8 0xe currently unassigned core idea multipath tcp define way build connection two hosts two interfaces standard tcp instance alice smartphone 3g wifi interfaces ip addresses 10.11.12.13 10.11.12.14 bob computer ethernet interface ip address 20.21.22.23 standard tcp connection established two ip addresses tcp connection identified four-tuple source destination addresses ports given restriction application create one tcp connection single link multipath tcp allows connection use several paths simultaneously multipath tcp creates one tcp connection called subflow path needs used purpose different protocol operations defined rfc 6824 multipath tcp adds new mechanisms tcp transmissions detailed specification detailed protocol specification provided rfc 6824 several survey articles provide introduction protocol several congestion control mechanisms defined multipath tcp main difference classical tcp congestion control schemes need react congestion different paths without unfair single path tcp sources could compete one paths four multipath tcp congestion control schemes currently supported multipath tcp implementation linux kernel stream control transmission protocol sctp reliable in-order datagram stream transport protocol originally intended telecommunication signaling supports concurrent use multiple access links allows application influence access interface selections datagram stream basis also supports mobility via access renegotiation hence sctp also transport layer solution offers type 3 flow granularity concurrency flow scheduling control multipath tcp also fully supports mobility fashion similar multipath tcp within ip multimedia subsystem ims architecture session initiation protocol sip support concurrent use multiple contact ip addresses registration one ims user agents allows creation multiple ims signaling paths signaling paths signaling messages carry session description protocol sdp messaging negotiate media streams sdp allows re- negotiation streams one media session multiple paths turn enables application layer multipath transport point view ims therefore offer application layer multipath support flow granularity concurrent access multipath extension real-time transport protocol rtp currently discussion within ietf multipath rtp offer flow granularity concurrent access mobility via ims sdp signaling rtp control protocol ietf currently developing quic protocol integrates features traditionally found tcp tls http protocols thanks flexibility extensibility quic possible extend support multiple paths address use cases multipath tcp first design multipath quic proposed implemented evaluated session layer mobile access router project experimented 2003 aggregation multiple wireless accesses heterogeneous technologies transparently balancing traffic response perceived performance parallel access schemes used accelerate transfers taking advantage http range requests initiate connections multiple servers replicated content equivalent multipath tcp involve application layer limited content known size
[ 7148, 6788, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 3637, 7091, 2219, 3383, 3640, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880, 3756, 2901 ]
Test
4,415
5
Hyper_Text_Coffee_Pot_Control_Protocol:hyper text coffee pot control protocol hyper text coffee pot control protocol htcpcp facetious communication protocol controlling monitoring diagnosing coffee pots specified rfc 2324 published 1 april 1998 april fools day rfc part april fools prank extension htcpcp-tea published rfc 7168 1 april 2014 support brewing teas also april fools day rfc rfc 2324 written larry masinter describes satire saying serious purpose – identifies many ways http extended inappropriately wording protocol made clear entirely serious example notes strong dark rich requirement protocol designed espressoly sic brewing coffee despite joking nature origins perhaps protocol remained minor presence online editor emacs includes fully functional client side implementation number bug reports exist complaining mozilla lack support protocol ten years publication htcpcp web-controlled coffee consortium wc3 published first draft htcpcp vocabulary rdf parody world wide web consortium w3c http vocabulary rdf april 1 2014 rfc 7168 extended htcpcp fully handle teapots htcpcp extension http htcpcp requests identified uniform resource identifier uri scheme codice_1 corresponding word 29 listed languages contain several additions http methods also defines two error responses 5 august 2017 mark nottingham chairman ietf httpbis working group called removal status code 418 'm teapot node.js platform code implemented reference original 418 'm teapot established hyper text coffee pot control protocol 6 august 2017 nottingham requested references 418 'm teapot removed programming language go subsequently python requests asp.net httpabstractions library well response 15 year old developer shane brunswick created website save418.com established save 418 movement asserting references 418 'm teapot different projects serve reminder underlying processes computers still made humans brunswick site went viral hours following publishing garnering thousands upvotes social platform reddit causing mass adoption save418 twitter hashtag introduced site heeding public outcry node.js go python requests asp.net httpabstractions library decided removing 418 'm teapot respective projects unanimous support aforementioned projects general public prompted mark nottingham begin process 418 marked reserved http status code ensuring 418 replaced official status code foreseeable future
[ 7148, 1815, 2281, 2459, 993, 7168, 2644, 1176, 20, 7637, 4415, 4509, 3383, 6915, 2043, 6381, 3819, 7214, 7494, 7217, 7765, 3827, 5965, 4009, 5880, 5441, 8039, 2261, 87 ]
Test
4,416
9
Gul_Agha_(computer_scientist):gul agha computer scientist gul agha گُل آغا professor computer science university illinois urbana-champaign director open systems laboratory known work actor model concurrent computation also editor-in-chief acm computing surveys 1999 2007 agha completed b.s honors california institute technology year 1977 received ph.d. computer communication science university michigan 1986 supervision john holland however much doctoral research carried carl hewitt message-passing semantics group massachusetts institute technology mit agha dissertation published mit press actors model concurrent computation distributed systems book according acm guide computing literature cited 3000 times agha born completed early schooling sindh pakistan received b.s honors california institute technology 1977 agha enjoys blues music vegan pacifist three daughters lives wife jennifer s. cole illinois agha became fellow institute electrical electronics engineers ieee 2002 also golden core member ieee computer society recipient ieee computer society meritorious service award international lecturer acm 1992 1997 agha elected acm fellow 2018 research concurrent programming formal methods specifically actor model
[ 479 ]
Test
4,417
2
Helix_Netroom:helix netroom netroom dos memory manager produced helix software company 1990s introduced august 1990 netroom originally titled lan memory manager version 1.0 netroom re-packaged version helix headroom headroom network extensions bundled together targeted network users netroom loaded network drivers virtual machine created using expanded memory page frame netroom allowed virtual machine run multitasked background process netroom included support novell netware banyan vines lan manager networks netroom originally available multi-user packs starting four user license helix introduced version 1.10 netroom january 1991 single-user license version included support microsoft windows 3.0 added integrated 286 386 expanded memory manager netroom 286/386 memory manager provided access expanded memory extended memory intel 80386 newer systems well intel 80286 systems based chips technologies neat chipset june 1991 netroom v2.0 added ms-dos 5 compatibility automatic setup configuration tool named customize netroom 2.0 continued focus virtual machine task-switching primary memory management technology january 1992 netroom v2.1 added quantum memory management feature could relocate system video bios high memory area 1992 helix licensed technology netroom 2.1 microsoft technology incorporated emm386 memmaker programs ms-dos 6 released march 1993 concurrently release ms-dos 6 helix released netroom v3.0 included helix cloaking technology netroom 3 contained variety cloaked utilities including system video bios licensed award software animated screen saver disk cache ram drive final version netroom v3.04 released late 1994 included compatibility windows 95 cloaking driver continued basis multimedia cloaking multimedia stacker products released 1994 1995
[ 1052, 4759, 5784, 6380, 5743, 5661, 7760 ]
Test
4,418
3
JavaStation:javastation javastation network computer nc developed sun microsystems 1996 2000 intended run java applications hardware based design sun sparcstation series successful line unix workstations javastation nc lacks hard drive floppy cd-rom drive also differs sun systems ps/2 keyboard mouse interfaces vga monitor connector several models javastation produced pre-production variants produced small numbers production models comprised models produced prototypes limited numbers included addition sun envisioned third-generation super javastation krups javachip co-processor native java bytecode execution n't appear produced javastation concept superseded sun ray series thin client terminals javastation comes javaos flash memory also possible install linux netbsd javastation
[ 6329, 1254, 1258, 2992, 1923, 1263, 6505, 6270, 3758, 908, 7535, 1185, 1937, 2299, 2033, 578, 3294, 6733, 3026, 4515, 4967, 5587, 1023, 418, 7114, 1590, 3820, 7212, 8138, 4999, 3673, 4277, 5705, 8145, 7781, 971 ]
Test
4,419
4
Canadian_Cyber_Incident_Response_Centre:canadian cyber incident response centre canadian cyber incident response centre ccirc ccric government canada program responsible monitoring threats coordinating national response cyber security incident focus protection national critical infrastructure cyber incidents housed within ministry public safety ccirc works within public safety canada partnership municipalities territories provinces private sector organizations international counterparts also coordinates national response serious cyber security incident
[ 6852, 429, 1805 ]
Test
4,420
4
Copy-evident_document:copy-evident document copy-evident documents features make detectable copy original security printing various methods void pantograph used create patterns hard copy exactly copied inexactly produces easily detectable image include halftone screens affected copying process fine line patterns different directions differently affected copying hence produce mark metallic inks causing diffraction reflection copy-evident computer image files also possible example embedding high-frequency pattern jpeg image imperceptible produces obvious message re-compressed different quality factor forms paper watermarking digital watermarking regarded copy-evidence although detecting document file copied typically requires special inspection tools software example 3d printed objects equipped marks genuinity identified using measurement device hard deduce sample objects copies lack marks
[ 3257, 3441 ]
Validation
4,421
2
System_Generation_(OS):system generation os system generation sysgen two-stage process installing updating os/360 os/vs1 os/vs2 svs os/vs2 mvs chargeable systems derived similar processes e.g. dos/360 article cover also details changed releases os/360 many details carry later systems several reasons ibm provided system generation process rather simply providing mechanism restore system tape disk system/360 self-identifying i/o devices customer could request installation i/o devices arbitrary addresses result ibm provide mechanism customer define i/o configuration os/360 also os/360 supported several different options ibm needed way customer select code appropriate options needed particular installation sysgen process runs series jobs control operating system new installations ibm provides complete pre-configured driver system intended preparing running sysgen production use prior running sysgen customer must initialize set distribution volumes restore set distribution libraries tape volumes libraries include data sysgen process copy target libraries input utilities used sysgen process macro definitions used sysgen process load modules sysgen process include linking load modules target libraries stage 1 compilation sequence assembler macro instructions describing configuration installed updated assembler actually compile object code instead compiles series punch pseudo-ops order generate job stream stage 2 ibm changed nomenclature os/360 options also changed sysgen macro definitions use newer names options type keyword ctrlprog macro stage 1 input specifies type control program release 13 old terms sss mss mps replaced pcp mft mvt later m65mp type variation mvt scheduler macro stage 1 input specifies type scheduler release 13 still used values sequential priority subsequently replaced values used type keyword ctrlprog macro types generate macro sysgen input several types mvt either type=mvt type=m65mp tso tsogen macro plays role generate either macros analyzes options specified previous macro calls punches stage 2 job stream stage 2 jobstream uses variety utilities including assembler linkage editor process obsolete initially replaced use smp/e iocp mvscp later smp/e hardware configuration definition hcd
[ 7605, 4291, 6514, 7331, 6705, 5726, 8173, 7172, 5571, 402, 839, 4428, 336, 2786, 607, 2431, 3664, 6849, 3751, 265, 1516, 1994 ]
Test
4,422
8
Java_Web_Services_Development_Pack:java web services development pack java web services development pack jwsdp free software development kit sdk developing web services web applications java applications newest technologies java oracle replaced jwsdp glassfish components jwsdp part glassfish wsit several java se 6 mustang source available open source initiative-approved cddl license components apis available jwsdp 1.6 starting jwsdp 1.6 jax-rpc jax-ws implementations support fast infoset standard binary encoding xml infoset earlier versions jwsdp also included many java implementations web services xml processors support java standards support standards non-standard features related technologies include
[ 7763, 3345, 6986, 7347, 773, 2799, 1286, 5075, 3488 ]
Validation
4,423
2
VERSAdos:versados versados operating system dating back early 1980s use motorola 68000 development system called exormacs featured versabus array option cards typically connected cdc phoenix disk drives running one four 14-inch platters exormacs used emulate 680xx processor in-circuit speeding development 680xx based systems also hosted several compilers assemblers versados exormacs produced motorola microsystems division versados real-time multi-user operating system follow product single user mdos ran 6800 development system called exorciser systems features harness cpu socket compatible connector modula 2 compiler ported versados following list commands utilities supported versados
[ 1522, 7325, 7605, 280, 785, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 6088, 5644, 3271, 4589, 5116, 6984, 299, 3626, 7142, 4321, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 6367, 405, 3880, 6922, 8115, 5161, 5865, 7396...
Test
4,424
7
LOCKSS:lockss lockss lots copies keep stuff safe project auspices stanford university peer-to-peer network develops supports open source system allowing libraries collect preserve provide readers access material published web main goal digital preservation system attempts replicate way libraries material published paper originally designed scholarly journals also used range materials examples include solinet project preserve theses dissertations eight universities us government documents metaarchive cooperative program preserving at-risk digital archival collections including electronic theses dissertations etds newspapers photograph collections audio-visual collections similar project called clockss controlled lockss tax-exempt 501 c 3 not-for-profit organization governed board directors made librarians publishers clockss runs lockss technology rutgers university libraries webpage comparing lockss clockss portico traditionally academic libraries retained issues scholarly journals either individually collaboratively providing readers access content received even publisher ceased subscription canceled digital age libraries often subscribe journals available digitally internet although convenient patron access model digital subscriptions allow libraries retain copy journal publisher ceases publish library cancels subscription publisher website day content paid longer available lockss system allows library permission publisher collect preserve disseminate patrons copy materials subscribed well open access material perhaps published creative commons license library system collects copy using specialized web crawler verifies publisher granted suitable permission system format-agnostic collecting whatever formats publisher delivers via http libraries collected material cooperate peer-to-peer network ensure preservation peers network vote cryptographic hash functions preserved content nonce peer outvoted regards copy damaged repairs publisher peers lockss license used publishers allows library readers access copy allow similar access libraries unaffiliated readers system support file sharing request library may supply another library content effect repair requesting library proved past good copy voting majority reader browser longer supports format copy collected format migration process convert current format limits use may made preserved copies copyright material effective persuading copyright owners grant necessary permission lockss approach selective collection permission publisher distributed storage restricted dissemination contrasts example internet archive approach omnivorous collection without permission publisher centralized storage unrestricted dissemination lockss system far smaller preserve subscription materials internet archive access since library administers lockss peer maintains copy preserved material since libraries worldwide see list participating libraries system provides much higher degree replication usual fault-tolerant system voting process makes use high degree replication eliminate need backups off-line media provide robust defenses attacks aimed corrupting preserved content addition preserving access libraries traditionally made difficult rewrite suppress printed material existence indeterminate large number identical copies somewhat tamper-resistant medium many independent administrations meant attempts alter remove copies published work would likely fail detected web publishing based single copy single administration provides none safeguards subversion web publishing therefore amenable tool rewriting history preserving many copies diverse administration automatically auditing copies intervals future publisher copy alerting libraries changes detected lockss system attempts restore many safeguards digital world publication prior implementing lockss system questions need considered carefully order make sure content verified evaluated auditable users user must ask questions procedures methods system evaluated disaster preparedness program questions enable user evaluate system create successful maintenance plan materials enable system reinforced carefully evaluated support structure source code entire lockss system carries bsd-style open-source licenses available github lockss trademark stanford university
[ 6025, 2390, 6320, 80, 7848, 6046 ]
Validation
4,425
9
Sigil_(computer_programming):sigil computer programming computer programming sigil symbol affixed variable name showing variable datatype scope usually prefix codice_1 codice_2 sigil sigil latin sigillum meaning little sign means sign image supposedly magical power 1999 philip gwyn adopted term mean funny character front perl variable use sigils popularized basic programming language best known example sigil basic dollar sign codice_2 appended names strings many basic dialects use sigils like codice_4 denote integers floating point numbers precision sometimes types well larry wall adopted shell scripting use sigils perl programming language perl sigils specify fine-grained data-types like strings integers general categories scalars using prefixed codice_2 arrays using codice_6 hashes using codice_4 subroutines using codice_8 perl 6 introduces secondary sigils twigils indicate scope variables prominent examples twigils perl 6 include codice_9 used self-declared formal parameters placeholder variables codice_10 used object attribute accessors i.e. instance variables clips scalar variables prefixed codice_11 sigil multifield i.e 1-level list variables prefixed codice_12 common lisp special variables dynamic scope typically surrounded codice_13 dubbed “ earmuff convention ” convention enforced language adopts practice e.g. *standard-output* similarly programmers surround constants codice_14 cycl variables prefixed codice_11 sigil similarly constant names prefixed codice_16 pronounced hash-dollar elixir string sigils provided via codice_17 symbol mapper aka bis named variables prefixed suffixed strings character values require quotes mirc script identifiers codice_2 sigil variables codice_4 prefixed regardless local global variables data type binary variables prefixed codice_8 mumps programming language codice_2 precedes intrinsic function names 'special variable names built-in variables accessing execution state codice_22 precedes non-standard intrinsic function names codice_23 precedes extrinsic function names routines used procedures subroutines functions global variables database storage prefixed caret last global variable subtree may referenced indirectly caret last subscript referred naked reference system-wide routines global variables stored certain shared database prefixed referred percent routines percent globals objective-c string literals preceded codice_6 instances object type codice_25 since clang v3.1 llvm v4.0 codice_26 codice_27 codice_28 prefix-codice_6 also used keywords codice_30 codice_31 codice_32 express structure class definitions within class declarations definitions well prefix codice_33 used indicate member methods variables prefix codice_14 indicates class elements php language largely inspired perl codice_2 precedes variable name names prefixed considered constants functions class names interface trait names share namespace classes pilot uses codice_2 buffers string variables codice_37 integer variables codice_13 program labels python uses codice_6 prefix denote decorator ruby ordinary variables lack sigils codice_2 prefixed global variables codice_6 prefixed instance variables codice_42 prefixed class variables ruby also uses strictly conventional suffix sigils codice_11 indicates predicate method returning usually boolean value codice_44 indicates method may potentially unexpected effect needs handled care scheme convention names procedures always return boolean value usually end codice_11 likewise names procedures store values parts previously allocated scheme objects pairs vectors strings usually end codice_44 standard ml uses prefix sigil codice_47 variable refers type sigil doubled refers type equality defined codice_47 character may also appear within end variable case special meaning transact-sql codice_6 precedes local variable parameter name system variables known global variables distinguished codice_42 prefix windows powershell partly inspired unix shells perl variable names prefixed codice_2 sigil xslt variables parameters leading codice_2 sigil use although defined codice_53 codice_54 codice_55 attribute sigil included related xslt xquery uses codice_2 sigil form definition use mel variable names prefixed codice_2 distinguish functions commands identifiers unix shell scripting utilities makefiles codice_2 unary operator translates name variable contents may seem similar sigil properly unary operator lexical indirection similar codice_13 dereference operator pointers c noticeable fact dollar sign omitted assigning variable fortran sigils used variables starting letters j k l n integers default fortran documentation refers implicit typing though explicit typing always available allow variable declared type choice range i–n conforms traditional mathematical naming conventions various programming languages including prolog haskell ruby go treat identifiers beginning capital letter differently identifiers beginning small letter practice related use sigils actually form stropping use many languages microsoft ’ .net common language infrastructure cli requires way use variables different language may keywords calling language sometimes done prefixes c variable names may prefixed codice_6 mainly used allow use variable names would otherwise conflict keywords achieved vb.net enclosing name square brackets codice_61 codice_6 prefix also applied string literals see literal affixes related sigils hungarian notation convention variable-naming specifies variable type attaching certain alphabetic prefixes variable name unlike sigils however hungarian notation provides information compiler explicit types must redundantly specified variables unless using language type inference standard compilers enforce use prefixes permits omission also makes code prone confusion due accidental erroneous use sigils applied names identifiers similar prefixes suffixes applied literals notably integer literals string literals specifying either literal evaluated data type example codice_63 evaluates value 16 unsigned long long integer c++ codice_64 prefix indicates hexadecimal suffix codice_65 indicates unsigned long long similarly prefixes often used indicate raw string codice_66 python represents string value codice_67 escaped string would written codice_68 affects semantics value literal rather syntax semantics identifier name neither stropping identifier syntax sigil identifier semantics syntactically similar compare java annotations override deprecated cases syntax used distinct purposes cause confusion example c codice_6 prefix used either stropping allow reserved words used identifiers prefix literal indicate raw string case neither use sigil affects syntax identifiers semantics literals semantics identifiers
[ 790, 4021, 3931, 5983, 1445, 6337, 7333, 7246, 993, 6428, 6266, 2740, 4946, 1378, 4796, 4611, 6029, 4164, 8122, 7032, 5965, 5967, 1420, 2530, 4743, 2079, 1803, 1435 ]
Test
4,426
0
Katz's_back-off_model:katz back-off model katz back-off generative n -gram language model estimates conditional probability word given history n -gram accomplishes estimation backing progressively shorter history models certain conditions model reliable information given history used provide better results model introduced 1987 slava m. katz prior n-gram language models constructed training individual models different n-gram orders using maximum likelihood estimation interpolating together equation katz back-off model essentially means n -gram seen k times training conditional probability word given history proportional maximum likelihood estimate n -gram otherwise conditional probability equal back-off conditional probability n − 1 -gram difficult part determining values k α formula_2 least important parameters usually chosen 0 however empirical testing may find better values k. formula_3 typically amount discounting found good–turing estimation words good–turing estimates formula_4 formula_5 formula_6 compute formula_7 useful first define quantity β left-over probability mass n − 1 -gram back-off weight α computed follows formula applies data n − 1 -gram algorithm skips n-1 entirely uses katz estimate n-2 n-gram data found model generally works well practice fails circumstances example suppose bigram b unigram c common trigram b c never seen since b c common may significant due chance b c never seen perhaps allowed rules grammar instead assigning appropriate value 0 method back bigram estimate p c b may high
[ 715, 7372, 2832 ]
Train
4,427
7
RightNow_Technologies:rightnow technologies oracle rightnow customer relationship management crm software service enterprise organizations originally developed rightnow technologies inc. acquired oracle corporation 2011 company founded 1997 greg gianforte bozeman montana additional offices opened california new york new jersey massachusetts texas illinois washington dc colorado canada europe australia asia company employed 1000 people 2011 rightnow business model software service using cloud computing gianforte started company 1997 without external capital created software product initially focused customer service integrated knowledge base company grew added marketing sales functionality voice automation customer feedback management analytics social platform product creating full customer experience suite 2004 rightnow technologies raised 44.1m million successful ipo nasdaq exchange 2006 rightnow technologies acquired sfa company salesnet 2009 rightnow technologies acquired social networking company hivelive 2011 company acquired q-go 34 million q-go founded 1999 specialized semantic search service based natural language processing technology providing relevant answers queries company ’ internet website corporate intranet formulated natural sentences keyword input alike integrated automatic statistical reporting user query behavior businesses want monitor kinds questions customers asking adjust content provide appropriate information customers reduce load traditional customer service ports call call centers answers email technology implemented deployed range industries including banking insurance pension telecommunications logistics well several government agencies october 2011 oracle corporation announced intention acquire rightnow 1.5 billion deal completed january 2012 main product offered rightnow technologies rightnow cx customer experience suite rightnow cx divided rightnow web experience rightnow social experience rightnow contact center experience rightnow engage
[ 6270, 6184, 1185, 6279, 6281, 7368, 1105, 330, 418, 1223, 1590, 2961, 5429, 7213, 5612, 5882, 971 ]
Test
4,428
2
OS/VS1:os/vs1 operating system/virtual storage 1 os/vs1 discontinued ibm mainframe computer operating system designed run ibm system/370 hardware successor multiprogramming fixed number tasks mft option system/360 operating system os/360 os/vs1 comparison predecessor supported virtual memory called virtual storage os/vs1 generally available 1970s 1980s longer supported ibm os/vs1 os/360 mft ii single virtual address space comparison os/vs2 svs os/360 mvt single virtual address space os/vs1 often installed mid-range ibm mainframe systems system/370 model 145 later system/370 model 148 os/vs1 intended manage medium-sized work load 1970s consisting batch processing applications running within fixed number operating system partitions via batch job management system job entry subsystem 1 jes1 contrast os/vs2 intended handle larger work loads consisting batch applications online interactive users using time sharing option tso combination however os/vs1 could often support interactive applications users running ibm cics transaction processing monitor job within one partitions installation modification os/vs1 accomplished via ibm cumbersome system generation sysgen process os/vs1 included replacement os/360 rje allowed submission retrieval jobs 2770 2780 3780 terminals workstation programs included os/vs1 e.g. 1130 res included remote terminal access method closer integration job management rje os/vs1 went seven product releases os/vs1 release 7 enhanced fourth release ibm os/vs1 basic programming extensions bpe product bpe provided support new 1980s hardware 3380 dasd disk last os/vs1 product release os/vs1 basic programming extensions bpe release 4 announced ibm 1983 general availability march 1984 product 5662-257 announcement letter 283-266 15 september 1983 ibm announced end functional enhancements os/vs1 1984 ibm recommended os/vs1 installations migrate mvs/370 mvs/xa assist migration mvs/xa ibm made vm/xa migration aid allowed installations run os/vs1 mvs/xa simultaneously machine guests third systemvm/xa way new mvs/xa system could tested old production os/vs1 system still use although ibm time sharing option tso required vs2 customers 370/145 370/148 time-sharing options. br one combination vm/cms time sharing guest machine running os/360 mft ii batch optional component os/360 mft ii os/360 mvt os/vs1 crje allowed user line-mode terminal edit text datasets submit jobs access job output non-ibm time-sharing product named tone tso-like vs1 vs one marketed tone software co
[ 1522, 4291, 7605, 7331, 6518, 4670, 6705, 8066, 8173, 7172, 299, 5481, 5571, 4145, 5041, 7546, 4421, 3201, 5396, 5932, 3874, 7003, 402, 839, 4428, 5764, 850, 5244, 2786, 607, 2431, 3664, 6849, 4366, 265, 6957, 1516, 1994 ]
Test
4,429
4
Bobby_Ray_Inman:bobby ray inman bobby ray inman born april 4 1931 retired united states navy admiral held several influential positions united states intelligence community inman born raised community rhonesboro upshur county texas eastern portion state father owner operator gas station inman attended graduated mineola high school inman recalled 1986 5 4 tall weighed upon graduation tutored athletes admired high school keep bullied inman graduated mineola high school mineola texas age 15 1946 rode bus mineola tyler junior college member phi theta kappa national honor society graduated university texas degree history age 19 according budiansky joining naval reserve korean war inman rocketed ranks naval intelligence inman served director naval intelligence september 1974 july 1976 moved defense intelligence agency served vice director 1977 next became director national security agency inman held post 1981 last major position deputy director central intelligence post held february 12 1981 june 10 1982 simultaneously acting nsa director cia deputy director early 1981 modernized collection process setting joint facility college park maryland according budiansky inman sending memos back forth approving solutions 1976 martin hellman whitfield diffie published paper new directions cryptography introducing radically new method distributing cryptographic keys went far toward solving one fundamental problems cryptography key distribution become known diffie–hellman key exchange however hellman two graduate students attempted present work october 10 1977 international symposium information theory national security agency warned would legally equivalent exporting nuclear weapons hostile foreign power inman led nsa time feared encryption – far used military purposes – would used hostile foreign powers reducing ability nsa collect signals intelligence however hellman – anticipated increasing use electronic communications private sector transactions would require encryption – proceeded give talk defied nsa threat prosecution inman eventually realised hellman point prosecution hellman inman even became friends public key cryptography forms essential component internet security inman chaired commission improving security u.s. foreign installations marine barracks bombing april 1983 us embassy bombing beirut lebanon commission report influential setting security design standards u.s. embassies retirement navy chairman chief executive officer microelectronics computer technology corporation mcc austin texas four years chairman president chief executive officer westmark systems inc. privately owned electronics industry holding company three years admiral inman also served chairman federal reserve bank dallas 1987 1990 admiral inman ’ primary activity since 1990 investing start-up technology companies managing director limestone ventures member board directors several privately held companies serves trustee american assembly california institute technology elected fellow national academy public administration president clinton nominated secretary defense withdrew nomination see inman also board saic since 2001 inman held lbj centennial chair national policy university texas austin lyndon b. johnson school public affairs 2005 2009 school interim dean inman graduated texas bachelor history 1950 inman also served board directors council foreign relations dell computer sbc corporation massey energy 2011 became head board directors xe services formerly erik prince blackwater known academi 2013 sits board directors academi inman announced president bill clinton choice succeed les aspin secretary defense december 16 1993 initially receiving broad bipartisan support accepted post first withdrew nomination press conference january 18 1994 press conference inman made angry remarks comments new york times columnist william safire safire wrote paragraphs inman anti-israel bias shown ended four-point list negative qualifications reply inman suggested safire recruited senator bob dole kansas engage vitriolic attack inman also claimed dole senator trent lott planning turn heat nomination dole reaction state idea gotten bobby inman ... admiral inman letter n't make sense lott appeared even surprised saying floored inman bizarre press conference unnamed white house aide added us glued tube mouths open shock 1994 bobby ray inman requested withdrawn consideration defense secretary critics speculated decision motivated desire conceal links international signal control isc inman member board directors company allegedly either negligent approved illegal exports originally called esi electronic systems international company manufactured sub-assemblies agm-45 shrike rim-7 sea sparrow missiles 1974 vietnam war part standard arms contract us defense administration dcas company also commercial repair facility two meter portable amateur ham radios company new jersey called clegg manufactured communications helmet radios firemen electronic outdoor bug zappers isc involved two major indiscretions ceo james guerin received 15-year prison sentence 1984 1988 isc sent south africa 30 million military-related equipment including telemetry tracking antennae collect data missiles flight gyroscopes guidance systems photo-imaging film readers would form backbone medium-range missile system technology reportedly transferred iraq another link iraq supply specifications mk 20 rockeye ii cluster bomb chilean defense company cardoen industries able build almost identical weapon subsequently used coalition forces persian gulf war january–february 1991 2006 inman criticized bush administration use warrantless domestic wiretaps making one highest-ranking former intelligence officials criticize program public
[ 4210, 972, 820, 2566, 1278, 6627, 3716, 7917, 5412, 5767, 5509, 4988, 2789, 2343, 4996, 3335, 1701, 4201 ]
Validation
4,430
1
TokuMX:tokumx tokumx open-source distribution mongodb among things replaces default b-tree data structure found basic mongodb distribution fractal tree index drop-in replacement mongodb applications run offers scalability performance improvements associated fractal tree indexing also adds support document-level locking transaction support acid mvcc replication optimization support full-text search tokumx specifically designed high performance write-intensive workloads achieves using fractal tree index replaces 40-year-old b-tree indexing based cache-oblivious algorithms approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university state university new york stony brook suny tokumx scalable acid mvcc compliant distribution mongodb provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory also adds transactions mvcc acid reliability mongodb application making mongodb suitable much wider range solutions tokumx source files made available terms gnu affero general public license agpl tokukv fractal tree indexing library made available terms gnu general public license gpl version 2 additional grant patent license relational databases use indexes increase query performance databases leverage indexes significantly reduce amount data examine responding queries indexes commonly implemented b-trees data structure first described 1970 b-tree data structure allows operations like inserting data sorted order iteration primary operation used index depending workload implementation b-tree performance limited random i/o characteristics disks addition freshly loaded databases tend good sequential behavior behavior becomes increasingly difficult maintain database grows resulting random i/o performance challenges advent big data ever-increasing database needs 21st century many niche databases created get around limitations 50-year-old b-tree indexing include optimized reads optimized writes series special-purpose databases designed narrow problem set fractal tree indexing technology new approach indexing replaces b-trees fractal tree indexes implement operations b-tree thus drop-in replacement b-trees fractal tree indexes effectively replaces small frequent writes larger less frequent ones enables better compression insertion performance fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree index modifications cause database files fragment periodic maintenance compactify files needed fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks web 2.0 clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility ecommerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries
[ 80, 2054, 3244, 1730, 5447 ]
Validation
4,431
7
Tableau_Software:tableau software tableau software american interactive data visualization software company founded january 2003 christian chabot pat hanrahan chris stolte mountain view california company currently headquartered seattle washington united states focused business intelligence august 1 2019 salesforce.com acquired tableau chabot hanrahan stolte researchers department computer science stanford university specialized visualization techniques exploring analyzing relational databases data cubes company started commercial outlet research produced stanford 1999-2002 tableau products query relational databases online analytical processing cubes cloud databases spreadsheets generate graph-type data visualizations products also extract store retrieve data in-memory data engine tableau products include tableau mapping functionality able plot latitude longitude coordinates connect spatial files like esri shapefiles kml geojson display custom geography built-in geo-coding allows administrative places country state/province county/district postal codes us congressional districts us cbsa/msa area codes airports european union statistical areas nuts codes mapped automatically group geographies create custom territories use custom geocoding extend existing geographic roles product tableau founded 2003 pat hanrahan christian chabot chris stolte moved headquarters fremont neighborhood seattle washington following year company since expanded fremont headquarters announced plans 2016 auxiliary campus suburban kirkland washington new headquarters building opened near gas works park wallingford march 2017 followed new building fremont opened 2018 august 2016 tableau announced appointment adam selipsky president ceo effective september 16 2016 replacing co-founder christian chabot ceo june 2018 tableau acquired empirical systems cambridge massachusetts based artificial intelligence startup plans integrate company technology tableau platform tableau also announced plans establish office cambridge result deal june 10 2019 tableau acquired salesforce stock deal worth 15 billion may 17 2013 tableau launched initial public offering new york stock exchange raising 250 million prior ipo tableau raised 45 million venture capital investment investors nea meritech company 2013 revenue reached 232.44 million 82 growth 2012 128 million 2010 tableau reported revenue 34.2 million figure grew 62.4 million 2011 127.7 million 2012 profit periods came 2.7 million 3.4 million 1.6 million respectively june 10 2019 salesforce.com announced would acquiring tableau 15.7 billion dollar deal december 2 2010 tableau deleted wikileaks visualizations united states diplomatic cables leak stating due directly political pressure us senator joe lieberman february 21 2011 tableau posted updated data policy accompanying blog post cited two main changes 1 creating formal complaint process 2 using freedom speech guiding principle addition post announced creation advisory board help company navigate future situations push boundaries policy tableau likened new policy model set forth digital millennium copyright act opined new policy wikileaks visuals would removed underlying data statistics cables cables 2008 tableau named codie award winner best business intelligence solution software information industry association company recognized leader gartner magic quadrant seven consecutive years 2012 2019
[ 6462, 4163, 7705, 7037, 53 ]
Test
4,432
9
External_variable:external variable c programming language external variable variable defined outside function block hand local automatic variable variable defined inside function block understand external variables relate codice_1 keyword necessary know difference defining declaring variable variable defined compiler allocates memory variable possibly also initializes contents value variable declared compiler requires variable defined elsewhere declaration informs compiler variable name type exists compiler need allocate memory since allocated elsewhere codice_1 keyword means declare without defining words way explicitly declare variable force declaration without definition also possible explicitly define variable i.e force definition done assigning initialization value variable neither codice_1 keyword initialization value present statement either declaration definition compiler analyse modules program decide variable must defined exactly one modules program definition one error produced possibly linking stage variable may declared many times long declarations consistent definition something header files facilitate greatly may declared many modules including module defined even many times module usually pointless declare module external variable may also declared inside function case codice_1 keyword must used otherwise compiler consider definition local automatic variable different scope lifetime initial value declaration visible inside function instead throughout function module codice_1 keyword applied function prototype absolutely nothing codice_1 keyword applied function definition course non-sensical function prototype always declaration never definition also standard c function always external compiler extensions allow function defined inside function external variable accessed functions modules program global variable function able use variable declaration definition external variable must lie function definition source code must declaration variable keyword codice_1 inside function codice_8 keyword codice_8 codice_1 mutually exclusive applied definition external variable changes bit variable accessed functions module defined possible function module pass reference pointer variable another function another module case even though function another module read modify contents variable—it refer name also possible use codice_8 keyword definition local variable without codice_8 keyword variable automatically allocated function called released function exits thus name automatic variable value retained function calls codice_8 keyword variable allocated program starts released program ends value lost function calls variable still local since accessed name inside function defined reference pointer passed another function allowing read modify contents variable without referring name external variables allocated initialized program starts memory released program ends lifetime program initialization done explicitly external static local static variables initialized zero local automatic variables uninitialized i.e contain trash values codice_8 keyword applied function definition changes linkage function visible translation unit definition located prevents function called name outside module remains possible pass function pointer module use invoke function declaring function using codice_8 keyword also good way keep name short avoiding name clashes file 1 file 2 example variable global_variable defined file 1 order utilize variable file 2 must declared regardless number files global variable defined however must declared file outside one containing definition normal methodology allocation actual definitions go .c files mere declarations prototypes allocate describe types parameters compiler work correctly information belongs .h header file others safely include without possible conflict
[ 790, 5948, 4432, 7333, 2803, 1435 ]
Test
4,433
4
E-commerce_identification_and_identification_types:e-commerce identification identification types whole new range techniques developed identify people since 1960s measurement analysis parts bodies dna profiles forms identification used ensure citizens eligible rights benefits vote without fear impersonation private individuals used seals signatures centuries lay claim real personal estate. “ generally amount proof identity required gain access something proportionate value sought estimated 4 online transactions use methods simple passwords security systems resources generally follows three-step process ” identification authentication authorization today high level trust critical ecommerce transactions traditional face-to-face transactions scheme established maintained whereby users properly consistently effectively efficiently identified systems accessed identity verification service often employed ensure users customers provide information associated identity real person authentication verification identity entity requesting access system process determining whether someone something fact declared private public computer networks including internet authentication commonly done use logon passwords knowledge password assumed guarantee user authentic user registers initially registered someone else using assigned self-declared password subsequent use user must know use previously declared password weakness system transactions significant exchange money passwords often stolen accidentally revealed forgotten reason internet business many transactions require stringent authentication process use digital certificates issued verified certificate authority ca part public key infrastructure considered likely become standard way perform authentication internet logically authentication precedes authorization although may often seem combined authorization process giving someone permission something multi-user computer systems system administrator defines system users allowed access system privileges use access file directories hours access amount allocated storage space forth assuming someone logged computer operating system application system application may want identify resources user given session thus authorization sometimes seen preliminary setting permissions system administrator actual checking permission values set user getting access logically authorization preceded authentication
[ 5149, 7865, 3794, 7120 ]
Test
4,434
7
Marabunta_(software):marabunta software marabunta fully distributed software application anonymous p2p main goal fight internet censorship assuring freedom speech peer-to-peer platform information exchange among nodes anonymous way based several communication algorithms called order chaos found massive social organizations ant colonies project founded university zaragoza spain developed promoted students computing engineering although development teams users many different places shown interest perhaps attracted ideological aims project software available spanish english website also available english marabunta uses qt graphical widget toolkit allowing used linux microsoft windows released gnu general public license marabunta free software marabunta implementation ideas explained free nets project developed ideas mind many potential services run top marabunta text message interchange first service could taken platform telegram distribution computer net works host server four message distribution lists receivers receive messages sent list interested general technology philosophy politics content filters allowed messages certain patterns displayed specially useful searching specific information marabunta selects potentially interesting messages generated traffic uses udp/ip protocols avoiding setting connections nodes lets traffic flow network operational redundancy every node used moreover udp protocol could seen increasing anonymity net need validate source hosts receive datagram marabunta support udp hole punching users behind nats establish port forwarding route let router know port node internal net forward arriving datagrams
[ 2984, 3172, 4759, 7714, 7343, 2390, 5571, 578, 2664, 6025, 2681, 3573, 3821, 2430, 2696, 5531, 4014 ]
Test
4,435
2
Linus_Torvalds:linus torvalds linus benedict torvalds born december 28 1969 finnish-american software engineer creator historically principal developer linux kernel kernel linux operating systems distributions operating systems android chrome os also created distributed version control system git scuba dive logging planning software subsurface honored along shinya yamanaka 2012 millennium technology prize technology academy finland recognition creation new open source operating system computers leading widely used linux kernel also recipient 2014 ieee computer society computer pioneer award 2018 ieee masaru ibuka consumer electronics award torvalds born helsinki finland 1969 son journalists anna nils torvalds grandson statistician leo törnqvist poet ole torvalds parents campus radicals university helsinki 1960s family belongs swedish-speaking minority torvalds named linus pauling nobel prize-winning american chemist although book rebel code linux open source revolution torvalds quoted saying think named equally linus peanuts cartoon character noting makes half nobel prize-winning chemist half blanket-carrying cartoon character torvalds attended university helsinki 1988 1996 graduating master degree computer science nodes research group academic career interrupted first year study joined finnish army uusimaa brigade summer 1989 selecting 11-month officer training program fulfill mandatory military service finland army held rank second lieutenant role ballistic calculation officer torvalds bought computer science professor andrew tanenbaum book tanenbaum describes minix educational stripped-down version unix 1990 resumed university studies exposed unix first time form dec microvax running ultrix m.sc thesis titled linux portable operating system interest computers began commodore vic-20 age 11 1981 initially programming basic later directly accessing 6502 cpu machine code make use assembly language vic-20 purchased sinclair ql modified extensively especially operating system hard get software finland linus wrote assembler editor addition pac-man graphics libraries ql well games wrote pac-man clone named cool man january 5 1991 purchased intel 80386-based clone ibm pc receiving minix copy turn enabled begin work linux first prototypes linux publicly released later year 1991 version 1.0 released march 14 1994 torvalds first encountered gnu project 1991 another swedish-speaking computer science student lars wirzenius took university technology listen free software guru richard stallman speech torvalds used stallman gnu general public license version 2 gplv2 linux kernel visit transmeta late 1996 torvalds accepted position company california would work february 1997 june 2003 moved open source development labs since merged free standards group become linux foundation whose auspices continues work june 2004 torvalds family moved dunthorpe oregon closer osdl beaverton oregon-based headquarters 1997 1999 involved 86open helping choose standard binary format linux unix 1999 named mit technology review tr100 one world top 100 innovators age 35 1999 red hat va linux leading developers linux-based software presented torvalds stock options gratitude creation year companies went public torvalds share value temporarily shot roughly us 20 million personal mascot penguin nicknamed tux widely adopted linux community mascot linux kernel although torvalds believes open source right way software also said uses best tool job even includes proprietary software criticized use alleged advocacy proprietary bitkeeper software version control linux kernel torvalds subsequently wrote free-software replacement bitkeeper called git 2008 torvalds stated used fedora distribution linux fairly good support powerpc processor architecture favored time usage fedora confirmed later 2012 interview also posted updates choice desktop environment often response perceived feature regressions currently linux foundation sponsors torvalds work full-time improving linux linus torvalds known disagreeing developers linux kernel mailing list calling really unpleasant person later explained 'd like nice person curse less encourage people grow rather telling idiots 'm sorry – tried attitude torvalds considers necessary making point clear drawn criticism intel programmer sage sharp systemd developer lennart poettering among others sunday september 16 2018 linux kernel code conflict suddenly replaced new code conduct based contributor covenant shortly thereafter release notes linux 4.19-rc4 linus apologized behavior calling personal attacks past unprofessional uncalled announced period time get assistance understand people ’ emotions respond appropriately soon transpired events followed new yorker approaching linus series questions critical conduct following release linux 4.19 october 22 linus went back maintaining kernel initially torvalds wanted call kernel developed freax combination free freak letter x indicate unix-like system friend ari lemmke administered ftp server kernel first hosted download named torvalds directory linux 2006 approximately two percent linux kernel written torvalds thousands contributed linux kernel percentage one largest contributions however stated 2012 personal contribution mostly merging code written others little programming torvalds retains highest authority decide new code incorporated standard linux kernel torvalds holds linux trademark monitors use chiefly linux mark institute linus torvalds married tove torvalds née monni —a six-time finnish national karate champion—whom first met late 1993 linus running introductory computer laboratory exercises students instructed course attendees send e-mail test tove responded e-mail asking date tove linus later married three daughters patricia miranda born 1996 daniela yolanda born 1998 celeste amanda born 2000 two born united states linux kernel reboot system call accepts dates birth written hexadecimal magic values torvalds described completely a-religious—atheist adding find people seem think religion brings morals appreciation nature actually think detracts gives people excuse say 'oh nature created act creation seen something miraculous appreciate fact 'wow incredible something like could happened first place later added europe religion mostly personal issue united states become politicized discussing issue church state separation torvalds also said yeah kind ironic many european countries actually kind legal binding state state religion however story march linuxworld conference titled linus liberator torvalds quoted saying like two golden rules life one 'do unto others would want unto reason people associate christianity 'm christian 'm agnostic rule 'be proud 2010 torvalds became united states citizen registered vote united states unaffiliated u.s. political party saying way much personal pride want associated quite frankly linus developed interest scuba diving early 2000s went achieve numerous certifications later led creating subsurface project time magazine recognized torvalds multiple times infoworld presented 2000 award industry achievement 2005 torvalds appeared one best managers survey businessweek 2006 business 2.0 magazine named one 10 people n't matter growth linux shrunk torvalds individual impact summer 2004 viewers yle finnish broadcasting company placed torvalds 16th network 100 greatest finns 2010 part series called britannica guide world influential people torvalds listed among 100 influential inventors time october 11 2017 linux company suse made song titled linus said
[ 5366, 2182, 3938, 3613, 1822, 7528, 7532, 2559, 1835, 5744, 6443, 7555, 4341, 7559, 5759, 5059, 5762, 412, 3666, 6489, 7587, 5784, 1893, 5086, 2260, 6861, 7954, 5453, 5803, 4759, 7242, 462, 1535, 1924, 6892, 7251, 1176, 4401, 6525, 474, ...
Test
4,436
8
WS-ReliableMessaging:ws-reliablemessaging ws-reliablemessaging describes protocol allows soap messages reliably delivered distributed applications presence software component system network failures original specification written bea systems microsoft ibm tibco march 2003 subsequently refined next two years february 2005 version submitted oasis web services reliable exchange ws-rx technical committee june year resulting ws-reliablemessaging 1.1 approved oasis standard june 14 2007 v1.2 approved february 2 2009 prior ws-reliablemessaging oasis produced competing standard ws-reliability supported coalition vendors namely fujitsu hitachi nec oracle corporation progress software sun microsystems vendors also support ws-reliablemessaging specification application source wishes reliably send messages application destination ad unreliable infrastructure accomplish make use reliable messaging source rms reliable messaging destination rmd sends message rms rms uses ws-reliablemessaging ws-rm protocol transmit message rmd rmd delivers message ad rms transmit message rmd reason must raise exception otherwise indicate message transmitted rms may implemented within process space may separate components similarly ad rmd may exist within process space may separate components important thing keep mind ws-rm specification deals contents behavior messages appear wire messages sent rms delivered rmd ad whether messages persisted on-disk held memory etc none considerations part ws-rm specification ws-rm protocol defines supports number delivery assurances ws-reliablemessaging uses extensibility model soap wsdl ws-reliablemessaging define features required complete messaging solution ws-reliablemessaging building block used conjunction web services specifications application-specific protocols build complete messaging solution article attempts make case reliability needed message level required business level
[ 5822, 6986, 5500, 5631, 5874, 3498, 7136, 7315, 1286 ]
Test
4,437
1
UnixODBC:unixodbc unixodbc open-source project implements odbc api code provided gnu gpl/lgpl built used many different operating systems including versions unix linux mac os x ibm os/2 microsoft interix goals project include unixodbc project first started early months 1999 peter harvey created time developers iodbc another open source odbc implementation willing lgpl code expand api include current odbc 3 api specification consider addition gui based configuration tools worthwhile iodbc parts added applications use odbc interface may use iodbc unixodbc without change cases result projects adhering single odbc specification original driver manager basic driver manager rewritten easysoft nick gorham soon project started nick assumed leadership project july 1999 peter harvey continuing work supporting code development unixodbc progressed since origin contributions many developers open source community also commercial database companies including ibm oracle corporation sap included part standard installation many linux distributions unixodbc project split several projects hosted sourceforge split done allow faster releases supporting work maintaining focus stability consistency core code
[ 3915, 4759, 5571, 578 ]
Test
4,438
6
Directory_structure:directory structure computing directory structure way operating system file system files displayed user files typically displayed hierarchical tree structure filename string used uniquely identify file stored file system computer advent 32-bit operating systems file names typically limited short names 6 14 characters size modern operating systems typically allow much longer filenames 250 characters per pathname element dos windows os/2 root directory drive example root directory usually c directory separator usually operating system also internally recognizes physical virtual drives named drive letter opposed combined one means formal root directory rather independent root directories drive however possible combine two drives one virtual drive letter setting hard drive raid setting 0 following folders may appear root boot partition unix unix-like operating systems use filesystem hierarchy standard common form directory structures files directories appear root directory even stored different physical devices
[ 1710, 2361, 3843, 4759, 6264, 4771, 3626, 5480, 1471, 5571, 1281, 4059, 6640, 4174, 3905, 1128, 1047, 4275, 6857, 2528, 4017 ]
Test
4,439
1
DB-Engines_ranking:db-engines ranking db-engines ranking ranks database management systems popularity covering 340 systems ranking criteria include number search engine results searching system names google trends stack overflow discussions job offers mentions systems number profiles professional networks linkedin mentions social networks twitter ranking updated monthly described cited various database-related articles grouping specific database features like database model type license regularly published statistics reveal historical trends used strategic statements db-engines dbms portal created 2012 maintained austrian consulting company solid based ranking db-engines grants yearly award system gained popularity within year award winners ranking might measure actual usage number installations systems may may correspond number users furthermore quality features systems direct impact ranking
[ 7213, 6462, 7303, 2966, 674, 7341, 3542, 7715, 4511, 5956 ]
Validation
4,440
4
Cyber_security_standards:cyber security standards information storage transit applications services systems connected directly indirectly networks principal objective reduce risks including prevention mitigation cyber-attacks published materials consist collections tools policies security concepts security safeguards guidelines risk management approaches actions training best practices assurance technologies cybersecurity standards existed several decades users providers collaborated many domestic international forums effect necessary capabilities policies practices generally emerging work stanford consortium research information security policy 1990s 2016 us security framework adoption study reported 70 surveyed organizations nist cybersecurity framework popular best practice information technology computer security many note requires significant investment iso/iec 27001 part growing iso/iec 27000 family standards information security management system isms standard last revision published october 2013 international organization standardization iso international electrotechnical commission iec full name iso/iec 27001:2013 – information technology – security techniques – information security management systems – requirements iso/iec 27001 formally specifies management system intended bring information security explicit management control iso/iec 27002 incorporates mainly part 1 bs 7799 good security management practice standard latest versions bs 7799 bs 7799-3 sometimes iso/iec 27002 therefore referred iso 17799 bs 7799 part 1 sometimes refers part 1 part 7 bs 7799 part 1 provides outline good practice guide cybersecurity management whereas bs 7799 part 2 iso/iec 27001 normative therefore provide framework certification iso/iec 27002 high level guide cybersecurity beneficial explanatory guidance management organisation obtain certification iso/iec 27001 standard certification obtained lasts three years depending auditing organisation intermediate audits may carried three years iso/iec 27001 isms replaces bs 7799 part 2 since backward compatible organization working toward bs 7799 part 2 easily transition iso/iec 27001 certification process also transitional audit available make easier organization bs 7799 part 2-certified organization become iso/iec 27001-certified iso/iec 27002 provides best practice recommendations information security management use responsible initiating implementing maintaining information security management systems isms states information security systems required implement iso/iec 27002 control objectives without iso/iec 27001 iso/iec 27002 control objectives ineffective iso/iec 27002 controls objectives incorporated iso 27001 annex a. iso/iec 21827 sse-cmm – iso/iec 21827 international standard based systems security engineering capability maturity model sse-cmm measure maturity iso controls objectives north american electric reliability corporation nerc addresses patching nerc cip 007-6 requirement 2 summarily requires bulk power system bps operators/owners identify source sources utilized provide entiter security related patches cyber assets utilized operation registered entities required check new patches every thirty five calendar days upon identification new patch entities required evaluate applicability patch complete mitigation installation activities within 35 calendar days completion assessment applicability.e bps.y initial attempt create information security standards electrical power industry created nerc 2003 known nerc css cyber security standards subsequent css guidelines nerc evolved enhanced requirements widely recognized modern nerc security standard nerc 1300 modification/update nerc 1200 newest version nerc 1300 called cip-002-3 cip-009-3 cip=critical infrastructure protection standards used secure bulk electric systems although nerc created standards within areas bulk electric system standards also provide network security administration still supporting best-practice industry processes standard develops called “ common criteria ” allows many different software hardware products integrated tested secure way iasme governance uk-based standard information assurance small-to-medium enterprises smes provides criteria certification small-to-medium business cybersecurity readiness also allows small medium business provide potential existing customers clients accredited measurement cybersecurity posture enterprise protection personal/business data iasme governance standard developed enable businesses achieve accreditation similar iso 27001 reduced complexity cost administrative overhead specifically focused sme recognition difficult small cap businesses achieve maintain iso 27001 certifications iasme governance standard include free basic cyber security insurance uk-based sme applicants cost certification progressively graduated based upon employee population sme e.g. 10 fewer 11 25 26 100 101 250 employees certification based upon self-assessment iasme questionnaire third-party professional assessor insurance companies reduce premiums cybersecurity related coverage based upon iasme certification october 2016 federal reserve board office comptroller currency federal deposit insurance corporation jointly issued advance notice proposed rulemaking anpr regarding cyber risk management standards regulated entities anpr aims enhance ability large interconnected financial services entities prevent recover cyber attacks goes beyond existing requirements proposal requires entities total assets 50 billion third party service providers take steps strengthen incident response programs enhance cyber risk governance management practices may 2017 us based federal financial institutions examination council issued cyber security assessment tool tool includes completing inherent risk profile organization covers five areas european telecommunications standards institute etsi established new cyber security committee tc cyber 2014 meet growing demand ev guidance protect internet communications business carries tc cyber working closely relevant stakeholders develop appropriate standards increase privacy security organisations citizens across europe committee looking particular security infrastructures devices services protocols well security tools techniques ensure security offers security advice guidance users manufacturers network infrastructure operators standards freely available on-line principal work item effort production cyber security ecosystem standardization activities 1990s information security forum isf published comprehensive list best practices information security published standard good practice sogp isf continues update sogp every two years latest version published 2018 among programs isf offers member organizations comprehensive benchmarking program based sogp furthermore important charge security management understand adhere nerc cip compliance requirements ansi/isa 62443 series standards technical reports related information define procedures implementing secure industrial automation control systems iacs guidance applies stakeholders implementing managing iacs documents originally referred ansi/isa-99 isa99 standards created international society automation isa publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec input iec 62443 series international standards following iec standards development process established 2007 international security compliance institute isci created first conformity assessment scheme commonly known certification scheme ansi/isa 62443 standards program certifies commercial off-the-shelf cots automation control systems iot devices addressing securing control systems supply chain isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve ansi/isa 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure working groups included subject matter experts traditional process industries building management system suppliers asset owners isasecure scheme requires products properly tested supplier development process conformance ansi/isa 62443-4-1. exida united states first certification body accredited isasecure scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks five additional certification bodies accredited 2019 including tuv sud two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products iec 62443-4-1 iec 62443-4-2 cybersecurity standards isasecure-ssa system security assurance certifying systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies automation systems development organizations iec 62443-4-1 cybersecurity standard isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab dakks singapore accreditation council global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized iec-62443 cybersecurity standards multi-industry standards listing cybersecurity protection methods techniques documents result iec standards creation process ansi/isa-62443 proposals inputs submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures describes test methods surveillance audit policy public documentation policies specific aspects program cybersecurity certification programs iec 62443 standards offered globally several recognized cbs including exida sgs-tüv saar tüv nord tüv rheinland tüv sud ul certx automation system market space cybersecurity certifications done exida global infrastructure established ensure consistent evaluation per standards impartial third party organizations called certification bodies cb accredited operate iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs ...
[ 5269, 3932, 4025, 6515, 5723, 284, 4304, 5467, 7968, 3681, 3448, 2105, 651, 5568, 2566, 6725, 1188, 5485, 308, 1376, 3794, 7649, 5401, 2310, 6823, 3302, 7836, 748, 2491, 3474, 5149, 6208, 4256, 6376, 2678, 7558, 7560, 3038, 2055, 6756, ...
Test
4,441
2
TrueOS:trueos trueos formerly pc-bsd pcbsd unix-like server-oriented operating system built upon recent releases freebsd-current 2018 aimed easy install using graphical installation program easy ready-to-use immediately providing kde sc lumina lxde mate xfce desktop environment june 2018 developers announced trueos core os provides basis projects thus n't include graphical installer anymore graphical end-user-orientated oses based trueos ghostbsd trident trueos provides official binary nvidia intel drivers hardware acceleration optional 3d desktop interface kwin wine ready-to-use running microsoft windows software trueos able run linux software addition freebsd ports collection .txz package manager trueos supports openzfs installer offers disk encryption geli trueos founded freebsd professional kris moore early 2005 pc-bsd august 2006 voted beginner-friendly operating system osweekly.com first beta pc-bsd consisted gui installer get user running freebsd 6 system kde3 pre-configured major innovation time anyone wishing install freebsd would manually tweak run text installer kris moore goal make freebsd easy everyone use desktop since diverged even direction usability including additional gui administration tools .pbi application installers pc-bsd application installer management involved different approach installing software many unix-like operating systems including version 8.2 means pbidir website instead using freebsd ports tree directly although remained available pc-bsd used files .pbi filename extension push button installer double-clicked brought installation wizard program autobuild system tracked freebsd ports collection generated new .pbi files daily software packages dependencies installed inside .pbi files self-contained directories /programs convention aimed decrease confusion binary programs reside remove possibility package breaking system libraries upgraded changed prevent dependency hell october 10 2006 pc-bsd acquired enterprise-class hardware solution provider ixsystems ixsystems employs kris moore full-time developer leader project november 2007 ixsystems entered distribution agreement fry electronics whereby fry electronics stores nationwide carry boxed copies pc-bsd version 1.4 da vinci edition january 2008 ixsystems entered similar agreement micro center september 1 2016 pc-bsd team announced name operating system change trueos along rebranding project also became rolling release distribution based freebsd-current branch november 15 2016 trueos began transition freebsd rc.d openrc default init system apart gentoo/alt openrc initially developed major bsd based operating system using openrc july 2018 trueos announced would spin desktop edition separate project named project trident since version 7 pc-bsd began following numbering system freebsd since version 9.0 kde sc customized support tighter application integration .txz package management system longer desktop environment supported pc-bsd manual installation desktops xfce gnome technically possible earlier releases none supported earlier versions major functionality lost using pc-bsd special build kde sc starting version 9.0 pc-bsd added desktop environments including gnome xfce lxde mate pc-bsd used support amd64 i686 architectures support i686 dropped version 9.2 starting september 2016 rebranding pc-bsd trueos became rolling release distribution based freebsd current branch trueos package manager takes similar approach installing software many unix-like operating systems instead using freebsd ports tree directly although remains available trueos uses files .txz filename extension packages contain compiled ports autobuild system tracks freebsd ports collection generates new .txz files daily trueos package management system aims visually similar major operating systems microsoft windows apple macos applications installed single download link graphical prompts maintaining internally traditional .txz package management systems many unix-like systems use trueos package manager also takes care creating categorized links kde menu kde sc desktop 2014 pc-bsd project announced development new desktop environment scratch named lumina ken moore main developer lumina based qt toolkit july 2016 lumina web site desktop environment application development toolkit aims graphical interface uses plugins customization trueos originally licensed gnu general public license gpl developers impression applications using qt trueos uses interface development must licensed gpl q public license upon discovering fact restriction trueos developers later relicensed code bsd-like 3-clause license trueos trueos logo registered trademarks ixsystems inc new york city *bsd user group runs service named dmesgd provides user-submitted dmesg information different computer hardware laptops workstations single-board computers embedded systems virtual machines etc capable running trueos according trueos wiki trueos following hardware requirements uefi support amd64 added installer boot manager since version 10.1 default efi boot manager refind includes acpi detection setup root system description pointer rsdp extended system descriptor table xsdt root system description table rsdt pass-through values kernel new installation needed order install uefi support requires creation small fat partition current uefi support secure boot
[ 7514, 6794, 5726, 6085, 4675, 6428, 5386, 732, 738, 3636, 7555, 2583, 5760, 3986, 5065, 2594, 6477, 4725, 424, 1128, 6489, 6149, 781, 5440, 6860, 443, 5092, 6505, 1522, 1523, 4759, 7619, 7251, 1547, 3366, 481, 4778, 2300, 1193, 4059, 80...
Test
4,442
0
Acoustic_model:acoustic model acoustic model used automatic speech recognition represent relationship audio signal phonemes linguistic units make speech model learned set audio recordings corresponding transcripts created taking audio recordings speech text transcriptions using software create statistical representations sounds make word modern speech recognition systems use acoustic model language model represent statistical properties speech acoustic model models relationship audio signal phonetic units language language model responsible modeling word sequences language two models combined get top-ranked word sequences corresponding given audio segment modern speech recognition systems operate audio small chunks known frames approximate duration 10ms per frame raw audio signal frame transformed applying mel-frequency cepstrum coefficients transformation commonly known mel frequency cepstral coefficients mfcc used input acoustic model along features recently use convolutional neural networks led big improvements acoustic modeling audio encoded different sampling rates i.e samples per second – common 8 16 32 44.1 48 96 khz different bits per sample common 8-bits 16-bits 24-bits 32-bits speech recognition engines work best acoustic model use trained speech audio recorded sampling rate/bits per sample speech recognized limiting factor telephony based speech recognition bandwidth speech transmitted example standard land-line telephone bandwidth 64 kbit/s sampling rate 8 khz 8-bits per sample 8000 samples per second 8-bits per sample 64000 bit/s therefore telephony based speech recognition acoustic models trained 8 khz/8-bit speech audio files case voice ip codec determines sampling rate/bits per sample speech transmission codecs higher sampling rate/bits per sample speech transmission improve sound quality necessitate acoustic models trained audio data matches sampling rate/bits per sample speech recognition standard desktop pc limiting factor sound card sound cards today record sampling rates 16 khz-48 khz audio bit rates 8 16-bits per sample playback 96 khz general rule speech recognition engine works better acoustic models trained speech audio data recorded higher sampling rates/bits per sample using audio high sampling rate/bits per sample slow recognition engine compromise needed thus desktop speech recognition current standard acoustic models trained speech audio data recorded sampling rates 16 khz/16bits per sample
[ 6829, 7372, 2832 ]
Validation
4,443
4
Stockade_(software):stockade software stockade tcp-layer blocking tool written c++ denies tcp/ip access registered ip addresses using ipfw packet filter targets spam prevention may also used attackers e.g brute force password crackers approach leverages superior determination exhibited legitimate senders respect may considered similar greylisting originally authors conceived mt proxy rate-limit smtp connections messages believed spam worked adding dummynet rule frequent senders sending messages triggered unreliable statistical analysis key limitation original scheme consumption local resources smtp proxy stockade approach introduces notion inbound tcp connection may rejected random probability proportional level spam already seen connection ’ originator configurable period time probability subject decay configured halving time period ip address eventually rehabilitated way stockade provides fully automatic spam mitigation
[ 3364, 2626, 7214, 5571, 6908, 875, 7624, 1435 ]
Test
4,444
6
OrangeFS:orangefs orangefs open-source parallel file system next generation parallel virtual file system parallel file system type distributed file system distributes file data across multiple servers provides concurrent access multiple tasks parallel application orangefs designed use large-scale cluster computing used companies universities national laboratories similar sites worldwide orangefs emerged development branch pvfs2 much history shared history pvfs spanning twenty years extensive history behind orangefs summarized time line development branch new direction development orangefs branch begun 2007 leaders pvfs2 user community determined orangefs often described next generation pvfs2
[ 3599, 2547, 7161, 4672, 6431, 3626, 1802, 5049, 1105, 6117, 5064, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 5518, 6231, 869, 2704, 1605, 174, 2710, 16...
Test
4,445
8
Web_Services_for_Remote_Portlets:web services remote portlets web services remote portlets wsrp oasis-approved network protocol standard designed communications remote portlets wsrp specification defines web service interface interacting presentation-oriented web services initial work produced joint efforts web services interactive applications wsia web services remote portlets wsrp oasis technical committees approval wsrp v1 oasis standard september 2003 two technical committees merged continued work web services remote portlets wsrp oasis technical committee scenarios motivate wsrp functionality include wsrp specification make statements implementation java portlet specification jsr 168 wsrp competing technologies jsr 168 may used define portlet wsrp may used define portlet operations remote containers jsr 168 portlets wsrp may used together define portlet provide remote operations similarly .net portlets may created use wsrp interoperability jsr 168 .net wsrp implementations demonstrated several wsrp implementations assist developers first release wsrp v1 provided limited interoperability platform versions wsrp v1 abandoned effort could concentrated wsrp v2 wsrp v2 augments initial standard cross-portlet coordination access management features major update standard permits useful integration multiple content sources regardless whether local remote new web application addition wsrp v2 supports web 2.0 technologies ajax rest without requiring wsrp v2 approved oasis april 1 2008
[ 6986, 6991, 3290, 6281, 3383, 6029, 5500, 8006, 4082, 3900, 5432, 6059, 6858, 3498, 2530, 87, 6787 ]
Validation
4,446
4
Charlie_Miller_(security_researcher):charlie miller security researcher charles alfred miller american computer security researcher cruise automation prior current employment spent five years working national security agency worked uber miller holds bachelors mathematics minor philosophy northeast missouri state truman state university ph.d. mathematics university notre dame 2000 currently lives wildwood missouri miller publicly demonstrated many security exploits apple products 2008 10,000 cash prize hacker conference pwn2own vancouver british columbia canada first find critical bug macbook air following year 5,000 cracking safari 2009 collin mulliner demonstrated sms processing vulnerability allowed complete compromise apple iphone denial-of-service attacks phones 2011 found security hole iphone ipad whereby application contact remote computer download new unapproved software execute command could steal personal data otherwise using ios applications functions malicious purposes proof concept miller created application called instastock approved apple app store informed apple security hole promptly expelled app store miller participated research discovering security vulnerabilities nfc near field communication also published three books miller along chris valasek widely known remotely hacking 2014 jeep cherokee controlling braking steering acceleration vehicle
[ 6788, 6312, 1691, 1766, 2577, 1805 ]
Validation
4,447
2
Research_Unix:research unix research unix refers early versions unix operating system dec pdp-7 pdp-11 vax interdata 7/32 8/32 computers developed bell labs computing sciences research center term research unix first appeared bell system technical journal vol 57 6 pt 2 jul/aug 1978 distinguish versions internal bell labs pwb/unix mert whose code-base diverged primary csrc version however term little-used version 8 unix retroactively applied earlier versions well prior v8 operating system commonly called simply unix caps unix time-sharing system licensed version 5 educational institutions version 6 also commercial sites schools paid 200 others 20,000 discouraging commercial use version 6 widely used version 1980s research unix versions often referred edition manual describes early versions last never officially released outside bell labs grew organically first research unix would first edition last tenth edition another common way referring version x v x unix x manual edition modern editions unix—excepting unix-like implementations coherent minix linux—derive 7th edition starting 8th edition versions research unix close relationship bsd began using 4.1cbsd basis 8th edition usenet post 2000 dennis ritchie described later versions research unix closer bsd unix system v also included bsd code 2002 caldera international released unix v1 v2 v3 v4 v5 v6 v7 pdp-11 unix 32v vax foss permissive bsd-like software license 2017 unix heritage society alcatel-lucent usa inc. behalf nokia bell laboratories released v8 v9 v10 condition assert copyright rights respect non-commercial copying distribution performance display creation derivative works research unix®1 editions 8 9 10
[ 1807, 5362, 6789, 6085, 5048, 1105, 4344, 2589, 6470, 1493, 759, 4733, 6489, 5789, 443, 4020, 1522, 4751, 2272, 1537, 473, 5481, 2294, 2300, 1563, 5138, 6577, 6583, 3062, 1614, 7702, 4478, 7710, 554, 2379, 900, 6267, 6620, 5216, 3106, 5...
Test
4,448
2
Composite_UI_Application_Block:composite ui application block composite ui application block cab addition microsoft .net framework creating complex user interfaces made loosely coupled components developed microsoft patterns practices team cab used exclusively developing windows forms derivative version cab exists web client mobile client software factories well encourages developer use either model-view-controller model-view-presenter architectural pattern encourage reuse individual user controls referred cab smartparts coupling underlying data elements presentation code part foundation smart client software factory another patterns practices deliverable also part mobile client software factory version smart client software factory use .net compact framework 2.0
[ 7149, 6420, 714, 720, 1460, 1840, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 2018, 8085, 6989, 6991, 8094, 4...
Test
4,449
4
File_integrity_monitoring:file integrity monitoring file integrity monitoring fim internal control process performs act validating integrity operating system application software files using verification method current file state known good baseline comparison method often involves calculating known cryptographic checksum file original baseline comparing calculated checksum current state file file attributes also used monitor integrity generally act performing file integrity monitoring automated using internal controls application process monitoring performed randomly defined polling interval real-time changes configurations files file attributes across infrastructure common hidden within large volume daily changes impact file configuration integrity changes also reduce security posture cases may leading indicators breach progress values monitored unexpected changes files configuration items include multiple compliance objectives indicate file integrity monitoring requirement several examples compliance objectives requirement file integrity monitoring include examples include
[ 1710, 1882, 5452, 7984, 6558, 5571, 1328, 4036, 2381, 5908, 88 ]
Test
4,450
0
Language_Computer_Corporation:language computer corporation language computer corporation lcc natural language processing research company based richardson texas company develops variety natural language processing products including software question answering information extraction automatic summarization since founding 1995 low-profile company landed significant united states government contracts 8,353,476 contracts 2006-2008 company focused primarily government software market lcc also used technology spin three start-up companies first spin known lymba corporation markets poweranswer question answering product originally developed lcc 2010 lcc ceo andrew hickl co-founded two start-ups made use company technology included swingly automatic question answering start-up extractiv information extraction service founded partnership houston texas-based 80legs
[ 1314, 5429, 3651, 8065, 1732 ]
Validation
4,451
4
InSSIDer:inssider inssider wi-fi network scanner application microsoft windows os x developed metageek llc received awards 2008 infoworld bossie award best open source software networking inssider 3 longer open-source inssider began replacement netstumbler popular windows wi-fi scanner actively developed several years reputedly work modern 64-bit operating systems versions windows higher windows xp project inspired charles putney code project
[ 163, 4759, 5571, 37, 5181, 2530, 5046, 1435, 1708 ]
Test
4,452
8
Baynote:baynote baynote san jose california-based software company offering web search recommendation software service products based concept wisdom crowd also known collective intelligence search results ranked based analysis links pages visited users past september 2016 kibo software inc. announced purchased baynote undisclosed amount
[ 330, 84 ]
Test
4,453
3
System_7:system 7 system 7 codenamed big bang sometimes retrospectively called mac os 7 graphical user interface-based operating system macintosh computers part classic mac os series operating systems introduced may 13 1991 apple computer inc succeeded system 6 main macintosh operating system succeeded mac os 8 1997 features added system 7 release included virtual memory personal file sharing quicktime quickdraw 3d improved user interface release version 7.6 1997 apple officially renamed operating system mac os name first appeared system 7.5.1 boot screen system 7 developed macs used motorola 680x0 line processors ported powerpc apple adopted new processor 1994 introduction power macintosh development macintosh system software system 6 followed fairly smooth progression addition new features relatively small changes upgrades time major additions fairly limited notably adding color quickdraw system 6 perspective scope changes seen examining official system documentation inside macintosh initially shipped three volumes adding another describe changes introduced mac plus another mac ii mac se limited changes meant original macintosh system remained largely initially introduced machine geared towards single user task running floppy disk based machine extremely limited ram however many assumptions model longer appropriate notable among single-tasking model replacement first examined 1986 switcher replaced outright multifinder system 5 running multifinder normally required larger amount ram hard drive became common late 1980s additions relatively limited fixes underlying oddities system architecture instance support limited form multitasking original mac os supported small co-resident programs known desk accessories installed system using special tools system able support multiple tasks one-off solution would longer needed — desk accessories could simply small programs placed anywhere yet multifinder still optional step taken numerous examples sort problem could found throughout system finally widespread adoption hard drives local area networks led number new features requested users developers late 1980s list new upgrades suggested changes existing model considerable march 1988 shortly release system 6 technical middle managers apple held offsite meeting plan future course mac os development ideas written index cards features seemed simple enough implement short term like adding color user interface written blue cards longer-term goals like true multitasking pink cards far ideas like object-oriented file system red cards development ideas contained blue pink cards proceed parallel first two projects known simply blue pink including taligent apple intended blue team came call blue meanies characters yellow submarine release updated version existing macintosh operating system 1990–1991 time-frame pink team release entirely new os around 1993 blue aimed relatively simple upgrades feature list reads degree sort system 6 corrected underlying os number formerly optional components made mandatory furthermore number oddities original system typically included due limited resources finally changed use basic underlying os features system also offered wide variety new features system 7 first apple operating system available compact disc although shipped set 15 floppy disks initially unlike earlier systems system 7 come bundled major software packages newly purchased macintosh computers system 7 installed often bundled software hypercard ease mouse practice later macintosh performa family added various software bundles including clarisworks new grolier multimedia encyclopedia microsoft bookshelf spectre vr power pete since system 7 introduced internet came popular attention software mactcp freeppp netscape included first later available disk internet service providers bundled books adam c. engst internet starter kit macintosh power macintosh machines also included nucalc graphing calculator system 7 also includes appletalk networking file sharing software form system extensions control panels basic utilities installed default system 7 include teachtext replaced simpletext later versions basic text editing tasks reading readme documents also available additional disk tools floppy disk disk first aid disk repair apple hd sc setup initializing partitioning disks later versions system 7 specifically system 7.5 mac os 7.6 come dedicated utilities folder apple extras folder including applescript disk copy quickdraw gx extras quicktime movie player optional extras utilities could manually installed system cd system 7.1.2 first version macintosh system software support apple new powerpc-based computers 68k applications yet updated run natively systems emulated transparently without user intervene built-in 68k processor emulator fat binaries contained code necessary run natively powerpc 68k systems became common time process similar distribution universal binaries apple transition intel processors 2006 system 7.0 7.1 offered utility called apple file exchange could access contents fat- apple ii — formatted floppy disks system 7 pro system 7.5 shipped pc exchange previously separate product allowed system mount fat-formatted floppy disks desktop manner regular macintosh disks os/2 disks read pc dos disks due fact os/2 used fat file system time macs could also read write unix file systems help extra software system 7 allowed users access pc networks allowed communication via tcp/ip compatible networking stacks actual pc software compatibility however required third party software softpc allowed ms-dos early microsoft windows programs run connectix virtual pc allowed mac run windows via full pc emulation pc compatibility solutions took native approach running windows ms-dos using x86 expansion cards x86 chip card apple offered systems configured way marketed dos compatible —a card dedicated x86 cpu ram used mac hard drive sound subsystem networking input provided services pc pc could run simultaneously mac user could switch two fashion similar kvm switch earliest systems 680x0 based systems running system 7 system 7 provided support accessing pc volume mac pc exchange software actual control pc hardware accomplished way control panels time release many users noticed performance suffered result upgrading system 6 system 7 though newer hardware soon made speed difference another problem system 7 large memory footprint system 6 could boot system single 800k floppy disk took ram whereas system 7 used well megabyte time average mac shipped enough ram built system 7 truly comfortable system 7 first system release could longer usefully run floppy-only systems although macintosh models sold time included hard disk standard equipment owners older models required upgrade buying either new mac external scsi hard disk drive wished run system 7 order take advantage system 7 virtual memory feature macintosh equipped paged memory management unit pmmu required motorola 68030 cpu one built-in one added motherboard motorola 68020-equipped macintosh ii macintosh model using 68020 macintosh lc use virtual memory apple introduced 68030-equipped macintosh lc ii shortly system 7 introduction despite newer processor lcii retained earlier model 16-bit bus perform faster lc replaced despite setbacks system 7.0 adopted quite rapidly mac users quickly became one base requirements new software engineering group within apple responsible system 7 came known blue meanies named blue index cards written features could implemented relatively short time part apple operating system strategy comparison pink index card features handled pink group later becoming ill-fated taligent project system 7.0 last version macintosh operating system available charge could freely redistributed although system 7 could purchased apple cost nominal considered cover duplication media common macintosh dealers allow customers use store demo machines copy system 7 install disks cost box floppies cd-rom magazines nautilus included system 7 disks mac users downloaded thousands copies system 7 online services aol compuserve genie apple surveyed services based popularity started selling mac os retail product system 7.1 apple continued charging major operating system upgrades release os x mavericks 2013 soon initial release system 7 7.0.1 minor update released october 1991 patch called system 7 tune-up also followed fixed disappearing files bug system would lose files added minimum preferred memory allotments application get info box august 1992 7.1 update released first version system software apple charged money change david pogue wrote new 7.1 fonts folder replaced often time-consuming method dragging fonts system file introduced system 7.0 also replaced font/da mover application system 6 could also used 7.0 system 7.1 also included lot internal changes support internationalization dates time numbers also first version support enablers removed requirement release new version system software every time new hardware released set specialized versions 7.1 ranging 7.1p1 7.1p6 excluding 7.1p4 created included various performa models already available released 7.1 specialized versions included ease launcher changes integrated later versions system software first major upgrade system 7.1.1 also known system 7 pro release bundle 7.1 applescript tools quicktime apple open collaboration environment aoce system 7 trouble running slightly older machines due memory footprint system 7 pro barely fit macintosh computers time commonly used minor bug fixes rather new functionality apple joined aim alliance apple ibm motorola shortly release system 7 1991 started work powerpc-based machines later became power macintosh family support machines resulted system 7.1.2 system 7.1.2 never offered retail sale shipped first batches powerpc macs 68k version shipped small number quadra 600 series systems later shipments shipped system 7.5 instead system 7.1.2p 7.1.2 shipped performa 630 lc 630 quadra 630 models released july november 1994 next major release system 7.5 included bug fixes previous updates added several new features including system 7.5 codenamed capone reference al capone chicago code name microsoft windows 95 also name default system font used mac os version 8 system 7.5.1 primarily bug fix 7.5 also introduced new mac os startup screen preparation mac clones system 7.5.2 released first pci-based power macs notable introducing apple new networking architecture open transport system 7.5.3 major bug-fix update also included open transport powerpc-based machines well 68k-based machines 7.5.3 also made several improvements 68k emulator added translucent dragging support drag manager also included first version control strip compatible macs also first version mac os support smp 9500/mp system 7.5.3 revision 2 included performance enhancements better reliability powerbooks using third-party ram doubler program improved reliability powerbook 500 2300 5300 series computers powerpc upgrade card improved reliability using startup disk control panel improved reliability copying files 1 gb hard disks system 7.5.3 revision 2.1 shipped performa 6400/180 6400/200 particular release specific machines stability problems system 7.5.3 release 2 new hardware especially video card transferring files localtalk system 7.5.4 pulled due mistake apple components included installer system 7.5.5 included significant performance improvements virtual memory memory management powerpc-based macs including elimination one type 11 error also included number reliability improvements fixes macs using floppy disks equipped dos compatibility card improved hard disk access powerpc powerbooks performa 5400 9500 computers fixes macs included apple tv tuner macintosh tv remote control improvements localtalk networking especially performa 5400 6400 fixes system startup faster 180 mhz macs included powerpc 604 604e processors improved reliability using sound-intensive applications quadra centris computers contained powerpc upgrade card improved stability using multiple background applications shared printers network system 7.5.5 also last system 7 release run 68000-based macs macintosh plus macs roms lack support 32-bit addressing macintosh iicx 7.6 later required 68030 processor 32-bit-addressing-capable rom automatically turn 32-bit addressing boot mac os 7.6 codenamed harmony last major update released 1997 7.6 operating system officially called mac os instead system new features include revamped extensions manager native powerpc code power macs bundled internet tools utilities stable finder increased memory allocation version powertalk feature added 7.5 removed due poor application support support large number older macintosh models dropped minor update mac os 7.6.1 finally ported 68k exception handling routines powerpc turning type 11 errors less harmful errors type 1 2 3 usually crashing applications would often terminate safely instead crashing operating system period apple attempting release completely new modern operating system named copland copland project abandoned 1996 apple announced plans release os update every six months rhapsody would 2001 evolve released mac os x shipped two releases shipped officially branded mac os — mac os 7.6 minor bug fix 7.6.1 future versions released mac os 8–8.6 mac os 9–9.2
[ 6788, 1069, 4293, 2547, 4670, 5732, 1063, 1094, 4320, 1103, 6113, 405, 6119, 1123, 7572, 6479, 6482, 1502, 2609, 4373, 7226, 5091, 2978, 788, 1154, 3346, 4389, 5101, 100, 5463, 102, 5469, 4768, 5477, 2294, 2300, 126, 6200, 6548, 6202, 3...
Test
4,454
3
AT&T_Unix_PC:amp unix pc 3b1 also known pc7300 unix pc unix workstation computer originally developed convergent technologies later acquired unisys marketed mid- late-1980s despite name 3b1 little common 3b-series computers initial pc7300 model offered modest 512 kib memory small low performance 10 mb hard drive model although progressive offering unix system desktop office operation underpowered produced considerable fan drive bearing noise even idling modern-looking wedge design innovative fact machine gained notoriety appearing many movies token computer later enhanced model renamed 3b1 cover redesigned accommodate full-height 67 mb hard drive cover change added 'hump case expanded onboard memory 1 2 mb well added better power supply operating system based unix system v release 2 extensions 4.1 4.2 bsd system v release 3 convergent technologies last release 3.51 store public domain software repository available 3b1 users
[ 3255, 554, 1454, 5571, 396, 5932, 6367, 4798, 5948, 6380, 2148, 768, 4543, 7583, 1237, 2803, 1435 ]
Test
4,455
2
MythDora:mythdora mythdora specialized operating system based fedora mythtv since 2009 version number comes version fedora used followed version mythtv used example current version 12.23 uses fedora 12 mythtv 0.23 like linhes mythdora designed simplify installation mythtv home theatre pc mythdora since version 10.21 live cd support addition mythtv plugins mythdora includes extra linux packages necessary mythtv run drivers hardware commonly encountered machines intended run mythtv also included mythdora several video game emulators extra tools scripts aid initial configuration system allow user perform tasks rebooting machine backing program data directly mythtv interface development discontinued 2011 august 3 2011 project maintainers indicated longer time keep project going
[ 5200, 4759, 1629, 3444, 7251, 474, 1179, 7075, 4233, 5571, 395, 1941, 578, 314, 5668, 2758, 1663, 2864, 6209, 2591, 6761, 2063, 343, 4824, 3915, 4008, 1893, 5259, 5523, 5530, 5704, 6317, 7587, 1992, 7954, 6244, 788 ]
Test
4,456
4
Lavasoft:lavasoft adaware formerly known lavasoft software development company produces spyware malware detection software including adaware operates subsidiary avanquest division company offers adaware three editions one free two pro total commercial adaware products include adaware ad block adaware web companion lavasoft digital lock lavasoft file shredder lavasoft privacy toolbox lavasoft registry tuner adaware headquarters montreal canada previously located gothenburg sweden since 2002 nicolas stark ann-christine åkerlund established company germany 1999 flagship adaware antivirus product 2011 lavasoft acquired solaria fund private equity fund front entrepreneurs daniel assouline michael dadoun accused selling software available free including adaware antivirus prior acquiring company anti-spyware anti-virus software program adaware antivirus according developer detects removes malware spyware adware computer viruses dialers trojans bots rootkits data miners parasites browser hijackers tracking components adaware antivirus originally developed ad-aware 1999 highlight web beacons inside internet explorer many websites users would see tiny pixelated square next web beacon warning user computer ip address non-essential information tracked website time ad-aware added ability block beacons ads 2008 edition lavasoft bundled ad-aware pro plus first time antivirus scanner used avira engine arrangement continued years starting ad-aware version 10 bitdefender antivirus engine used instead according pc world magazine older version ad-aware anniversary edition could locate 83.6 malware comparative test carried security firm av-test however stated tests run newest version neil j. rubenking pcmag performed lab test version 8.3 ad-aware scored 9.2 points beating previous top score 9.1 july 2013 adaware antivirus free listed downloaded total 450 million times lavasoft site including 387 million times download.com according opswat january 2015 ad-aware less 1 market share globally paid versions product competed low-cost free products microsoft security essentials company acquired january 2011 lavasoft solaria fund private equity fund front daniel assouline michael dadoun key people upclick interactive brands sc magazine reported lavasoft acquired entrepreneurs accused selling software available free unwitting users guise premium support including free version lavasoft security program prior acquiring company security consultant dancho danchev documented controversy additionally danchev reported 2013 lavasoft used hide hard-to-uninstall programs third-party software trick users installing like k-lite codec pack lavasoft web companion changed browser without given permission although company shields behind complete legality bundled software claims software used fight malware users branded products malware february 2015 reported cert coordination center new security feature ad-aware web companion implemented komodia ssl digestor one komodia public sdks company behind superfish security incident lenovo machines
[ 3165, 5452, 91, 5546, 4759, 716, 3089, 1931, 3698, 385, 910, 1838, 5125, 2296, 4689, 5925, 5571, 4783, 3111, 7087, 5401, 6823, 496, 6644, 5144, 1020, 7193, 3123, 142, 935, 6005, 3561, 6006, 7478, 6043, 6305, 6227, 8134, 73, 6777, 4645, ...
Test
4,457
1
Database_administration:database administration database administration function managing maintaining database management systems dbms software mainstream dbms software oracle ibm db2 microsoft sql server need ongoing management corporations use dbms software often hire specialized information technology personnel called database administrators dbas three types dbas individuals usually specialize one type database administration smaller organizations uncommon find single individual group performing one type database administration degree administration database automated dictates skills personnel required manage databases one end spectrum system minimal automation require significant experienced resources manage perhaps 5-10 databases per dba alternatively organization might choose automate significant amount work could done manually therefore reducing skills required perform tasks automation increases personnel needs organization splits highly skilled workers create manage automation group lower skilled line dbas simply execute automation database administration work complex repetitive time-consuming requires significant training since databases hold valuable mission-critical data companies usually look candidates multiple years experience database administration often requires dbas put work off-hours example planned hours downtime event database-related outage performance severely degraded dbas commonly well compensated long hours one key skill required often overlooked selecting dba database recovery part disaster recovery case “ ” case “ ” database suffers failure ranging simple failure full catastrophic failure failure may data corruption media failure user induced errors either situation dba must skills recover database given point time prevent loss data often dbms software comes certain tools help dbas manage dbms tools called native tools example microsoft sql server comes sql server management studio oracle tools sql*plus oracle enterprise manager/grid control addition 3rd parties bmc quest software embarcadero technologies sql maestro group offer gui tools monitor dbms help dbas carry certain functions inside database easily another kind database software exists manage provisioning new databases management existing databases related resources process creating new database consist hundreds thousands unique steps satisfying prerequisites configuring backups step must successful next start human expected complete procedure exact way time time exactly goal multiple databases exist number dbas grows without automation number unique configurations frequently grows costly/difficult support complicated procedures modeled best dbas database automation software executed standard dbas software created specifically improve reliability repeatability procedures stratavia data palette gridapp systems clarity automated database operations grown since 2009 following amazon web services introduction aws rds providing automated managed database service microsoft azure launched similar automated database service 2010 sql azure providing automated backups geo-replication high availability introduction docker software containers enhanced support fast delivery containerized database instances amazon web serices microsoft azure enhanced automated support containers respective services third party support database container images grown including mongodb postgres mysql oracle microsoft sql server microsoft independent port docker software windocks newer technologies stratavia data palette suite gridapp systems clarity begun increase automation databases causing reduction database related tasks however best reduces amount mundane repetitive activities eliminate need dbas intention dba automation enable dbas focus proactive activities around database architecture deployment performance service level management every database requires database owner account perform schema management operations account specific database log data director add database owner accounts database creation data director users must log database-specific credentials view database entities data perform database management tasks database administrators application developers manage databases appropriate permissions roles granted organization administrator permissions roles must granted database group database apply within organization granted several education institutes offer professional courses including late-night programs allow candidates learn database administration also dbms vendors oracle microsoft ibm offer certification programs help companies hire qualified dba practitioners college degree computer science related field helpful necessarily prerequisite
[ 1449, 3951, 6430, 6098, 2937, 6462, 1861, 5064, 6128, 7205, 5419, 7937, 7213, 6144, 1891, 1902, 784, 2265, 1905, 7248, 3005, 3011, 4054, 6543, 2663, 7999, 4798, 6932, 517, 7303, 6594, 6604, 7330, 5209, 7341, 7715, 3776, 5561, 906, 5217, ...
Validation
4,458
4
Svalbard_Global_Seed_Vault:svalbard global seed vault svalbard global seed vault secure seed bank norwegian island spitsbergen near longyearbyen remote arctic svalbard archipelago approximately north pole conservationist cary fowler association consultative group international agricultural research cgiar started vault preserve wide variety plant seeds duplicate samples spare copies seeds held gene banks worldwide seed vault attempt ensure loss seeds genebanks large-scale regional global crises seed vault managed terms spelled tripartite agreement among norwegian government crop trust nordic genetic resource center nordgen norwegian government entirely funded vault approximately 2008 construction storing seeds vault free end users norway crop trust pay operational costs primary funding trust comes organisations bill melinda gates foundation various governments worldwide nordic gene bank ngb since 1984 stored backup nordic plant germplasm via frozen seeds abandoned coal mine svalbard january 2008 nordic gene bank merged two nordic conservation groups form nordgen svalbard global seed vault officially opened 26 february 2008 although first seeds arrived january 2008 five percent seeds vault 18,000 samples 500 seeds came centre genetic resources netherlands cgn part wageningen university netherlands part vault first anniversary 90,000 food crop seed samples placed storage bringing total number seed samples 400,000 among new seeds included 32 varieties potatoes ireland national gene banks 20,000 new samples u.s agricultural research service seed samples came canada switzerland well international seed researchers colombia mexico syria shipment brought total number seeds stored vault 20 million anniversary vault contained samples approximately one-third world important food crop varieties also part anniversary experts food production climate change met three-day conference longyearbyen japanese sculptor mitsuaki tanabe presented work vault named seed 2009 momi in-situ conservation 2010 delegation seven u.s. congressmen handed number different varieties chili pepper 2013 approximately one-third genera diversity stored gene banks globally represented seed vault october 2016 seed vault experienced unusually large degree water intrusion due higher average temperatures heavy rainfall common water seep vault entrance tunnel warmer spring months case water encroached tunnel freezing vault designed water intrusion seeds risk result however norwegian public works agency statsbygg plans make improvements tunnel prevent intrusion future including waterproofing tunnel walls removing heat sources tunnel digging exterior drainage ditches seed vault 10th anniversary 26 february 2018 shipment 70,000 samples delivered facility bringing number samples received one million counting withdrawals time total number samples held vault 967,216 representing 13,000 years agricultural history norway sweden finland denmark iceland prime ministers ceremonially laid first stone 19 june 2006 seedbank inside sandstone mountain spitsbergen island employs robust security systems seeds packaged special three-ply foil packets heat sealed exclude moisture facility managed nordic genetic resource center though permanent staff on-site spitsbergen considered ideal lacked tectonic activity permafrost aids preservation sea level keep site dry even ice caps melt locally mined coal provides power refrigeration units cool seeds internationally recommended standard equipment fails least several weeks elapse facility rises surrounding sandstone bedrock temperature estimated take two centuries warm feasibility study prior construction determined vault could preserve major food crops seeds hundreds years including important grains could potentially remain viable thousands years running length facility roof front face entryway illuminated artwork named perpetual repercussion norwegian artist dyveke sanne marks location vault distance norway government-funded construction projects exceeding certain cost must include artwork norwegian state agency overseeing art public spaces engaged artist install lighting highlights importance qualities arctic light roof vault entrance filled highly reflective stainless steel mirrors prisms installation reflects polar light summer months winter network 200 fibre-optic cables gives piece muted greenish-turquoise white light svalbard global seed vault mission provide safety net accidental loss diversity traditional genebanks popular press emphasized possible utility event major regional global catastrophe frequently accessed genebanks lose samples due mismanagement accident equipment failures funding cuts natural disasters events occur regularity war civil strife history destroying genebanks national seed bank philippines damaged flooding later destroyed fire seed banks afghanistan syria iraq lost completely according economist svalbard vault backup world 1,750 seed banks storehouses agricultural biodiversity norwegian law prohibited storing genetically modified seeds vault adjacent arctic world archive provides similar service data etched code reels film project lead piql norway states film properly preserved last 1,000 years vault seed samples copies samples stored depositing genebanks researchers plant breeders groups wishing access seed samples seed vault must instead request samples depositing genebanks samples stored genebanks cases accessible accordance terms conditions international treaty plant genetic resources food agriculture approved 118 countries parties seed vault functions like safe deposit box bank bank owns building depositor owns contents box government norway owns facility depositing genebanks seeds send deposit samples svalbard constitute legal transfer genetic resources genebank terminology called black box arrangement depositor signs deposit agreement nordgen acting behalf norway agreement makes clear norway claim ownership deposited samples ownership remains depositor sole right access materials seed vault one access anyone else seeds seed vault database samples depositors maintained nordgen syrian civil war caused another seed bank international center agricultural research dry areas icarda move headquarters aleppo beirut due difficulties icarda transferring collection 2015 svalbard vault authorized first withdrawal seeds history seeds stored sealed three-ply foil packages placed plastic tote containers metal shelving racks storage rooms kept low temperature limited access oxygen ensure low metabolic activity delay seed aging permafrost surrounding facility help maintain low temperature seeds electricity supply fails years since opening vault saw minor water intrusion entrance annual spring permafrost thawing warmer temperatures heavy rainfall october 2016 caused significantly greater amounts water inundate entrance facility design ensured water froze several meters seeds endangered crop trust officially known global crop diversity trust plays key role planning seed vault coordinating shipments seed samples vault conjunction nordic genetic resource center trust provides annual operating costs facility set aside endowment funds norwegian government finances upkeep structure support bill melinda gates foundation donors crop trust assists selected genebanks developing countries well international agricultural research centres packaging shipping seeds seed vault international advisory council provides guidance advice includes representatives fao cgiar international treaty plant genetic resources institutions svalbard global seed vault ranked 6 time best inventions 2008 awarded norwegian lighting prize 2009 seed sample consists approximately 500 seeds sealed airtight aluminum bag facility storage capacity 4.5 million seed samples
[]
Test
4,459
4
City_identification_card:city identification card united states city municipal identification card form identification card issued municipality city rather state federal government federal law cities may issue identification cards see fit consider immigration criminal status applicant new connecticut issued first municipal identification cards united states elm city resident card 2007 january 15 2009 city/county san francisco launched sf city id card municipal identification card program modeled new cities issue identification cards include asbury park new jersey washington d.c. dc one card mercer county new jersey community id card issued local non profit organization endorsement various law enforcement agencies august 31 2016 city council phoenix arizona voted 5 4 create city identification card would available undocumented immigrants cards available february 2017 program cancelled february 2018 november 8 2012 los angeles city council voted 12 1 solicit proposals municipal identification card modeled oakland city id system city oakland california debated proposed municipal identification system would include debit card function city residents regardless immigration status move backed oakland city id card coalition september 13 2011 oakland city council decided wait cost feasibility study completed late october proceeding hoping begin issuing id cards 2012 barring unforeseen circumstances however extended 2012 city council voting favor final portion program october 16 2012 first cards program slated issued february 1 july 5 2011 richmond city council voted unanimously issue municipal identification cards richmond residents regardless immigration status letter council urging passage measure city council member mayor argued many richmond residents lack necessary forms official identification required access financial institutions jobs housing protections home workplace residents include immigrants children students homeless transgender people indigent disabled elderly runaway youth adult survivors domestic violence program administered third-party vendor cost city november 2007 board supervisors san francisco voted issue municipal id cards residents city regardless immigration status cards officially launched january 15 2009 proof identity city residence required elm city resident card id card used new connecticut united states card originally designed protect estimated 10,000 15,000 illegal immigrants new robbed assaulted city residents receive card serves form identification debit card capacity 150 library card way pay parking meters cards first issued july 2007 first municipal identification cards issued united states card costs 5 children 10 adults hartford connecticut 2017 first issued may 22 2017 hartford city id government-issued identification card available hartford residents verify identification residency status hartford aventura florida issues optional aventura id card residents delray beach florida issues optional residency identification card sunny isles beach florida offers free optional sunny isles beach resident id card residents october 12 2016 chicago mayor rahm emanuel city clerk susana mendoza announced launch chicago municipal id program april 26 2018 city officials launched chicago citykey optional valid government-issued id card offered chicago residents citykey serves three-in-one card valid government issued id ventra card chicago transit authority chicago public library services first 100,000 id cards free cost initial response chicago citykey extremely high successful city wards residents waited hours line receive card may 17 2016 city council detroit michigan voted favor creation municipal identification program city residents struggle otherwise obtain government-issued id december 5 2017 city council northfield minnesota unanimously approved ordinance establishing city identification card program implemented march 2018 county clerk hudson county new jersey barbara a. netchert issues identification cards resident county cards available residents county fee ten dollars adults five dollars minors specified county teenagers aged fourteen sixteen starting april 2011 mercer county area community id card issued endorsement offices mercer county sheriff mercer county prosecutor police departments several municipalities including trenton princeton borough princeton township west windsor ewing township plainsboro card issued non profit latin american legal defense education fund laldef accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks although official government id card facilitates access basic community services unable obtain documents immigrants youth homeless persons recovery re-entry programs card replaces trenton princeton community id cards issued 2009 2010 county clerk monmouth county new jersey m. clark french issues identity cards residents county cards available u.s. citizens legal permanent residents asbury park issues identification card city residents cards became available august 1 2015 dover new jersey offers municipal id card elizabeth new jersey offers municipal id card highland park new jersey offers municipal id card new brunswick new jersey offers new brunswick city id card city newark introduced municipal identification program august 2015 residents newark cards cost 15 new applicants however new applicants senior citizens children cost 8 financial hardship application filed city fees unable met applicant jersey city city council announced municipal identification program april 2017 morristown new jersey offers municipal id card paterson new jersey offers municipal id card perth amboy new jersey offers municipal id card starting november 2013 plainfield community id cards issued support plainfield police department card issued non-profit group angels action inc trained mentored latin american legal defense education fund laldef mercer county identification local identity cards grant legal residency right work approved plainfied city cooperation card also accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks angels action local organizations also process trying encourage plainfield city council approve municipal identity id card system supply cards larger scale growing population plainfield angels actions also helped mentor encourage id cards newark roselle city council roselle new jersey unanimously passed ordinance allow borough launch community-wide identification card program october 21 2015 began issuing cards december 14 2015 union city nj board commissioners decided enact municipal identification program starting march 1 2017 program open resident city older 14 system part set allow residents city gain identification securing financial services e.g bank checking account july 2007 new york city councilman hiram monserrate proposed setting municipal identity system new york city residents similar new plan however shortly thereafter monserrate left council new york state senate proposal shelved february 10 2014 first state city address new york city mayor bill de blasio announced new plan create new york city municipal identification card named idnyc would available new yorkers regardless immigration status city resident could obtain card mayor announced way allow city residents lack legal immigration status united states access municipal private services facilities require photo identification cards also provide additional benefits discounts movie tickets broadway shows sporting events ymca memberships additionally cardholders able open bank account several financial institutions new york city cards first made available january 12 2015 philadelphia issues optional identification card city residents phl city id cards became available april 2019 providence rhode island issues optional identification card city residents idpvd cards became available june 2018 may 1 2014 washington d.c. issues dc one card legal residents visitors u.s. though services may available residents district undocumented immigrants may get card issued state driver license state non-driver id card one states issues credentials illegal immigrants new mexico utah washington school id card dc one card consolidated credential designed give adults children access dc government facilities programs designed help district consolidate printing id cards save money dc one card also building access card dc government employees public school secondary students request card includes immediate metro smartrip® capability help travel milwaukee issues optional municipal identification card residents
[ 6656, 4143 ]
Train
4,460
3
10-Yard_Fight:10-yard fight 10-yard fight viewed top-down perspective vertical scrolling player select plays either offense defense offense player simply receives ball upon snap either attempts run quarterback toss ball running back throw ball one long distance receiver – basically option offense defense player chooses one two players control computer manipulates others ball also punted field goal attempted game five levels increasing difficulty high school college professional playoff super bowl player wins halves accelerated real time 30-minute half easier level player advances next level difficulty like career mode arcade game later ported famicom irem first japan later published north america europe nintendo 1985 nintendo entertainment system nes arcade game also ported msx home computer also irem exclusively japan graphically similar fundamental differences arcade nes versions game arcade version seeks simulate offense team attempting score touchdown ultimately leads player next level nes version developed allow defense offense well simultaneous 2-player mode may 2 2018 port nintendo switch released hamster part arcade archives series pittsburgh post-gazette called patriarch football games adam duerson sports illustrated stated one remembered could say makes great worth recognition fact brought football games atari era setting simple precedent future football games adam swiderski ugo networks called downright advanced compared earlier football titles added looked neat quality soundtrack n't play like real football nick chordas columbus dispatch said realistic time commenting players looked like real people n-sider called like racing game football game due objective racing first increase players time author bj klein however called less realistic tecmo bowl journal news called immortal classic
[ 1237 ]
Test
4,461
6
Ark_(software):ark software ark file archiver compressor developed kde included kde applications software bundle supports various common archive compression formats including zip 7z rar lha tar uncompressed compressed e.g gzip bzip2 lzip xz
[ 4213, 7058, 985, 5017, 1352, 4685, 6992, 6011, 658, 4700, 1955, 7746, 3032, 7201, 2415, 4891, 3219, 510, 7387, 5162, 8126, 1127, 2334, 6940, 4732, 5256, 3152, 169, 1139, 5349, 2706, 2897, 619 ]
Train
4,462
4
Control_reconfiguration:control reconfiguration control reconfiguration active approach control theory achieve fault-tolerant control dynamic systems used severe faults actuator sensor outages cause break-up control loop must restructured prevent failure system level addition loop restructuring controller parameters must adjusted accommodate changed plant dynamics control reconfiguration building block toward increasing dependability systems feedback control figure right shows plant controlled controller standard control loop nominal linear model plant formula_1 plant subject fault indicated red arrow figure modelled general formula_2 subscript formula_3 indicates system faulty approach models multiplicative faults modified system matrices specifically actuator faults represented new input matrix formula_4 sensor faults represented output map formula_5 internal plant faults represented system matrix formula_6 upper part figure shows supervisory loop consisting fault detection isolation fdi reconfiguration changes loop end vectors inputs outputs contain available signals used controller fault-free operation alternative scenarios model faults additive external signal formula_9 influencing state derivatives outputs follows formula_10 goal reconfiguration keep reconfigured control-loop performance sufficient preventing plant shutdown following goals distinguished internal stability reconfigured closed loop usually minimum requirement equilibrium recovery goal also referred weak goal refers steady-state output equilibrium reconfigured loop reaches given constant input equilibrium must equal nominal equilibrium input time tends infinity goal ensures steady-state reference tracking reconfiguration output trajectory recovery goal also referred strong goal even stricter requires dynamic response input must equal nominal response times restrictions imposed state trajectory recovery goal requires state trajectory restored nominal case reconfiguration input usually combination goals pursued practice equilibrium-recovery goal stability question whether similar goals reached specific faults addressed reconfigurability analysis paradigm aims keeping nominal controller loop end reconfiguration block placed faulty plant nominal controller together faulty plant forms reconfigured plant reconfiguration block fulfill requirement behaviour reconfigured plant matches behaviour nominal fault-free plant linear model following formal feature nominal closed loop attempted recovered classical pseudo-inverse method closed loop system matrix formula_11 state-feedback control structure used new controller formula_12 found approximate formula_13 sense induced matrix norm perfect model following dynamic compensator introduced allow exact recovery complete loop behaviour certain conditions eigenstructure assignment nominal closed loop eigenvalues eigenvectors eigenstructure recovered nominal case fault optimisation control schemes include linear-quadratic regulator design lqr model predictive control mpc eigenstructure assignment methods probabilistic approaches developed learning automata neural networks etc methods reconfiguration achieved differ considerably following list gives overview mathematical approaches commonly used prior control reconfiguration must least determined whether fault occurred fault detection components affected fault isolation preferably model faulty plant provided fault identification questions addressed fault diagnosis methods fault accommodation another common approach achieve fault tolerance contrast control reconfiguration accommodation limited internal controller changes sets signals manipulated measured controller fixed means loop restructured
[ 6748 ]
Test
4,463
1
Hierarchical_database_model:hierarchical database model hierarchical database model data model data organized tree-like structure data stored records connected one another links record collection fields field containing one value type record defines fields record contains hierarchical database model mandates child record one parent whereas parent record one child records order retrieve data hierarchical database whole tree needs traversed starting root node model recognized first database model created ibm 1960s hierarchical structure developed ibm 1960s used early mainframe dbms records relationships form treelike model structure simple inflexible relationship confined one-to-many relationship ibm information management system ims rdm mobile examples hierarchical database system multiple hierarchies data rdm mobile newly designed embedded database mobile computer system hierarchical data model lost traction codd relational model became de facto standard used virtually mainstream database management systems relational-database implementation hierarchical model first discussed published form 1992 see also nested set model hierarchical data organization schemes resurfaced advent xml late 1990s see also xml database hierarchical structure used primarily today storing geographic information file systems currently hierarchical databases still widely used especially applications require high performance availability banking telecommunications one widely used commercial hierarchical databases ims another example use hierarchical databases windows registry microsoft windows operating systems organization could store employee information table contains attributes/columns employee number first name last name department number organization provides employee computer hardware needed computer equipment may used employee assigned organization could store computer hardware information separate table includes part serial number type employee uses tables might look like model codice_1 data table represents parent part hierarchy codice_2 table represents child part hierarchy contrast tree structures usually found computer software algorithms model children point parents shown employee may possess several pieces computer equipment individual piece computer equipment may one employee owner consider following structure child type parent hierarchy stating empno 10 boss 20 30 40 report 20 represented reportsto column relational database terms reportsto column foreign key referencing empno column child data type different would different table would still foreign key referencing empno column employees table simple model commonly known adjacency list model introduced dr. edgar f. codd initial criticisms surfaced relational model could model hierarchical data however model special case general adjacency list graph
[ 1905, 3928, 4759, 4946, 4781, 6543, 2937, 6364, 7999, 4252, 6462, 674, 1768, 2054, 5419, 7757, 5338, 5778, 7303, 784, 2265 ]
Validation
4,464
4
WBAdmin:wbadmin computing codice_1 command-line utility built windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows 10 operating systems command used perform backups restores operating systems drive volumes computer files folders applications command-line interface codice_1 disk-based backup system create bare metal backup used restore windows operating system similar dissimilar hardware backup file created primarily form microsoft virtual hard disk .vhd files accompanying .xml configuration files backup .vhd file mounted windows disk manager view content however .vhd backup file direct disk clone utility replaces previous microsoft windows backup command-line tool ntbackup came built-into windows nt 4.0 windows 2000 windows xp windows server 2003 command-line version backup restore codice_1 also graphical user interface gui option available simplify creation computer backup restore workstation editions windows 7 use backup wizard located control panel server version done easily installed windows feature using windows management console wbadmin.msc wbadmin management console simplifies restoration whether single file multiple folders using command-line graphical user interface codice_1 creates backup quickly restored using windows media install dvd backup files located removable usb disk without need re-install scratch codice_1 uses differencing engine update backup files original backup file created volume shadow copy service updates changes subsequent full backups take matter moments rather many minutes taken create original backup file automatic backups scheduled regular basis using wizard two kinds restore operations supported
[ 1710, 2811, 1812, 4387, 4759, 2999, 6088, 2834, 6618, 5480, 5571, 4955, 6997, 3711, 1382, 5138, 3797, 5234, 7272, 6289, 5942, 1213, 5516, 7494, 2885, 4547, 6773, 1140, 1793, 3417, 5181, 6062, 7868 ]
Test
4,465
2
Stuart_Langridge:stuart langridge stuart langridge also known 'aq 'zippy podcaster developer author member web standards project dom scripting task force invited expert w3c html working group acknowledged commentator dom scripting javascript techniques langridge best known presenter defunct lugradio free software podcast uk along jono bacon longest-serving member team often served incite discussion issues directly related software freedom lugradio frequently advocated freedom yet despite often attracted criticism using proprietary software langridge involved shot jaq podcast collaboration former lugradio co-host jono bacon part bad voltage podcast together jono bacon jeremy garcia founder linuxquestions.org bryan lunduke founder jupiter broadcasting also founder member bad voltage podcast since moved due commitments podcast first aired october 2013 current projects include jokosher multi-track audio editor gnome jackfield program run mac os x dashboard widgets gnome january 2009 langridge joined canonical developer left company 2013 work freelancer kryogenix consulting canonical worked desktop couch ubuntu role canonical ltd. staffer langridge written two books technical publisher sitepoint dhtml utopia run web server using linux apache tony steidler-dennison well writing stylish scripting weblog 2005
[ 968 ]
Validation
4,466
7
Chaser_(company):chaser company chaser cloud-based credit control software founded ceo david tuck former finance director wayn idio financial controller fever-tree ltd 2015 future 50 named chaser one britain disruptive businesses well awarding friend business award 2016 chaser named xero add-on partner year
[]
Test
4,467
2
ZyNOS:zynos zynos proprietary operating system used network devices made zyxel communications name contraction zyxel network operating system nos zyxel first introduced zynos 1998 zyxel released zynos version 4.0 gs2200 series 24 48 port ethernet switches april 2012 appears versions differ zyxel products web and/or command line interface cli depending device web access accomplished connecting ethernet cable pc open port device entering ip address device web browser rs-232 serial console port provided devices cli access accomplished using ssh telnet listed categories cli commands grouped web configurator divided following categories january 2014 zynos rom-0 vulnerability identified vulnerability allowed attacker download router configuration rom-0 file without type authentication required configuration file later decompressed expose router administrator password isp password wireless password etc danish computer security company secunia reports unpatched advisories vulnerabilities zynos version 4.x secunia reports seven advisories six vulnerabilities zynos version 3.x five advisories unpatched secunia rates severe unpatched advisory less critical dns vulnerability found certain zynos firmware versions versions affected narrowed attack done remote location regardless user interface accessible outside lan
[ 3821, 7765, 5880 ]
Test
4,468
4
WinNuke:winnuke computer security winnuke example nuke remote denial-of-service attack dos affected microsoft windows 95 microsoft windows nt microsoft windows 3.1x computer operating systems exploit sent string out-of-band data oob data target computer tcp port 139 netbios causing lock display blue screen death damage change data computer hard disk unsaved data would lost so-called oob simply means malicious tcp packet contained urgent pointer urg urgent pointer rarely used field tcp header used indicate data tcp stream processed quickly recipient affected operating systems handle urgent pointer field correctly person screen-name _eci published c source code exploit may 9 1997 source code widely used distributed microsoft forced create security patches released weeks later time numerous flavors exploit appeared going names fedup gimp killme killwin knewkem liquidnuke mnuke netnuke muerte nuke nukeattack nuker102 pnewq project1 pstlince simportnuke sprite sprite32 vconnect vzmnuker wingenocide winnukeit winnuker02 winnukev95 wnuke3269 wnuke4 wnuke95 company called semisoft solutions new zealand created small program called antinuke blocks winnuke without install official patch years later second incarnation winnuke uses another similar exploit found
[ 1691, 7637, 4716, 5571, 6256, 1435, 1805 ]
Test
4,469
3
Abstraction_layer:abstraction layer computing abstraction layer abstraction level way hiding working details subsystem allowing separation concerns facilitate interoperability platform independence examples software models use layers abstraction include osi model network protocols opengl graphics libraries computer science abstraction layer generalization conceptual model algorithm away specific implementation generalizations arise broad similarities best encapsulated models express similarities present various specific implementations simplification provided good abstraction layer allows easy reuse distilling useful concept design pattern situations may accurately applied quickly recognized layer considered top another depends every layer exist without layers requires layers function frequently abstraction layers composed hierarchy abstraction levels osi model comprises seven abstraction layers layer model encapsulates addresses different part needs digital communications thereby reducing complexity associated engineering solutions famous aphorism david wheeler problems computer science solved another level indirection often deliberately misquoted abstraction substituted indirection also sometimes misattributed butler lampson kevlin henney corollary ... except problem many layers indirection computer architecture computer system usually represented consisting several abstraction levels programmable logic often considered part hardware logical definitions also sometimes seen part device software firmware firmware may include low-level software also include software including operating system applications software layers divided hardware abstraction layers physical logical device drivers repositories filesystems operating system kernels middleware applications others distinction also made low-level programming languages like vhdl machine language assembly language compiled language interpreter script language unix operating system types input output operations considered streams bytes read device written device stream bytes model used file i/o socket i/o terminal i/o order provide device independence order read write device application level program calls function open device may real device terminal virtual device network port file file system device physical characteristics mediated operating system turn presents abstract interface allows programmer read write bytes from/to device operating system performs actual transformation needed read write stream bytes device graphics libraries opengl provide abstract graphical device model interface library responsible translating commands provided programmer specific device commands needed draw graphical elements objects specific device commands plotter different device commands crt monitor graphics library hides implementation device dependent details providing abstract interface provides set primitives generally useful drawing graphical objects
[ 2087, 6871, 5014, 366, 5900, 3772, 6976, 3270, 3855, 1543, 1640, 2470, 1936, 1554, 2659, 3463, 6449, 5492, 7916, 6462, 2866, 6558, 6922, 5858, 7570, 2054, 2420, 1408, 336, 1782, 4990, 7213, 1691, 3915, 1895, 533, 3751, 4101, 3676, 4651, ...
Test
4,470
3
B.C._II:_Grog's_Revenge:b.c ii grog revenge b.c ii grog revenge 1984 video game sierra on-line commodore 64 colecovision msx sequel b.c quest tires based b.c newspaper comic strip johnny hart player controls thor caveman rides stone unicycle thor searching meaning life within several mountains player must navigate mountains collecting clams like comic strip used money case pay toll another caveman peter access next mountain two modes play first along mountainside user move four directions must avoid falling cliff slamming wall hitting rock hole encountering creature grog yell grog knock player mountain also green dinosaur eat player tire contact player may enter caves enter second mode caves dark except beam light emanating player clams must collected without running stalagmites end mountain bridge new mountain player enough clams game continues otherwise necessary return find clams zzap 64 gave game 91 rating describing stunningly impressive programme
[ 1862, 4471 ]
Validation
4,471
3
B.C.'s_Quest_for_Tires:b.c quest tires b.c quest tires home video game designed rick banks michael bate published sierra on-line 1983 versions released commodore 64 atari 8-bit family colecovision zx spectrum msx apple ii based comic strip b.c johnny hart bc quest tires scrolling game similar irem moon patrol previous year title play title contemporaneous film quest fire sequel released 1984 player takes role caveman thor rescue girlfriend cute chick kidnapped dinosaur must travel stone unicycle actually impossible wheel several levels level thor moving left right avoiding various dangers b.c quest tires action game taking place several consecutive levels levels start simple thor jump potholes duck tree branches later levels become complex example requiring thor jump turtles order cross lake carried lava pit dooky bird b.c characters fat broad also appear levels softline stated given conventional gameplay get-from-point-a-to-point-b kind game use familiar comic characters made player feel like finishing game worthwhile ... otherwise magazine concluded b.c quest tires n't much computer game interactive cartoon cartoon limits provide challenge antic approved game another 'shoot aliens save world scenario first rate animation predicted players would enjoy game day two relegate shelf compute praised game excellent graphics animation approach cartoon standards
[ 4470, 1862, 6380 ]
Test
4,472
3
Failure_detector:failure detector distributed computing system failure detector computer application subsystem responsible detection node failures crashes failure detectors first introduced 1996 chandra toueg book unreliable failure detectors reliable distributed systems book depicts failure detector tool improve consensus achievement reliability atomic broadcast sequence messages distributed system word failure detectors seek errors process system maintain level reliability practice failure detectors spot crashes system ban processes making mistakes prevent serious crashes errors 21st century failure detectors widely used distributed computing systems detect application errors software application stops functioning properly distributed computing projects see list distributed computing projects become popular usage failure detects also becomes important critical chandra toueg co-authors book unreliable failure detectors reliable distributed system 1996 approached concept detecting failure nodes introducing unreliable failure detector describe behavior unreliable failure detector distributed computing system process system entered local failure detector component local component examine portion processes within system addition process must also contain programs currently suspected failure detectors chandra toueg claimed unreliable failure detector still reliable detecting errors made system generalize unreliable failure detectors forms failure detectors unreliable failure detectors failure detectors share properties furthermore chandra toueg point important fact failure detector prevent crashes system even crashed program suspected previously construction failure detector essential difficult problem occurred development fault-tolerant component distributed computer system result failure detector invented need detecting errors massive information transaction distributed computing systems classes failure detectors distinguished two important properties completeness accuracy completeness means failure detectors would find programs finally crashed process whereas accuracy means correct decisions failure detectors made process degrees completeness depend number crashed process suspected failure detector certain period degrees accuracy depend number mistakes failure detector made certain period failure detectors categorized following eight types properties failure detectors described nutshell properties failure detectors depend fast failure detector detects actual failures well avoids false detection perfect failure detector find errors without mistakes whereas weak failure detector find errors make numerous mistakes different types failure detectors obtained changing properties failure detectors first examples show increase completeness failure detector second example shows change one type failure detector another following example abstracted department computer science yale university functions boosting completeness failure detector initially suspects ∅ forever upon receiving p process q example p crashes weak-detector eventually suspect failure detectors system eventually suspect p infinite loop created failure detectors example also shows weak completeness failure detector also suspect crashes eventually inspection crashed programs depend completeness following correctness arguments satisfy algorithm changing failure detector w failure detector failure detector w weak completeness failure detector strong completeness weak accuracy arguments satisfied reduction weak failure detector w strong failure detector agree algorithm within distributed computing system
[ 6507, 1254, 3680, 7627, 7442, 651, 5571, 5666, 6922, 6748, 3895, 8013, 2054, 6756, 515, 8124, 8024, 5429, 6778, 1989, 1607, 84, 1805 ]
Test
4,473
3
Fahrenheit_451_(video_game):fahrenheit 451 video game fahrenheit 451 computer strategy game released 1984 based novel name ray bradbury originally released software company trillium re-released 1985 company ’ new name telarium player goal help guy montag main character novel evade authorities make contact underground movement bradbury contributed game writing prologue responses game intelligent computer ray plot text game written len neufeld known previous authorship books interplanetary spy interactive novel series working aegis byron preiss visual publications game released apple ii atari st commodore 64 ms-dos macintosh msx tandy computers ending fahrenheit 451 former fireman guy montag fugitive wanted murder killing supervisor stealing contraband books game takes place five years later pointless war swept across country leading martial law firemen agent literary underground montag makes way new york mission break heavily guarded new york library 42nd street books burned contents transferred microcassette microcassettes need retrieved uploaded underground information network along way discovers clarisse young woman inspired rebellion still alive challenges player involve finding ways alter one appearance fingerprints chemindex body chemistry order evade detection issues arise finding food eat safe places rest player must also make contact members underground hiding city use lighter literary quotations end montag able break central library meet clarisse microcassettes found transmitted information network resistance cells world montag clarisse achieve victory saving extensive collection literature costs lives firemen storm office last cassette transmitted immolating 1980s reviewer praised gripping prose unique approach obtaining using literary quotations german reviewers maintained complexity plot nice graphics large number scenes non-fictional characters 1993 german study history interactive fiction recognized fahrenheit 451 highly complex interactive computer fairy tale hochkomplexes interaktives computermärchen adventure play classic literature quotations time game narrator player gleichsam literaturliteratur ein spiel mit klassikern und zugleich mit dem erzähler dem spieler selbst
[ 932, 916, 6380, 903 ]
Train
4,474
9
Computable_Document_Format:computable document format computable document format cdf electronic document format designed allow easy authoring dynamically generated interactive content cdf published public format created wolfram research computable document format supports gui elements sliders menus buttons content updated using embedded computation response gui interaction contents include formatted text tables images sounds animations cdf supports mathematica typesetting technical notation paginated layout structured drill layout slideshow mode supported styles controlled using cascading style sheet cdf files read using proprietary cdf player restrictive license downloaded free charge wolfram research cdf files created using mathematica online authoring tools available wolfram cloud computable document format used electronic books pearson education specifically mymathlab provide content wolfram demonstrations project add client-side interactivity wolfram alpha
[ 797, 4575, 4940, 8082, 6015, 6016, 740, 4067, 3723, 6221, 2524, 2706, 3420, 5191 ]
Test
4,475
3
Cabbage_Patch_Kids:_Adventures_in_the_Park:cabbage patch kids adventures park cabbage patch kids adventures park 1984 action/platform game based cabbage patch kids franchise first game cabbage patch kids adventures series mobygames described gameplay thus player cabbage patch kid pigtails day park day includes jumping onto vines leaping holes bouncing onto correct platforms misplaced jump lose life additionally creatures bees end player turn touched several screens challenge different combinations obstacles atariprotos wrote according colecovision version manual anna lee decided go exercise local park soon caught wild adventure hence subtitle adventures park game separated several different screens referred game scenes different obstacle kid overcome obstacles include bouncing balls water filled pits floating platforms bees even fires level consists ten scenes must overcome time limit runs along way anna may also collect various objects hidden trees using well placed trampolines points objects necessary win wake video game crash 1983 game served coleco attempt use one properties way cabbage patch kids give boost-through-association one properties way colecovision unreleased atari 2600 version developed individeo seen light day thanks discovery alex handy flea market california 2008 game known exist time thanks interview conducted former coleco programmer ed english many years prior atariage wrote atari 2600 version luck would cabbage patch kids adventures park impressive game comparable quality many modern homebrew games atariprotos said may able compare graphically colecovision version atari 2600 version cpk amazing feat programming gameplay retained conversion even included cute little background tune rarity 2600 games appears cpk simply victim collapsing game market time final version ready september 1984 coleco stopped 2600 operations
[]
Test
4,476
4
Panama_Papers:_South_America_allegations,_reactions,_and_investigations:panama papers south america allegations reactions investigations panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source page details related allegations reactions investigations south america argentine president mauricio macri listed head trading company based bahamas disclose tenure mayor buenos aires clear whether disclosure non-equity directorships required argentine law april 7 2016 federal prosecutor federico delgado began formal investigation macri involvement fleg trading ltd. company registered panama president macri listed director judge sebastián casanello asked start file inquiry initial petition made neuquén representative darío martínez martínez claims macri could guilty perjury due omissions sworn statement martínez also referenced another offshore company kagemusha sa named akira kurosawa 1980 film established 1981 president macri also connections investigation news outlets el destape infoeconomico end april found however macri involved least eight holding companies least seven founded run friends relatives mossack fonseca active least one year old daniel muñoz private secretary confidant former argentinian president néstor kirchner later also served two years aide néstor kirchner wife cristina fernández de kirchner president argentina 2007 2015 muñoz wife linked gold black limited company incorporated british virgin islands 2010 invest us real estate origin company funds listed personal savings 2010 beginning 2015 company ownership bearer shares financial instrument used hide owner identity one directors sergio tadisco told icij partner canal trece figurehead said agreed name used 2011 friendship muñoz wife january 2015 muñoz wife became named shareholders owning 50 percent time mossack fonseca become registered agent gold black however three weeks later compliance department proposed resigning muñoz identified connection governments kirchners resignation became effective june 2015 2009 muñoz investigated illicit enrichment charge later dropped 2013 argentinian media reported muñoz helped transfer bags money belonging president néstor kirchner buenos aires argentine capital santa cruz kirchner home state charges relation matter dismissed july 2015 lack evidence may 25 2016 died cancer last four years family argentine barcelona football player lionel messi said would file complaint reports said mossack fonseca set company 2012 named mega star enterprises inc family denied messi involved called accusations slanderous said company referred panama papers inactive messi declared income image rights proceedings argentine tax agency messi alongside father jorge stood trial three counts tax evasion may 2016 spanish prosecutors say tried evade €4.1m taxes income image rights assigning front companies belize uruguay 6 july 2016 messi father found guilty tax fraud handed suspended 21-month prison sentences respectively ordered pay €1.7 million €1.4 million fines five billionaires brazil sons two brazilian billionaires four former billionaire brazilian families appear panama papers leak according forbes brazilian news website uol access leaked documents published article list like many panama paper reports story cautions people mentioned documents may nothing wrong general nothing illegal per se offshore company fact common international business set one transactions joint ventures 're business world said brazil-based marcello hallake brazil-based partner law firm jones day however six ten members congress face one criminal investigation another high-profile construction executives senator among 84 people arrested petrobras scandal number reflects job protections 1988 constitution judges prosecutors three men marcel herrmann telles carlos alberto sicupira jorge felipe lemann son long-time business partner jorge paulo lemann brazil richest man controlling shareholder anheuser-busch inbev set three offshore companies british virgin islands bahamas tied private equity firm 3g beer firm ambev unit anheuser-busch inbev according uol two companies longer active men longer tied third told uol companies publicly disclosed registered documents described lemann advisor brazilian firm sao carlos father father business partners controlling stake panama papers reveal former supreme court judge joaquim barbosa bought apartment downtown miami police raided são paulo offices mossack fonseca january 2016 seeking records offshore companies firm opened two former executives petróleo brasileiro s.a. petrobras convicted 2015 corruption money laundering police say companies used hide illegally diverted funds january 2016 even panama papers published brazilian federal police part corruption investigation known operation car wash already accused mossack fonseca law firm helping suspects create offshore entities hide corrupt money alleged firm used real estate company help hide criminal proceeds scheme involving petrobras leak complicated already volatile political situation brazil tanking economy led calls impeachment president dilma rousseff amid many revelations political corruption impeachment proceedings began became clear next two people order succession implicated petrobras scandal according estado de são paulo company belonging eduardo cunha speaker lower house legislature leader impeachment drive surfaced panama papers rousseff mentioned papers politicians seven different political parties brazil named clients mossack fonseca leaked files mention politicians brazil largest party pmdb broke away president dilma rousseff coalition 2016 political figures psdb prominent opposition party country also mentioned leaks well others pdt pp psb psd ptb parties politicians rousseff party mentioned leaks group dutch journalists daily newspaper trouw found evidence panama papers showing tv globo cited many times money laundering investigation de nederlandsche bank revealed years media outlet conducted irregular financial transactions tax havens order pay broadcast rights copa libertadores head chilean branch transparency international campaigns corporate secrecy resigned name linked five firms tax havens leaked documents national directorate taxes customs launched investigation 850 clients mossack fonseca colombia subsidiary mossack fonseca established 2009 2014 colombia placed panama onto blacklist tax havens leaked documents also led panama move forward ongoing negotiations colombia tax information-sharing ecuadorian journalists published names three current government officials panama papers also reveal 2012 panamanian government believed mossack fonseca company anti-corruption prosecutor investigating embezzlement orlion s.a. sold president rafael correa delgado brother fabricio correa 2006 mossack fonseca asked shareholder information contacted legalsa asociados law firm guayaquil ecuador set offshore client shortly afterwards firm dropped offshore due lack information correa cousin pedro delgado campana convicted absentia ecuador embezzlement bought home north miami beach mossack fonseca company wife consul ecuador miami time arturo torres investigative editor el comercio told knight center newspaper published two stories connected panama papers rest six journalists ecuador report received summonses subpoenas little-known anticorruption agency council citizen participation social control cpccs demanding documents scheduled hearing postponed due earthquake april 16 national assembly commission justice also opened investigation mónica almeida el universo said government taken coverage panama papers attack stories ecuadorian media mentioned attorney general galo chiriboga pedro delgado campaña former president central bank ecuador correa cousin javier molina former adviser ministry intelligence one founders mossack fonseca quito two supporters leading candidate keiko fujimori undeclared interests mossack fonseca companies according icij partner ojopúblico said well three renowned chefs peru largest timber company also implicated mario vargas llosa also spanish nationality wife bought offshore company buffer mossack fonseca couple appears linked september 1 2010 october 6 year shortly vargas llosa nobel prize literature appearing linked denied using tax havens five people arrested april 22 suspicion laundering funds mexican drug cartel uruguayan investigation underway authorities decided move reports icij partner weekly búsqueda gerardo gonzález valencia used mossack fonseca companies buy real estate uruguay head los cuinos cartel brother abigael gonzález valencia imprisoned mexico united states designated drug kingpin well brother-in-law nemesio oseguera cervantes leads jalisco new generation cartel cjng many boliburguesía individuals became wealthy hugo chávez nicolás maduro administrations included scandal josmel velásquez brother security official late hugo chávez arrested april 15 trying catch flight country due offshore company revealed panama papers mother amelis figueroa also arrested allowed return home due health venezuelan news site armando.info reported josmel brother adrian former aide late president hugo chávez opened shell company though mossack fonseca republic seychelles 50,000 deposit report based documents leaked panamanian law firm mossack fonseca velásquez indicted april 20 franklin durán notorious venezuela argentina part el maletinazo suitcase scandal involving alleged illicit contribution venezuelan president hugo chavez christina fernandez de kirchner 800,000 venezuelan state-run oil company pdvsa able open shell company jail cell united states serving sentence operating unregistered foreign agent
[ 860 ]
Test
4,477
2
Code_Access_Security:code access security code access security cas microsoft .net framework microsoft solution prevent untrusted code performing privileged actions clr loads assembly obtain evidence assembly use identify code group assembly belongs code group contains permission set one permissions code performs privileged action perform code access demand cause clr walk call stack examine permission set granted assembly method call stack code groups permission sets determined administrator machine defines security policy evidence information associated assembly default evidences used .net code access security developer use custom evidence so-called assembly evidence requires writing security assembly version 1.1 .net facility work evidence based hash assembly easily obtained code example c evidence may obtained following code clause this.gettype .assembly.evidence policy set expressions uses evidence determine code group membership code group gives permission set assemblies within group four policies .net first three policies stored xml files administered .net configuration tool 1.1 mscorcfg.msc final policy administered code current application domain code access security present assembly evidence policy take intersection permissions common generated permission set permissions granted assembly default enterprise user appdomain policies give full trust allow assemblies permissions machine policy restrictive since intersection taken means final permission set determined machine policy note policy system eliminated .net framework 4.0 code groups associate piece evidence named permission set administrator uses .net configuration tool specify particular type evidence example site particular value evidence example www.mysite.com identifies permission set code group granted code performs privileged action make demand one permissions demand makes clr walk call stack method clr ensure demanded permissions method assembly granted permissions permission granted security exception thrown prevents downloaded code performing privileged actions example assembly downloaded untrusted site assembly file io permissions assembly attempts access file code access security throw exception preventing call
[ 4156, 644, 8103, 8129, 1047, 8085, 3495, 7844, 2530, 2619, 7460 ]
Test
4,478
2
List_of_Unix_systems:list unix systems version unix time-sharing system evolved version version one evolving prototypal unix variants descendants displayed release version 10 unix research team bell labs turned focus plan 9 bell labs distinct operating system first released public 1993 systems list evolved version unix system iii evolving unix time-sharing system v7 descendants unix time-sharing system v6
[ 1807, 3838, 1522, 4751, 5362, 7702, 7794, 5279, 554, 6085, 900, 295, 473, 2467, 4229, 6267, 5216, 5481, 2294, 3533, 7079, 5571, 2300, 2118, 6360, 578, 5048, 6367, 4344, 7471, 850, 1493, 5597, 8120, 4631, 4447, 1046, 6577, 4733, 2887, 14...
Test
4,479
3
Coprocessor:coprocessor coprocessor computer processor used supplement functions primary processor cpu operations performed coprocessor may floating point arithmetic graphics signal processing string processing cryptography i/o interfacing peripheral devices offloading processor-intensive tasks main processor coprocessors accelerate system performance coprocessors allow line computers customized customers need extra performance need pay coprocessors vary degree autonomy fpus rely direct control via coprocessor instructions embedded cpu instruction stream others independent processors right capable working asynchronously still optimized general-purpose code incapable due limited instruction set focused accelerating specific tasks common driven direct memory access dma host processor building command list playstation 2 emotion engine contained unusual dsp-like simd vector unit capable modes operation make best use mainframe computer processor time input/output tasks delegated separate systems called channel i/o mainframe would require i/o processing instead would set parameters input output operation signal channel processor carry whole operation dedicating relatively simple sub-processors handle time-consuming i/o formatting processing overall system performance improved coprocessors floating-point arithmetic first appeared desktop computers 1970s became common throughout 1980s early 1990s early 8-bit 16-bit processors used software carry floating-point arithmetic operations coprocessor supported floating-point calculations could carried many times faster math coprocessors popular purchases users computer-aided design cad software scientific engineering calculations floating-point units amd 9511 intel 8231/8232 weitek fpus treated peripheral devices others intel 8087 motorola 68881 national 32081 closely integrated cpu another form coprocessor video display coprocessor used atari 8-bit family texas instruments ti-99/4a msx home-computers called video display controllers commodore amiga custom chipset included unit known copper well blitter accelerating bitmap manipulation memory microprocessors developed cost integrating floating point arithmetic functions processor declined high processor speeds also made closely integrated coprocessor difficult implement separately packaged mathematics coprocessors uncommon desktop computers demand dedicated graphics coprocessor grown however particularly due increasing demand realistic 3d graphics computer games original ibm pc included socket intel 8087 floating-point coprocessor aka fpu popular option people using pc computer-aided design mathematics-intensive calculations architecture coprocessor speeds floating-point arithmetic order fiftyfold users used pc word processing example saved high cost coprocessor would accelerated performance text manipulation operations 8087 tightly integrated 8086/8088 responded floating-point machine code operation codes inserted 8088 instruction stream 8088 processor without 8087 could interpret instructions requiring separate versions programs fpu non-fpu systems least test run time detect fpu select appropriate mathematical library functions another coprocessor 8086/8088 central processor 8089 input/output coprocessor used programming technique 8087 input/output operations transfer data memory peripheral device reducing load cpu ibm n't use ibm pc design intel stopped development type coprocessor intel 80386 microprocessor used optional math coprocessor 80387 perform floating point operations directly hardware intel 80486dx processor included floating-point hardware chip intel released cost-reduced processor 80486sx floating point hardware also sold 80487sx coprocessor essentially disabled main processor installed since 80487sx complete 80486dx different set pin connections intel processors later 80486 integrated floating-point hardware main processor chip advances integration eliminated cost advantage selling floating point processor optional element would difficult adapt circuit-board techniques adequate 75 mhz processor speed meet time-delay power consumption radio-frequency interference standards required gigahertz-range clock speeds on-chip floating point processors still referred coprocessors operate parallel main cpu era 8- 16-bit desktop computers another common source floating-point coprocessors weitek coprocessors different instruction set intel coprocessors used different socket motherboards supported weitek processors provide transcendental mathematics functions example trigonometric functions like intel x87 family required specific software libraries support functions motorola 68000 family 68881/68882 coprocessors provided similar floating-point speed acceleration intel processors computers using 68000 family equipped hardware floating point processor could trap emulate floating-point instructions software although slower allowed one binary version program distributed cases 68451 memory-management coprocessor designed work 68020 processor dedicated graphics processing units gpus form graphics cards commonplace certain models sound cards fitted dedicated processors providing digital multichannel mixing real-time dsp effects early 1990 1994 gravis ultrasound sound blaster awe32 typical examples sound blaster audigy sound blaster x-fi recent examples 2006 ageia announced add-in card computers called physx ppu physx designed perform complex physics computations cpu gpu perform time consuming calculations designed video games although mathematical uses could theoretically developed 2008 nvidia purchased company phased physx card line functionality added software allowing gpus render physx cores normally used graphics processing using nvidia physx engine software 2006 bigfoot systems unveiled pci add-in card christened killernic ran special linux kernel freescale powerquicc running 400 mhz calling freescale chip network processing unit npu spursengine media-oriented add-in card coprocessor based cell microarchitecture spus vector coprocessors 2008 khronos group released opencl aim support general-purpose cpus ati/amd nvidia gpus accelerators single common language compute kernels 2010s mobile computation devices implemented sensor hub coprocessor examples coprocessors used handling sensor integration mobile devices include apple m7 m8 motion coprocessors qualcomm snapdragon sensor core qualcomm hexagon holographic processing unit microsoft hololens 2012 intel announced intel xeon phi coprocessor various companies developing coprocessors aimed accelerating artificial neural networks vision cognitive tasks e.g vision processing units truenorth zeroth 2018 ai chips smartphones apple several android phone vendors time cpus tended grow absorb functionality popular coprocessors fpus considered integral part processors main pipeline simd units gave multimedia acceleration taking role various dsp accelerator cards even gpus become integrated cpu dies nonetheless specialized units remain popular away desktop machines additional power allow continued evolution independently main processor product lines
[ 5012, 1075, 1447, 5371, 3948, 1454, 7527, 7529, 5737, 2567, 4694, 5042, 7905, 35, 4702, 2938, 7554, 1481, 5055, 2226, 6830, 1867, 3987, 2237, 2957, 5079, 2248, 4368, 5784, 6148, 2257, 441, 1150, 2266, 5097, 5100, 4047, 3365, 4408, 5483, ...
Test
4,480
6
F2FS:f2fs f2fs flash-friendly file system flash file system initially developed samsung electronics linux kernel motive f2fs build file system start takes account characteristics nand flash memory-based storage devices solid-state disks emmc sd cards widely used computer systems ranging mobile devices servers f2fs designed basis log-structured file system approach adapted newer forms storage jaegeuk kim principal f2fs author stated remedies known issues older log-structured file systems snowball effect wandering trees high cleaning overhead addition since nand-based storage device shows different characteristics according internal geometry flash memory management scheme flash translation layer ftl supports various parameters configuring on-disk layout also selecting allocation cleaning algorithms f2fs divides whole volume number segments fixed 2 mb section composed consecutive segments zone consists set sections default section zone sizes set size users easily modify size codice_1 f2fs splits entire volume six areas except superblock area consist multiple segments described order avoid misalignment file system flash storage f2fs aligns start block address cp segment size also aligns main area start block address zone size reserving segments ssa area f2fs uses checkpoint scheme maintain file system integrity mount time f2fs first tries find last valid checkpoint data scanning cp area order reduce scanning time f2fs uses two copies cp one always indicates last valid data called shadow copy mechanism addition cp nat sit also use shadow copy mechanism file system consistency cp points nat sit copies valid key data structure node similar traditional file structures f2fs three types nodes inode direct node indirect node f2fs assigns 4 kb inode block contains 923 data block indices two direct node pointers two indirect node pointers one double indirect node pointer described direct node block contains 1018 data block indices indirect node block contains 1018 node block indices thus one inode block i.e. file covers note node blocks mapped nat means location node translated nat mitigate wandering tree problem f2fs able cut propagation node updates caused leaf data writes directory entry dentry occupies 11 bytes consists following attributes dentry block consists 214 dentry slots file names bitmap used represent whether dentry valid dentry block occupies 4 kb following composition f2fs implements multi-level hash tables directory structure level hash table dedicated number hash buckets shown note 2b means bucket includes 2 data blocks f2fs finds file name directory first hash value file name calculated f2fs scans hash table level 0 find dentry consisting file name inode number found f2fs scans next hash table level 1 way f2fs scans hash tables level incrementally 1 n level f2fs needs scan one bucket determined following equation shows log files complexity case file creation f2fs finds empty consecutive slots cover file name f2fs searches empty slots hash tables whole levels 1 n way lookup operation runtime f2fs manages six active logs inside main area hot/warm/cold node hot/warm/cold data lfs two schemes free space management threaded log copy-and-compaction copy-and-compaction scheme known cleaning well-suited devices showing good sequential write performance since free segments served time writing new data however suffers cleaning overhead high utilization conversely threaded log scheme suffers random writes cleaning process needed f2fs adopts hybrid scheme copy-and-compaction scheme adopted default policy dynamically changed threaded log scheme according file system status order align f2fs underlying flash-based storage f2fs allocates segment unit section f2fs expects section size garbage collection unit size ftl respect mapping granularity ftl f2fs allocates section active logs many different zones possible ftl write active log data one allocation unit according mapping granularity f2fs cleaning demand background on-demand cleaning triggered enough free segments serve vfs calls background cleaner executed kernel thread triggers cleaning job system idle f2fs supports two victim selection policies greedy cost-benefit algorithms greedy algorithm f2fs selects victim segment smallest number valid blocks cost-benefit algorithm f2fs selects victim segment according segment age number valid blocks order address log block thrashing problem present greedy algorithm f2fs uses greedy algorithm on-demand cleaning background cleaner uses cost-benefit algorithm order identify whether data victim segment valid f2fs manages bitmap bit represents validity block bitmap composed bit stream covering whole blocks main area motorola mobility used f2fs moto g/e/x droid phones since 2012 google first used f2fs nexus 9 2014 however google products n't adopt f2fs pixel 3 f2fs updated inline crypto hardware support huawei used f2fs since huawei p9 2016 oneplus used f2fs since oneplus 3t 2016 zte used f2fs since zte axon 10 pro 2019
[ 3599, 2547, 7161, 4672, 3271, 6431, 3626, 5049, 7189, 6117, 759, 5783, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 27...
Test
4,481
1
Range_query_(database):range query database range query common database operation retrieves records value upper lower boundary example list employees 3 5 years experience range queries unusual generally known advance many entries range query return return many queries top ten senior employees newest employee done efficiently upper bound number results return query returns exactly one result sometimes called singleton match least one requested keys
[ 2054, 5419 ]
Train
4,482
3
Open_architecture:open architecture open architecture type computer architecture software architecture intended make adding upgrading swapping components easy example ibm pc amiga 500 apple iie open architecture supporting plug-in cards whereas apple iic computer closed architecture open architecture systems may use standardized system bus s-100 pci isa may incorporate proprietary bus standard used apple ii dozen slots allow multiple hardware manufacturers produce add-ons user freely install contrast closed architectures expandable one two expansion ports using proprietary connector design may require license fee manufacturer enhancements may installable technicians specialized tools training computer platforms may include systems open closed architectures mac mini compact macintosh closed macintosh ii power macintosh g5 open desktop pcs open architecture nettops typically closed similarly open software architecture one additional software modules added basic framework provided architecture open apis application programming interfaces major software products way basic functionality products modified extended google apis examples second type open software architecture consists messages flow computer systems messages standard structure modified extended per agreements computer systems example ibm distributed data management architecture open architecture allows potential users see inside parts architecture without proprietary constraints typically open architecture publishes parts architecture developer integrator wants share open business processes involved open architecture may require license agreements entities sharing architecture information open architectures successfully implemented many diverse fields including us navy
[ 2983, 3346, 6331, 4388, 2723, 6335, 6707, 3855, 7345, 2023, 6994, 7368, 668, 4973, 6922, 1582, 1879, 7296, 5695, 2965, 1599, 4277, 3755, 5447 ]
Test
4,483
9
Kathleen_Booth:kathleen booth kathleen booth born 1922 wrote first assembly language designed assembler autocode first computer systems birkbeck college university london helped design three different machines including arc automatic relay calculator sec simple electronic computer ape x c. kathleen britten born stourbridge worcestershire england obtained bsc mathematics university london 1944 went get phd applied mathematics 1950 married colleague andrew donald booth 1950 two children kathleen booth worked birkbeck college 1946–62 travelled united states andrew booth research assistant 1947 visiting john von neumann princeton upon returning uk co-authored general considerations design purpose electronic digital computer describing modifications original arc redesign arc2 using von neumann architecture part contribution arc assembly language also built maintained arc components kathleen andrew booth team birkbeck considered smallest early british computer groups 1947 1953 produced three machines arc automatic relay computer sec simple electronic computer ape x c all-purpose electronic rayon computer mr. booth worked team built computers programmed considered remarkable achievement due size group limited funds disposal although ape x c eventually led hec series manufactured british tabulating machine company small scale birkbeck group place front rank british computer activity booth regularly published papers concerning work arc ape x c systems co-wrote automatic digital calculators 1953 illustrated 'planning coding programming style co-founded school computer science information systems 1957 birkbeck college along andrew booth j.c. jennings 1958 taught programming course 1958 booth wrote one first books describing program ape x c computers 1944 1946 junior scientific officer royal aircraft establishment farnborough 1946 1962 booth research scientist british rubber producer research association ten years 1952 1962 research fellow lecturer birbeck college university london later became research fellow lecturer associate professor university saskatchewan canada 1962 1972 lakehead university canada became professor mathematics 1972 1978 booth research neural networks led successful programs simulating ways animals recognise patterns characters husband resigned suddenly birkbeck college 1961 chair conferred husband despite massive contributions i.c.t type 1400 computer donated department numerical automation fact installed london school hygiene tropical medicine
[ 1662, 4864, 4220, 5621, 684, 336 ]
Train
4,484
7
Volunteer_computing:volunteer computing volunteer computing type distributed computing arrangement people so-called volunteers provide computing resources projects use resources distributed computing and/or storage thus computer owners users donate computing resources processing power storage one projects volunteers frequently members general public possession personal computers internet connection also organizations act volunteers provide computing resources projects context mostly science-related projects executed universities academia general first volunteer computing project great internet mersenne prime search started january 1996 followed 1997 distributed.net 1997 1998 several academic research projects developed java-based systems volunteer computing examples include bayanihan popcorn superweb charlotte term volunteer computing coined luis f. g. sarmenta developer bayanihan also appealing global efforts social responsibility corporate social responsibility reported harvard business review used responsible forum 1999 seti home folding home projects launched projects received considerable media coverage one attracted several hundred thousand volunteers 1998 2002 several companies formed business models involving volunteer computing examples include popular power porivo entropia united devices 2002 berkeley open infrastructure network computing boinc project founded university california berkeley space sciences laboratory funded national science foundation boinc provides complete middleware system volunteer computing including client client gui application runtime system server software software implementing project web site first project based boinc predictor home based scripps research institute began operation 2004 soon thereafter seti home climateprediction.net began using boinc number new boinc-based projects created next years including rosetta home einstein home aqua home 2007 ibm world community grid switched united devices platform boinc client software early volunteer computing projects consisted single program combined scientific computation distributed computing infrastructure monolithic architecture inflexible example difficult deploy new application versions recently volunteer computing moved middleware systems provide distributed computing infrastructure independent scientific computation examples include systems basic structure client program runs volunteer computer periodically contacts project-operated servers internet requesting jobs reporting results completed jobs pull model necessary many volunteer computers behind firewalls allow incoming connections system keeps track user credit numerical measure much work user computers done project volunteer computing systems must deal several issues involving volunteered computers heterogeneity churn tendency individual computers join leave network time sporadic availability need interfere performance regular use addition volunteer computing systems must deal problems related correctness one common approach problems replicated computing job performed least two computers results corresponding credit accepted agree sufficiently effects may may noticeable even noticeable volunteer might choose continue participating however increased power consumption remedied extent setting option limit percentage processor used client available client software although issues lack accountability trust participants researchers implementing projects volunteer computing crucially important especially projects limited funding
[ 6025, 817, 2961, 4159, 1023, 4800, 1256, 2325, 634, 7712, 5109, 1678 ]
Test