node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
4,485 | 2 | House_(operating_system):house operating system house acronym haskell user operating system environment experimental open source operating system written haskell written explore system programming functional programming language includes graphical user interface several demos network protocol stack provides basic support ethernet ipv4 arp dhcp icmp ping udp tftp tcp | [
1522,
2740,
7581,
7637,
5571,
2119,
3775,
3819,
3797
] | Test |
4,486 | 4 | Common_Weakness_Enumeration:common weakness enumeration common weakness enumeration cwe category system software weaknesses vulnerabilities sustained community project goals understanding flaws software creating automated tools used identify fix prevent flaws project sponsored national cybersecurity ffrdc owned mitre corporation support us-cert national cyber security division u.s. department homeland security version 3.2 cwe standard released january 2019 cwe 600 categories including classes buffer overflows path/directory tree traversal errors race conditions cross-site scripting hard-coded passwords insecure random numbers common weakness enumeration cwe compatibility program allows service product reviewed registered officially cwe-compatible cwe-effective program assists organizations selecting right software tools learning possible weaknesses possible impact order obtain cwe compatible status product service must meet 4 6 requirements shown 48 organizations january 2018 develop maintain products services achieved cwe compatible status researchers think ambiguities cwe avoided reduced | [
5609,
2137,
7845,
2891,
2875,
404
] | Train |
4,487 | 4 | Meredith_Gardner:meredith gardner meredith knox gardner october 20 1912 – august 9 2002 american linguist codebreaker gardner worked counter-intelligence decoding soviet intelligence traffic regarding espionage united states came known venona project gardner born okolona mississippi grew austin texas graduating university texas austin earned master degree german university wisconsin–madison teaching assistant 1938 1940 linguist professor german university akron united states army signals intelligence service recruited work breaking german codes soon started working japanese codes instead mastering japanese language months 1946 gardner began work highly secret project later codenamed venona break soviet cryptosystems soviet encryption system involved use one-time pads thus thought unbreakable however soviets made mistake reusing certain pages pads later year gardner made first breakthrough venona identifying ciphers used spelling english words may 1947 gardner read decrypt implied soviets ran agent access sensitive information war department general staff u.s. army air corps major william ludwig ullmann became apparent gardner reading kgb messages showing massive soviet espionage united states 1949 meredith gardner made big breakthrough able decipher enough soviet message identify text 1945 telegram winston churchill harry s. truman checking message complete copy telegram provided british embassy cryptanalysts confirmed beyond doubt war soviets spy access secret communication president united states prime minister britain peter wright met meredith gardner london arrests atom spies quiet scholarly man entirely unaware awe held cryptanalysts used tell worked matches office young pipe-smoking englishman named philby used regularly visit peer shoulder admire progress making gardner rather sad figure late 1960s felt keenly cryptanalytical break made possible thing mathematical beauty depressed use put wright revealed gardner upset research resulted mccarthyism executions julius rosenberg ethel rosenberg wright quotes gardner saying never wanted get anyone trouble wright added gardner appalled fact discovery led almost inevitably electric chair felt rosenbergs guilty ought given clemency gardner mind venona almost art form want sullied crude mccarthyism gardner retired 1972 yet work remained mostly secret 1996 nsa cia center democracy honored gardner colleagues formal ceremony result campaigning u.s senator daniel patrick moynihan gardner died august 9 2002 chevy chase maryland age 89 | [
1353
] | Test |
4,488 | 3 | Phantasie_III:phantasie iii phantasie iii third video game phantasie series final installment phantasie trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop phantasie iii maintained style original two improved upon graphics platforms except dos version combat engine also saw upgrades adding specific wound locations characters able head torso limb specifically injured broken removed also possible tactical battle line-up ability move characters front middle rear party game also improved upon spell list added larger variety weapons equipment game also two possible endings depending whether characters chose fight nikademus join phantasie iii sold 46,113 copies scorpia pleased improving trading interface combat grand ending game trilogy called game far weakest series criticized short length phantasie iii reviewed 1988 dragon 130 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars | [
5625
] | Test |
4,489 | 9 | Java_Virtual_Machine_Tools_Interface:java virtual machine tools interface java virtual machine tool interface jvmti properly jvm ti introduced j2se 5.0 tiger interface allows program inspect state control execution applications running java virtual machine jvm jvmti designed provide application programming interface api development tools need access state jvm examples tools debuggers profilers jvmti native interface jvm library written c c++ loaded initialization jvm library access jvm state calling jvmti jni java native interface functions register receive jvmti events using event handler functions called jvm event occurs jvmti defined java community process jsr-163 specification java platform profiling architecture jvmti replaces jvmpi java virtual machine profiling interface jvmdi java virtual machine debug interface jvmpi jvmdi declared deprecated j2se 5.0 removed java se6 jvmti lowest level java platform debugger architecture | [
1435
] | Test |
4,490 | 9 | JSR_53:jsr 53 jsr 53 java specification request developed java community process specifies java servlet 2.3 specification javaserver pages 1.2 specification | [] | Test |
4,491 | 8 | Timable:timable timable online event listing platform hong kong consisting websites mobile apps co-founded sam yuen mike ko 2010 covers events happening town ranging concerts dramas exhibitions festivals events family etc timable original word means able time according explanation website letter e omitted word based common english grammar like scalable writable timable represents vision platform – search time users search events matching spare time however name often mistaken timeable timetable moment corresponding chinese name timable contents contributed event organizers web 2.0 approach published timable editors end 2013 23,000 events recorded | [
5447,
6788,
518
] | Test |
4,492 | 4 | Kaspersky_Internet_Security:kaspersky internet security kaspersky internet security often abbreviated kis internet security suite developed kaspersky lab compatible microsoft windows mac os x. kis offers protection malware well email spam phishing hacking attempts data leaks kaspersky lab diagnostics results distributed relevant developers version 6.0 first release kis pc world magazine praised version 6.0 detection malware kis detected 100 percent threats subset january 2006 wild-list list prevalent threats suite detected almost 100 99.57 percent adware samples kis ability scan within compressed packed files detecting 83.3 percent hidden malware however version 6.0 criticized completely removing malware leaving registry entries files pc world also highlighted suite false positives — eight 20,000 clean files incorrectly flagged malicious — noticeable impact computer performance however data cached scan making subsequent scan faster firewall blocked attacks inside outside computer tested magazine found graphical user interface awkward navigate features parental controls instant messaging protection found competing suites symantec mcafee part version 6.0 cnet pc world criticized suite relatively high retail price us 79.95 kis 6.0 supports windows 98 se nt workstation 4.0 2000 professional xp home edition xp professional xp professional x64 vista 50 megabytes free space internet explorer 5.5 windows installer 2.0 required ram cpu requirements dependent operating system version 7.0 introduced redesigned gui components renamed reorganized anti-hacker module renamed firewall anti-spy module integrated privacy control module pc world described new interface intuitive great-looking parental controls introduced specific settings different age categories child parent within age categories content categories drugs violence users manually configure profiles filtering profiles associated users since content filtered network level feature work internet browser filter relies database known urls analyse websites real-time attempts access forbidden urls logged sites visited tracked well raising privacy issues limits internet access may set based time chat rooms along webmail sites manually blocked spam filtering integrates microsoft outlook outlook express windows mail bat e-mail content analysed scored e-mail scores two specified thresholds either marked spam probably spam mail dispatcher feature shows subject sender information messages allows users avoid downloading blatant spam selecting messages download filter self-trains analyzing incoming outgoing e-mail marked spam analyzing folders containing spam valid e-mail senders verified valid e-mail whitelisted e-mail also whitelisted blacklisted based phrases present text e-mail non-ascii characters invisible text also blocked however version 7.0 relatively poor showing misidentifying 30 percent valid messages pc magazine testing 30 percent spam also made inbox protection data leaks incorporated release suite warns users programs attempt access send data certain areas internet explorer stores webform information malware protection mostly positive detection disinfection tests av-test.org version 7.0 detected 100 percent wildlist threats using one-month-old signatures set new malware however detection fell 14 percent files scanned 5.24 megabytes per second version 7.0 successfully identified six actively running rootkits four six inactive rootkits able remove two six rootkits firewall correctly blocked attempted outside connections reasonable level security left default settings version drops support windows 98 2000 nt windows xp service pack 2 required except case xp professional x64 edition vista supported well ram cpu requirements dependent operating system 75 megabytes free space internet explorer 5.5 windows installer 2.0 version introduces revised user interface application filtering module updated anti-virus engine vulnerability scanner main window separates settings four categories compared eight predecessor status bar changes colour green yellow red reflect overall program status flashes divert attention needed pc magazine also noted pop-up notifications kept minimum kaspersky claims core anti-virus engine revised increase scan speed pc magazine found initial scan took two hours however subsequent scans took two minutes complete however malware detection relatively low comparison anti-virus applications tested 650 thousand samples version 8.0 detected 95.6 percent top score around 99 percent using two-week-old signatures version 8.0 detected 52 percent viruses different set samples kaspersky also blocked 60 percent malware based solely behaviour top performers scored 55.3 percent 80 percent respectively version 2009 detected 98.1 percent adware however pc world noted achieve kind performance users modify program settings default settings kis allowed zango install block installation users must enable kis scan malware security analyzer looks operating system program patches also looks vulnerable system settings presenting users list recommended actions prevent malware gaining access system however pc world criticized amount computer jargon used lack information adjust settings appropriately hand pc magazine found feature straightforward often solution involved downloading installing update kis uses whitelist carbon black classify trusted malicious programs malicious programs allowed run unknown programs falling two categories restricted actions perform firewall blocked attacks pc magazine testing phishing protection introduced release testing pc magazine found feature blocked 44 percent phishing urls internet explorer 7 blocked 67 percent urls mozilla firefox blocked 81 percent spam filtering integrates mozilla thunderbird scans nntp traffic spam automatically diverted folder using unsupported e-mail client download pop3 imap nntp mail kaspersky still generate report messages however unsupported client toolbar program classify messages spam client version 2010 kaspersky internet security introduced overhauled user interface sandbox running applications virtualized environment 9.0.0.736 build kis 2010 fully supported windows 7 operating system beta version released windows users 8 june 2010 version included new interface well gadget available windows vista windows 7 users pc mag rated version good 4/5 stars firewall noted good made adequate malware detection rates two critical fixes released kaspersky lab making current version 11.0.2.556 1 march 2011 kaspersky released first build version 2012 came beta version english french russian version versions due later 7 june 2011 kaspersky lab announced commercial release kaspersky internet security 2012 france germany switzerland current version 12.0.0.374 beta version released windows users 3 march 2012 version includes interface looks currently least much like internet security 2012 safe run option proactive defense instead behavioural monitoring system watcher seems taking greater responsibility detecting malware safe banking feature added release candidate build 13.0.1.4088 rc released windows users 20 july 2012 final version released 28 august 2012 build 13.0.1.4190 beta testing started 12 march 2013 version introduced windows 8 like gui design final version released 3 august 2013 build 14.0.0.4651 india russia august 13 usa august 27 uk 2014 release frequently characterized inferior user expectations largely due removal range granular fine-tuning options 2013 earlier used experienced users number added back 2015 beta time technical release build 463 february 13 2014 build 14.0.0.4651 e released build 14.0.0.4651 latest current version april 2014 beta version 2015 product build 463 released followed technical release preview near-complete 2015 product first official release product bangladesh june 2014 march 2015 bloomberg accused kaspersky close ties russian military intelligence officials kaspersky slammed claims blog calling coverage sensationalist guilty exploiting paranoia increase readership result alleged russian involvement 2016 presidential election ongoing investigations department homeland security officially banned use kaspersky internet security united states federal government september 2017 december 12 2017 use kaspersky software banned use american federal government law | [
1809,
1461,
385,
7536,
1838,
4689,
6107,
3637,
6456,
6823,
7193,
6149,
7597,
5794,
88,
5452,
91,
4759,
2281,
7617,
806,
7975,
1931,
2296,
4783,
3713,
496,
7275,
5144,
142,
3394,
6560,
7289,
4091,
6580,
7683,
6235,
1237,
6951,
875,
6962,... | Test |
4,493 | 5 | SC-FDE:sc-fde single-carrier frequency domain equalization sc-fde single-carrier sc modulation combined frequency-domain equalization fde alternative approach inter symbol interference isi mitigation | [] | Validation |
4,494 | 6 | Extent_(file_systems):extent file systems extent contiguous area storage reserved file file system represented range block numbers tracks count key data devices file consist zero extents one file fragment requires one extent direct benefit storing range compactly two numbers instead canonically storing every block number range also extent allocation results less file fragmentation extent-based file systems also eliminate metadata overhead large files would traditionally taken block-allocation tree savings small compared amount stored data file sizes general make large portion metadata large files overall benefits storage efficiency performance slight order resist fragmentation several extent-based file systems allocate-on-flush many modern fault-tolerant file systems also copy-on-write although increases fragmentation similar design cp/m file system uses extents well correspond definition given cp/m extents appear contiguously single block combined directory/allocation table necessarily correspond contiguous data area disk ibm os/360 successors allocates files multiples disk tracks cylinders files could originally 16 extents restriction since lifted initial allocation size size additional extents allocated required specified user via job control language system attempts allocate initial size contiguous area although may split contiguous space available systems supporting filesystem extents include following | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
7213,
5783,
6854,
5437,
4375,
6500,
6505,
3685,
5457,
460,
7242,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
7661,
6213,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2... | Test |
4,495 | 7 | Comparison_of_video_hosting_services:comparison video hosting services following tables compare general technical information number current notable video hosting services please see individual products articles information basic general information hosts creator/company license/price etc | [
7232,
2961,
4594,
167,
7756,
7343,
7169,
518
] | Test |
4,496 | 2 | Damn_Small_Linux:damn small linux damn small linux commonly abbreviated dsl computer operating system x86 family personal computers free open source software terms gnu gpl free open source licenses designed run graphical applications older pc hardware—for example machines 486/early pentium processors little memory dsl live cd size 50 mb originally started experiment see much software could fit 50 mb eventually became full-fledged linux distribution installed storage media small capacities like bootable business cards usb flash drives various memory cards zip drives dsl originally conceived maintained john andrews five years community included robert shingledecker created mydsl system dsl control panel features issues main developers robert according exiled project currently continues work tiny core linux created april 2008 dsl originally based model-k 22 mb stripped version knoppix soon based knoppix proper allowing much easier remastering improvements dsl supports x86 pcs minimum system requirements 486 processor 8 mb ram dsl demonstrated browsing web dillo running simple games playing music systems 486 processor 16 mb ram system requirements higher running mozilla firefox optional add-ons openoffice.org office suite version 4.4.10 dsl released november 18 2008 current includes following software dsl built-in scripts download install advanced packaging tool apt apt enabled user install packages debian repositories additionally dsl hosts software ranging large applications like openoffice.org gcc smaller ones amsn means mydsl system allows convenient one-click download installation software files hosted mydsl called extensions june 2008 mydsl servers hosting 900 applications plugins extensions boot options also called cheat codes dsl automatic hardware detection may fail user may want use something default settings language keyboard vga fail safe graphics text mode ... dsl allows user enter one cheat codes boot prompt nothing entered dsl boot default options cheat codes affect many auto-detection hardware options many cheat codes also affect gui list cheat codes seen boot time also dsl wiki also run partydisk dsl mydsl handled maintained mostly robert shingledecker hosted many organizations ibiblio belgium belnet 2 areas mydsl regular testing regular area contains extensions proven stable enough everyday use broken different areas apps net system uci universal compressed iso extensions .uci format mounted separate filesystem minimize ram usage testing area newly submitted extensions theoretically work 'as advertised may number bugs standard flavour dsl live cd also versions available one also boot dsl using boot-floppy created one available floppy images 'bootfloppy.img 'bootfloppy-grub.img 'bootfloppy-usb.img 'pcmciabootfloppy.img old computers bios support el torito bootable cd specification dsl kernel loaded floppy disk ram kernel runs dsl cd usb drive dsl ported xbox video game console x-dsl x-dsl requires modified xbox run live cd installed xbox hard drive users also run x-dsl usb flash drive using usb adaptor included phantasy star online plugs memory card slot includes one usb 1.1 port x-dsl boots x11-based gui xbox controller used control mouse pointer enter text using virtual keyboard x-dsl fluxbox desktop programs e-mail web browsing word processing playing music x-dsl customized downloading extensions mydsl servers dsl live usb damn small linux created manually application like unetbootin see list tools create live usb systems full list due infighting among project originators main developers dsl development seemed standstill long time future project uncertain much dismay many users july 8 2012 john andrews original developer announced new release developed dsl website including forums inaccessible back well first rc new 4.11 released august 3 2012 followed second one september 26 damnsmalllinux.org site inaccessible sometime 2015 february 2016 march 27 2016 damnsmalllinux.org accessible time february 10 2019 inaccessible yet may 21 2019 accessible linux distributions derived damn small linux | [
2197,
3271,
1487,
6836,
58,
7214,
7587,
1893,
7223,
7954,
788,
7251,
474,
1941,
6209,
4824,
5523,
5524,
5530,
5880,
3751,
6244,
5197,
5200,
1629,
3444,
4855,
5571,
8092,
578,
5232,
2758,
1663,
1680,
2063,
5259,
6317,
4207,
1349,
7075,
2... | Test |
4,497 | 9 | Ciao_(programming_language):ciao programming language ciao general-purpose programming language supports logic constraint functional higher-order object-oriented programming styles main design objectives high expressive power extensibility safety reliability efficient execution ciao provides full prolog system supporting iso-prolog declarative subsets extensions prolog functional programming including lazy evaluation higher-order predicate abstractions constraint programming objects well feature terms records persistence several control rules breadth-first search iterative deepening ... concurrency threads/engines distributed execution agents parallel execution libraries also support www programming sockets external interfaces c java tcltk relational databases etc etc ciao built kernel extensible modular design allows restricting extending language — seen language building language restrictions extensions activated separately program module several extensions coexist application different modules programming large ciao supported via ciao also support programming small compiler capable producing small executables including builtins used program interpreter supports scripting environment includes classical top-level evolved emacs interface embeddable source-level debugger number execution visualization tools ciao preprocessor supports static debugging verification assertion checking optimization via source source program transformation tasks performed ciaopp distributed separately ciao includes lpdoc automatic documentation generator processes programs adorned ciao assertions machine-readable comments generates manuals many formats including html pdf texinfo info man etc. well on-line help ascii readme files entries indices manuals info www ... maintains www distribution sites ciao compiler run outside top level shell generates several forms architecture-independent stand-alone executables run speed efficiency executable size competitive high-level languages general particular commercial academic prolog/clp systems modules compiled compact bytecode c source files linked statically dynamically autoloaded | [
6507,
4573,
3915,
4759,
5571,
4105,
1435
] | Test |
4,498 | 2 | OS-level_virtualisation:os-level virtualisation os-level virtualization refers operating system paradigm kernel allows existence multiple isolated user-space instances instances called containers solaris docker zones solaris virtual private servers openvz partitions virtual environments ves virtual kernel dragonfly bsd jails freebsd jail chroot jail may look like real computers point view programs running computer program running ordinary operating system see resources connected devices files folders network shares cpu power quantifiable hardware capabilities computer however programs running inside container see container contents devices assigned container unix-like operating systems feature seen advanced implementation standard chroot mechanism changes apparent root folder current running process children addition isolation mechanisms kernel often provides resource-management features limit impact one container activities containers term container popularly referring os-level virtualization systems sometimes ambiguously used refer fuller virtual machine environments operating varying degrees concert host os e.g microsoft hyper-v containers ordinary operating systems personal computers computer program see even though might able access system resources include operating system may able allow deny access resources based program requests user account context runs operating system may also hide resources computer program enumerates appear enumeration results nevertheless programming point view computer program interacted resources operating system managed act interaction operating-system-virtualization containerization possible run programs within containers parts resources allocated program expecting see whole computer run inside container see allocated resources believes available several containers created operating system subset computer resources allocated container may contain number computer programs programs may run concurrently separately may even interact one another containerization similarities application virtualization latter one computer program placed isolated container isolation applies file system operating-system-level virtualization commonly used virtual hosting environments useful securely allocating finite hardware resources among large number mutually-distrusting users system administrators may also use consolidating server hardware moving services separate hosts containers one server typical scenarios include separating several programs separate containers improved security hardware independence added resource management features improved security provided use chroot mechanism however nowhere near ironclad operating-system-level virtualization implementations capable live migration also used dynamic load balancing containers nodes cluster operating-system-level virtualization usually imposes less overhead full virtualization programs virtual partitions use operating system normal system call interface need subjected emulation run intermediate virtual machine case full virtualization vmware esxi qemu hyper-v paravirtualization xen uml form virtualization also require hardware support efficient performance operating-system-level virtualization flexible virtualization approaches since host guest operating system different host one different guest kernel example linux different distributions fine operating systems windows hosted solaris partially overcomes limitation described branded zones feature provides ability run environment within container emulates older solaris 8 9 version solaris 10 host linux branded zones referred lx branded zones also available x86-based solaris systems providing complete linux userspace support execution linux applications additionally solaris provides utilities needed install red hat enterprise linux 3.x centos 3.x linux distributions inside lx zones however 2010 linux branded zones removed solaris 2014 reintroduced illumos open source solaris fork supporting 32-bit linux kernels implementations provide file-level copy-on-write cow mechanisms commonly standard file system shared partitions partitions change files automatically create copies easier back space-efficient simpler cache block-level copy-on-write schemes common whole-system virtualizers whole-system virtualizers however work non-native file systems create roll back snapshots entire system state | [
3599,
4293,
2182,
3953,
5396,
3636,
3978,
6117,
5760,
5064,
5065,
6477,
1133,
6860,
6505,
3682,
4759,
1547,
4052,
1193,
4059,
8001,
5506,
4441,
5884,
875,
3761,
191,
5904,
6984,
7355,
7357,
5571,
6634,
8096,
578,
594,
5244,
7756,
4534,
... | Test |
4,499 | 3 | Higemaru_Makaijima_-_Nanatsu_no_Shima_Daibōken:higemaru makaijima nanatsu shima daibōken higemaru makaijima hero pirate ship higemaru named momotaru must pilot sailing vessel around ocean surrounding seven islands goal find greatest treasure must collect keys open dock gates islands invading several pirate ships defeating captain board combat gameplay pirate ships taken directly arcade predecessor small modifications momotaru collected key pirate ship must sail around islands search correct dock gate key corresponds player embarks exploration island find items defeat boss collect treasures heading search another island key island exploration sections extremely reminiscent dungeon exploration aspects legend zelda game often compared | [] | Test |
4,500 | 2 | Fluent_Design_System:fluent design system fluent design system codenamed project neon officially unveiled microsoft fluent design system design language developed 2017 microsoft fluent design revamp microsoft design language 2 includes guidelines designs interactions used within software designed windows 10 devices platforms system based five key components light depth motion material scale new design language includes prominent use motion depth translucency effects transition fluent long-term project preliminary aspects design particularly acrylic translucency effects reveal effects buttons incorporated windows 10 particularly within fall creators update released october 2017 well update xbox one system software released alongside aspects fluent introduced windows time purpose light draw attention illuminate information upon hovering reveal highlight illuminates nearby hidden borders objects hamburger navigation menu lists buttons upon selection clicking tapping white circular illumination effect quickly appears additionally windows holographic environment rounded white pointer exists 6 november 2017 microsoft employee david haz stated plans apply reveal highlight taskbar exist—but occurred focusable items border glow via focus visual addition depth utilizes z-axis allows content differentiation via layering depth presented via drop shadows z-depth layering motion establishes relationship ui elements provides continuity experience list animations inserting removing items collection connected animations item transitions content change element appears continue flying across app used portion content page change fade-in fade-out bring dismiss items view parallax moves objects different rates background moves slower content example list scroll faster background image creating depth effect addition motion item pressed momentarily recedes background restores original position examples press feedback include start menu live tiles action center quick actions microsoft edge address bar buttons acrylic material creates translucent blurred effect slight noise effect visual hierarchy created using different opacities example app primary content surfaces often opaque exception widgets lightweight apps calculator secondary pane 80 background acrylic tertiary pane 60 background acrylic background acrylic blurs items behind active acrylic material in-app acrylic blurs content within app acrylic disabled specific window app longer selected types acrylic disabled system-wide transparency disabled battery saver mode enabled low-end hardware background acrylic disabled window de-selected windows 10 mobile hololens tablet mode apps scale across different form factors display sizes 0d 3d elements adapt screen size available across multiple dimensions conscious controls also categorized within scale e.g scrollbars inputs adapt different methods invocation fluent key principles blocks light depth motion material scale turn away flat concept metro defined preserving clean look feel metro introduced fluent renews visuals aero design approach introduced windows vista windows 7 including blurred translucency parallax animated patterns drop shadow highlight effects following mouse pointer input gesture movements faux materials metro dumped | [
448,
3076,
8054,
2452,
458,
4759,
5637,
6256,
1536,
7247,
7619,
3180,
8073,
8076,
5563,
3187,
6096,
2472,
4687,
1097,
306,
6110,
4880,
5313,
224,
3028,
6294,
7660,
7848,
8118,
3048,
6136,
3907,
3057,
2066,
5781,
432,
2885,
6054,
3585,
6... | Test |
4,501 | 4 | Digital_Forensics_Framework:digital forensics framework digital forensics framework dff computer forensics open-source software used professionals non-experts collect preserve reveal digital evidence without compromising systems data digital forensics framework offers graphical user interface gui developed pyqt classical tree view features recursive view tagging live search bookmarking available command line interface allows user remotely perform digital investigation comes common shell functions completion task management globing keyboard shortcuts dff run batch scripts startup automate repetitive tasks advanced users developers use dff directly python interpreter script investigation addition source code package binary installers gnu/linux windows digital forensics framework available operating system distributions typical free open-source software foss including debian fedora ubuntu digital forensics framework methods available digital forensics oriented distribution live cd published books mention digital forensics framework dff used solve 2010 digital forensic research workshop dfrws challenge consisting reconstructing physical dump nand flash memory | [
3700,
6488,
5965,
4759,
5571,
578
] | Test |
4,502 | 3 | Compaq_Presario_R3000:compaq presario r3000 compaq presario r3000 line series laptops designed built hewlett-packard corporation could shipped microsoft windows 98 2000 xp series used intel amd processors could 256 mb 256 mib 512 mb ram reserved graphics card ati mobility radeon 9000/9100 igp integrated graphics processor board sound card made analog devices also board connected jbl pro speakers ports computer usb ieee 1394 firewire headphone microphone s-video monitor parallel also rj45 connector network cable phone line jack one special series expansion port hp expansion dock type port found hp notebooks models series broadcom wifi adapters computer disk reader writer capable playing dvds burning cds downloading software disk computer encased black silver plastic shell weighs ten pounds two cooling fans mounted keyboard | [
3764,
4736,
4759
] | Test |
4,503 | 3 | Adventure_Island_(video_game):adventure island video game hudson adventure island side-scrolling platform game produced hudson soft released japan famicom msx september 12 1986 released north america nintendo entertainment system september 1988 pal region 1992 title adventure island classic adventure island adaptation arcade game wonder boy developed escape sega adventure island followed series sequels connection wonder boy series player controls master higgins known master wigins united kingdom takahashi meijin japanese versions young man ventured adventure island south pacific hearing evil witch doctor kidnapped princess tina rescue higgins must survive series 32 stages eight worlds called areas divided four stages rounds divided four checkpoints player reaches fourth round area must confront boss end continue next area game completed player saves girl defeating eighth final form evil lord master higgins player character loses life whenever touches enemy enemy attack fire roast falls pitfall body water moreover player also health gauge starts 11 points gradually depletes time whenever higgins trips rock path higgins health gauge reaches zero lose life well higgins still extra lives left revive last checkpoint passed game ends higgins lives runs replenish health higgins pick numerous fruits milk bottle path maximum health reaches 16 points player score reaches 50,000 points 100,000 points 200,000 points higgins receive extra life finding bee-like fairy known honey girl grant higgins invincibility ten seconds allow kill enemies single touch also hidden somewhere stage special pot doubles player end-of-stage bonus collected higgins starts life without ability attack gain ability attack picking stone axe found specific spots stage higgins wielding stone axe trade magical fireballs longer range capable destroying rocks rolling stones invulnerable stone axe break egg player must touch hit weapon twice addition weapons numerous bonus items stuck inside also negative item eggplant drains higgins life meter eggs immediately visible plain sight locations hidden eggs usually indicated weapon thrown player disappears falling ground uncovered jumping indicated spot hidden spots n't contain hidden eggs instead cloud warp player bonus stage instead uncovered standing still short period time bonus stages player collect series fruits worth 500 points regardless type higgins falls pitfall however instead losing life return regular stage next checkpoint fourth round area higgins confront different form evil witch doctor game boss character ability change head eight different types higgins must defeat striking head specific number times weapon number hits required defeat increases area first form requires eight hits every subsequent form requires two additional hits eighth final form requires 22 hits evil witch doctor defeated change head escape next area uses attack form thing changes besides durability mobility speed speed fireball attacks higgins defeats final form evil witch doctor fall pit girl rescued adventure island began development direct port sega arcade game wonder boy rights hudson soft obtained developer escape known westone bit entertainment development port decision made change character design protagonist modeling naming hudson soft spokesman takahashi meijin western version adventure island takahashi meijin character renamed master higgins wonder boy series adopted action rpg system sequels beginning wonder boy monster land adventure island sequels stuck game system original wonder boy moreover hudson soft also obtained rights port wonder boy sequels turbografx-16 changing title character designs game exception incidentally japanese version dragon curse turbografx-16 adaptation titled adventure island rights adventure island series currently owned konami absorbed hudson soft 2012 nes version adventure island re-released japan game boy advance famicom mini title may 21 2004 later re-released internationally virtual console service 2008 wii 2014 wii u remake also developed playstation 2 gamecube titled hudson selection volume 4 takahashi meijin bōken jima released exclusively japan december 18 2003 two sequels produced nes adventure island ii adventure island 3 well fourth game famicom released exclusively japan titled takahashi meijin bōken jima iv addition standalone famicom mini re-release first game four games re-released compilation game boy advance titled hudson best collection vol 6 bōken jima collection released japan january 19 2006 sequels also released platforms adventure island adventure island ii game boy based second third nes games respectively super adventure island super adventure island ii super nes new adventure island turbografx-16 wii gacha wa shi meijin bōken jima 2007 mobile adventure island quest takahashi meijin 2010 mobile takahashi meijin appears playable character crossover fighting game dreammix tv world fighters released japan gamecube december 13 2003 takahasia meijin also appears sport mobile game gachapin mukku supōtsugēmuapuri 2008 adventure island received positive mixed reviews critics gamespot awarded game 6.5 10 calling fast-paced challenging platformer gamesradar+ ranked 23rd best nes game ever made staff praised fact challenge comes quality level design low quality | [
6943,
7469,
1507,
7388,
6195
] | Test |
4,504 | 9 | Simcenter_Amesim:simcenter amesim simcenter amesim commercial simulation software modeling analysis multi-domain systems part systems engineering domain falls mechatronic engineering field software package suite tools used model analyze predict performance mechatronics systems models described using nonlinear time-dependent analytical equations represent system ’ hydraulic pneumatic thermal electric mechanical behavior compared 3d cae modeling approach gives capability simulate behavior systems detailed cad geometry available hence used earlier system design cycle v-model create simulation model system set libraries used contain pre-defined components different physical domains icons system connected purpose icon ports several inputs outputs causality enforced linking inputs one icon outputs another icon vice versa simcenter amesim libraries written c language also support modelica non-proprietary object-oriented equation based language model complex physical systems containing e.g. mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents software runs linux windows platforms simcenter amesim part siemens plm software simcenter portfolio combines 1d simulation 3d cae physical testing intelligent reporting data analytics portfolio intended provide engineers analysts comprehensive solution development complex products include smart systems implementing predictive engineering analytics approach simcenter amesim software developed imagine s.a. company acquired june 2007 lms international acquired november 2012 siemens ag imagine s.a. company created 1987 dr michel lebrun university claude bernard france control complex dynamic systems coupling hydraulic servo-actuators finite-elements mechanical structures initial engineering project involved deck elevation sinking ekofisk north sea petroleum platforms early 1990s association pr c. w. richards coming university bath england led first commercial release simcenter amesim 1995 dedicated fluid control systems simcenter amesim used companies automotive aerospace advanced manufacturing industries simcenter amesim multi-domain software allows link different physics domains hydraulic pneumatic mechanic electrical thermal electromechanical based bond graph theory modelling system done four steps submodel parameter mode simcenter amesim model compiled windows platform simcenter amesim works free gcc compiler provided software also works microsoft visual c++ compiler free express edition since version 4.3.0 simcenter amesim uses intel compiler platforms simcenter amesim features create system simulation model simcenter amesim components different physical domains assembled physical libraries developed engineering services partnerships customers version 2019.1 simcenter amesim offered 48 libraries 6500 multi-physics models answer various application requirements simcenter amesim libraries simcenter amesim simcenter sysdm simcenter system architect simcenter webapp server simcenter amesim used engineering schools universities also reference framework various research projects europe free simcenter amesim student edition license downloaded | [
1361,
6527,
5965,
3915,
1336,
4759,
2524,
1989,
578,
2803,
1435,
5117
] | Test |
4,505 | 1 | Mimer_SQL:mimer sql mimer sql sql-based relational database management system produced swedish company mimer information technology ab mimer ab formerly known upright database technology ab originally developed research project uppsala university uppsala sweden 1970s developed commercial product database deployed wide range application situations including nhs pulse blood transfusion service uk volvo cars production line sweden automotive dealers australia sometimes one limited options available realtime critical applications resource restricted situations mobile devices mimer sql originated project itc service center supporting uppsala university institutions leverage relational database capabilities proposed codd others initial release 1975 designated rapid written ibm assembler language name changed mimer 1977 avoid trademark issue universities interested project number machine architectures mimer re-written fortran achieve portability models developed mimer mimer/ql implementing quel query languages emergence sql 1980s standard query language resulted mimers developers choosing adopt product becoming mimer sql 1984 mimer transferred newly established company mimer information systems mimer sql database server currently supported main platforms windows macos linux openvms alpha integrity previous versions database engine supported operating systems including solaris aix hp-ux tru 64 sco versions mimer sql available download free development enterprise product standards based sql database server based upon mimer sql experience database server product highly configurable components added removed replacing foundation product achieve derived product suitable embedded real-time small footprint application mimer sql realtime database server replacement database engine specifically designed applications real-time aspects paramount sometimes marketed automotive approach resource limited environments mimer sql mobile database server replacement runtime environment without sql compiler used portable certain custom devices termed mobile approach custom embedded approaches applied multiple hardware operating system system combinations options enable mimer sql deployed wide variety additional target platforms real-time operating systems including android vxworks database available real-time embedded automotive specialist versions requiring maintenance intention make product suitable mission-critical automotive process automation telecommunication systems mimer sql provides support multiple database application programming interfaces apis odbc jdbc ado.net embedded sql c/c++ cobol fortran native api mimer sql real-time api mimer sql micro c api mimer provider manager ado.net provider dispatcher uses different plugins access different underlying ado.net providers mimer provider manager makes possible write database independent ado.net applications mimer sql mainly uses optimistic concurrency control occ manage concurrent transactions makes database locking free enables real-time predictability mimer sql assigned port 1360 internet assigned numbers authority iana registry name mimer taken norse mythology mimer giant guarding well wisdom also known mímisbrunnr metaphorically database system managing data | [
4759,
7248,
7341,
900,
2103,
578,
6462,
2054,
6386,
955,
3244,
5711
] | Test |
4,506 | 3 | Dragon_Buster:dragon buster game featured side-scrolling platform gameplay overworld map similar later super mario bros. series dragon buster also earliest game feature double jump mechanic one first use visual health meter beginning prince named clovis born son kingdom chief bodyguard royal lawrence family young child clovis mischievous undisciplined father thought might best place care monk lived woods far kingdom monk care clovis began learn various aspects knowledge including superior swordsman word reached monk king lawrence 16-year-old daughter celia abducted held fearsome dragon wished break kingdom spirit coerce kingdom bidding clovis felt sense duty chase dragon rescue celia name father order save princess trained daily monk learned withstand injury whether cut swords burned flame still capable fighter ever player must guide hero clovis round castle rescue beloved princess celia multiple princess celias game one every castles goal reach true celia end game final castle celia wears different outfit time rescued player progresses round must choose various paths take castle many paths choose number increases player gets higher rounds paths take player individual levels round multiple bosses level many less powerful enemies scattered throughout level player must find boss contains exit level proceed round finally reach castle clovis vitality restores 25 level completed game ends clovis vitality reaches zero five different types levels cave tower boneyard mountain ruins levels boasts particular type monster others example boneyard boasts lots boss skeleton cave mostly linear type level mostly descends horizontal movement boasts lots bats snakes tower notable many floors player must lot climbing type level boneyard probably hardest type level lot enemies paths choose player likely end defeating every boss level finds boss contains exit mountain player dropping time starts top mountain must work way ruins standard type level bit everything four types levels contain finally castle end round every castle starts long drop takes player dragon room must fight dragon game ported nec pc-8801 computer enix port featured introduction game entirely new ending featuring cinema screens depicting battle-torn clovis teary-eyed celia dragon buster also included hidden mini-game tales abyss playstation 2 nintendo 3ds included various namco museum compilations including namco museum volume 2 original playstation namco museum battle collection playstation portable namco museum virtual arcade xbox 360 | [
723,
7179,
1237
] | Test |
4,507 | 3 | Intel_8288:intel 8288 intel 8288 bus controller designed intel 8086/8087/8088/8089 chip supplied 20-pin dip package 8086 8088 operate maximum mode configured primarily multiprocessor operation working coprocessors necessary control signals generated 8288 used ibm pc xt clones ibm pc used successor intel 82288 intel 8288 i8288 industrial grade version available us 14.30 33.75 quantities 100 respectively | [
6872,
2968,
4479,
4277,
2036
] | Validation |
4,508 | 4 | WDU_(software):wdu software westinghouse disk utility popularly called wdu copy/backup/restore program ibm dos dos/vs dos/vse environments 1978 reported wdu product westinghouse electric corporation use 3,000 sites originally designed ibm dos westinghouse continued developing subsequent generations including dos/vs dos/vse vm/cms product offered wide variety backup copy options data streaming alternating tape drives ability create archives steve o'donnell wrote original utility distributed free charge popularity made westinghouse realize wdu potential commercial product thus laying foundation westinghouse software group eventually called wems westinghouse management systems 1972 ibm released dos/vs ibm/370 westinghouse software group began rewrite new products several new team members assigned including john gaston took lead development following departure steve o'donnell latter 1970s steve o'donnell went found goal systems inc. westinghouse marketing suffered schism time result europe established independent subsidiary westinghouse electric management systems sa wemssa headquartered paris point westinghouse product line wdu westi bifurcated taking independent development paths original development team moved orlando florida eventually came management dr. ray ferguson focused integration vse later conjoining bifurcated products new development began initiated iii orlando florida guided dr. ferguson original plans called vm/cms new vse versions however part way development westinghouse began break division outsourcing thrust reaganomics era badly managed negotiations westinghouse ended neither developers outsourcing partners spelled end one industries foremost software groups north american marketing conducted wems marketing group based pittsburgh included first level tech support westinghouse electric management systems sa wemssa paris london geneva zürich munich amsterdam given world marketing rights initially europe africa far east | [
2810,
6507,
3166,
8173,
1456,
1376,
7999,
7017,
330,
5424,
1600,
2354,
360
] | Validation |
4,509 | 5 | Peg_DHCP:peg dhcp peg dhcp method defined rfc 2322 assign ip addresses context regular dhcp would n't work server hands wooden clothes-pegs numbered addresses allocate additional leaflet network information client typically user configures device accordingly even though rfc management ip numbers peg-dhcp published first april 1998 describes unlike april fools day rfcs regularly used protocol serious purpose preparation hacking progress 1997 organizers looking robust way assign ip addresses participants obvious first choice dhcp almost completely defenseless rogue servers retained considering traditionally creative use network instead every address allocate variable host part written wooden peg waterproof marker user would attach cable connecting device network peg accompanied leaflet information static net part ip address netmask default gateway dns servers often also mac addresses prevent arp spoofing different subnets lan wlan distinguished different colors used write pegs peg dhcp successfully used hacking progress '97 following events netherlands including 2009 event hacking random german chaos computer club used chaos communication camps still using editions chaos communication congress hacking random pegs distributed according network map event terrain every field distinct subnet per subnet division regular ip address distribution via dhcp fixed ip addresses distributed via peg dhcp obtain ip address via peg dhcp one note subnet number field datenklo dedicated rain-proof box networking equipment usually empty portable toilet subnet number correct routable ip address could handed | [
2281,
2644,
7637,
4415,
2119,
6633,
3383,
2043,
3819,
7214,
7217,
7765,
5880,
5181,
4208
] | Validation |
4,510 | 2 | Soft_Hard_Real-Time_Kernel:soft hard real-time kernel s.ha.r.k acronym stands soft hard real-time kernel completely configurable kernel architecture designed supporting hard soft non real-time applications interchangeable scheduling algorithms kernel architecture main benefit application developed independently particular system configuration allows new modules added replaced application specific scheduling policies evaluated predictability overhead performance s.ha.r.k developed retis lab research facility sant'anna school advanced studies university pavia tool teaching testing developing real-time software systems used teaching many universities including sant'anna school advanced studies malardalens university sweden unlike kernels traditional operating systems s.ha.r.k fully modular terms scheduling policies aperiodic servers concurrency control protocols modularity achieved partitioning system activities generic kernel set modules registered initialization configure kernel according specific application requirements s.ha.r.k evolution hartik kernel based oslib project | [
5021,
3751,
4336
] | Test |
4,511 | 1 | Elasticsearch:elasticsearch elasticsearch search engine based lucene library provides distributed multitenant-capable full-text search engine http web interface schema-free json documents elasticsearch developed java following open-core business model parts software licensed various open-source licenses mostly apache license parts fall proprietary source-available elastic license official clients available java .net c php python apache groovy ruby many languages according db-engines ranking elasticsearch popular enterprise search engine followed apache solr also based lucene shay banon created precursor elasticsearch called compass 2004 thinking third version compass realized would necessary rewrite big parts compass create scalable search solution created solution built ground distributed used common interface json http suitable programming languages java well shay banon released first version elasticsearch february 2010 elastic nv founded 2012 provide commercial services products around elasticsearch related software june 2014 company announced raising 70 million series c funding round 18 months forming company round led new enterprise associates nea additional funders include benchmark capital index ventures round brings total funding 104m march 2015 company elasticsearch changed name elastic june 2018 elastic filed initial public offering estimated valuation 1.5 3 billion dollars 5 october 2018 elastic listed new york stock exchange elasticsearch used search kinds documents provides scalable search near real-time search supports multitenancy elasticsearch distributed means indices divided shards shard zero replicas node hosts one shards acts coordinator delegate operations correct shard rebalancing routing done automatically related data often stored index consists one primary shards zero replica shards index created number primary shards changed elasticsearch developed alongside data collection log-parsing engine called logstash analytics visualisation platform called kibana beats collection lightweight data shippers four products designed use integrated solution referred elastic stack formerly elk stack elasticsearch uses lucene tries make features available json java api supports facetting percolating useful notifying new documents match registered queries another feature called gateway handles long-term persistence index example index recovered gateway event server crash elasticsearch supports real-time get requests makes suitable nosql datastore lacks distributed transactions 20 may 2019 elastic made core security features elastic stack free including tls encrypted communications file native realm creating managing users role-based access control controlling user access cluster apis indexes developed found acquisition elastic 2015 elastic cloud family elasticsearch-powered saas offerings include elasticsearch service well elastic app search service elastic site search service developed elastic ’ acquisition swiftype late 2017 elastic formed partnerships google offer elastic cloud gcp alibaba offer elasticsearch kibana alibaba cloud elasticsearch service elastic cloud official hosted managed elasticsearch kibana offering creators project since august 2018 elasticsearch service users create secure deployments partners google cloud platform gcp alibaba cloud aws offers elasticsearch managed service since 2015 managed services provide hosting deployment backup support managed services also include support kibana elasticsearch basis pangeanic contribution eu marie curie research project expert called activatm pangeanic built bilingual database compatible computer-assisted translation tools could offer real-time access via api variety tools project received funding eu national european central translation memory project connecting europe facility cef programme nec tm aims centralise national translation assets eu member states countries re-use bilingual translation data produced result public procurement contracts | [
901,
6428,
3706,
5571,
3383,
2856,
6029,
7379,
3558,
4072,
1962,
4439,
5863,
6387,
5965,
3915,
6586,
80,
2530,
5089
] | Test |
4,512 | 9 | Xavier_Leroy:xavier leroy xavier leroy born march 15 1968 french computer scientist programmer best known role primary developer ocaml system professor software science collège de france appointment collège de france 2018 senior scientist directeur de recherche french government research institution inria leroy admitted école normale supérieure paris 1987 studied mathematics computer science 1989 1992 phd computer science supervision gérard huet internationally recognized expert functional programming languages compilers recent years taken interest formal methods formal proofs certified compilation leader compcert project develops optimizing compiler c programming language formally verified coq leroy also original author linuxthreads widely used threading package linux versions prior 2.6 linux 2.6 introduced nptl much extensive support kernel replace linuxthreads 2015 named fellow association computing machinery contributions safe high-performance functional programming languages compilers compiler verification awarded 2016 milner award royal society | [
1361,
4405,
6466,
1243,
5621,
1435
] | Test |
4,513 | 1 | Croatian_Register_of_Shipping:croatian register shipping croatian register shipping also known crs independent classification society established 1949 non-profit organisation working marine market developing technical rules supervising implementation managing risk performing surveys ships society head office split croatian register shipping member international association classification societies iacs since may 2011 register officially recognized malta maritime authority | [
3582
] | Test |
4,514 | 3 | Stepping_level:stepping level integrated circuits stepping level revision level version number refers introduction revision one photolithographic photomasks within set photomasks used pattern integrated circuit term originated name equipment steppers exposes photoresist light integrated circuits two primary classes mask sets 1. base layers used build structures make logic transistors 2 metal layers connect logic together typically integrated circuit manufacturer intel amd invests money stepping i.e revision masks found bugs logic made improvements design allow faster processing found way increase yield improve bin splits i.e. create faster transistors hence faster cpus improve maneuverability easily identify marginal circuits reduce test time reduce cost testing part many integrated circuits means interrogating order discover stepping level example x86 cpus executing cpuid eax register set 1 place values registers show cpu stepping level stepping identifiers commonly alphabetic letter followed numeric number example b2 usually letter indicates revision level chip base layers number indicates revision level metal layers change letter indicates change base layer mask revision metal layers change number indicates metal-layer–only mask revision analogy major/minor revision numbers used software versioning base layer revision changes time consuming expensive manufacturer fixes difficult impossible accomplish metal-only changes integrated circuit intel core microarchitecture uses number steppings unlike previous microarchitectures represent incremental improvements also different sets features like cache size low power modes steppings used across brands typically disabling features limiting clock frequencies low-end chips steppings reduced cache size use separate naming scheme means releases longer alphabetic order | [
2977,
4845,
694,
5784,
5988,
3565,
352,
3443,
8077
] | Test |
4,515 | 3 | UltraSPARC_IV:ultrasparc iv ultrasparc iv jaguar follow-up ultrasparc iv+ panther microprocessors designed sun microsystems manufactured texas instruments fourth generation ultrasparc microprocessors implement 64-bit sparc v9 instruction set architecture isa ultrasparc iv originally succeeded ultrasparc v millennium canceled announcement niagara ultrasparc t1 microprocessor early 2004 instead succeeded fujitsu-designed sparc64 vi ultrasparc iv developed part sun throughput computing initiative included ultrasparc v millennium gemini ultrasparc t1 niagara microprocessors four original designs initiative two reached production ultrasparc iv ultrasparc t1 whereas millennium niagara implemented block multithreading also known coarse-grained multithreading ultrasparc iv implemented chip-multithreading cmp — multiple single-thread cores ultrasparc iv first multi-core sparc processor released march 2004 internally implements two modified ultrasparc iii cores physical packaging identical ultrasparc iii exception one pin ultrasparc iii cores improved variety ways instruction fetch store bandwidth data prefetching optimized floating-point adder implements additional hardware handle number nan underflow cases avoid exceptions cores share l2 cache capacity 16 mb l2 cache tags ultrasparc iv contains 66 million transistors measures 22.1 mm 16.1 mm 356 mm fabricated texas instruments 0.13 µm process ultrasparc iv+ released mid-2005 also dual-core design featuring enhanced processor cores on-chip l2 cache fabricated 90 nanometer manufacturing process initial speed ultrasparc iv+ 1.5 ghz 0.3 ghz less intended 1.8 ghz april 2007 increased 2.1 ghz contains 295 million transistors servers using ultrasparc iv released september 2004 ultrasparc iv+ released sun servers september 2005 sun fire v490 v890 e2900 e4900 e6900 e20k e25k systems use ultrasparc iv iv+ processors systems range 4 72 processor sockets 8 144 cores servers powered ultrasparc iv+ processor well received allowing sun regain revenue lead risc/unix server market 2006 | [
6329,
1254,
1160,
1258,
2992,
5373,
1263,
6719,
1185,
1937,
7639,
2299,
4418,
7453,
3294,
3026,
4967,
5760,
418,
6474,
515,
1590,
8138,
3747,
1237,
8145,
971
] | Validation |
4,516 | 1 | ADOdb_Lite:adodb lite adodb lite small fast adodb-compatible database abstraction library written php uses less 100 kb system ram http access compared 640 kb adodb benchmark adodb lite also 300 faster adodb library adodb lite library fully expandable use modules library contains pear module contains pear db-compatible commands library also contains transaction module giving full transaction support many supported databases library support number user created modules easily expand library module system also gives programmer/admin ability structure library usage based upon needs website library fast compared database abstraction libraries | [
6029,
6604,
3863,
2906,
5956
] | Test |
4,517 | 4 | Wi-Fi_deauthentication_attack:wi-fi deauthentication attack wi-fi deauthentication attack type denial-of-service attack targets communication user wi-fi wireless access point unlike radio jammers deauthentication acts unique way ieee 802.11 wi-fi protocol contains provision deauthentication frame sending frame access point station called sanctioned technique inform rogue station disconnected network attacker send deauthentication frame time wireless access point spoofed address victim protocol require encryption frame even session established wired equivalent privacy wep data privacy attacker needs know victim mac address available clear wireless network sniffing one main purposes deauthentication used hacking community force clients connect evil twin access point used capture network packets transferred client rap attacker conducts deauthentication attack target client disconnecting current network thus allowing client automatically connect evil twin access point order mount brute-force dictionary based wpa password cracking attack wifi user wpa wpa2 enabled hacker must first sniff wpa 4-way handshake user elicited provide sequence first forcing offline deauthentication attack similar phishing style attack without password cracking wifiphisher starts deauthentication attack disconnect user legitimate base station mounts man-in-the-middle attack collect passwords supplied unwitting user federal communications commission fined hotels companies launching deauthentication attacks guests purpose drive personal hotspots force pay on-site wi-fi services aircrack-ng suite mdk3 void11 scapy zulu software mount wifi deauthentication attack aireplay-ng aircrack-ng suite tool run deauthentication attack executing one-line command pineapple rogue access point issue deauth attack wifijammer also automatically scan jam networks within range esp8266 used perform detect deauth attacks using wi-pwn android nexmon supports broadcom wlan chip deauth attacks | [
2944,
3189,
5272,
1691,
731,
7207,
7209,
3426
] | Test |
4,518 | 3 | Solitaire_Royale:solitaire royale solitaire royale collection solitaire games published spectrum holobyte 1987 apple iigs ms-dos macintosh amiga eight games included 3 shuffles draw pyramid golf corners reno klondike canfield calculation also three children games pairs wish concentration solitaire royale computer solitaire card-game simulation game features colorful card-back designs digitized sounds cards shuffling eight solitaire games included game features tournament competition challenge accumulate highest total score upon playing eight games row two combatants receiving exactly deal solitaire game fireworks displayed game received 5 5 stars dragon 141 role computers column | [
6380
] | Test |
4,519 | 8 | Mobile_deep_linking:mobile deep linking context mobile apps deep linking consists using uniform resource identifier uri links specific location within mobile app rather simply launching app deferred deep linking allows users deep link content even app already installed depending mobile device platform uri required trigger app may different see list supported deep links unlike web underlying technology http urls allow deep linking default enabling deep linking mobile apps requires apps configured properly handle uniform resource identifier uri like url address website uri address app mobile device examples uris launch mobile app format uri used trigger deep link app often different depending mobile operating system android devices work intents blackberry 10 devices work bb10 invocation framework firefox os devices work web activities ios devices work openurl application method windows phone 8 devices work urimapper class greatest benefit mobile deep linking ability marketers app developers bring users directly specific location within app dedicated link deep links made web usable mobile deep links mobile apps unlike deep links web link format standardized based http guidelines mobile deep links follow consistent format causes confusion development different sets links required access app different mobile operating system google allows app developers ios android apps surface in-app content via mobile google searches developers need submit app deep linking apps ios android indexed google alternatively developers use google short links deep link mobile app users app installed direct others webpage one example better user experience made possible deep link data passing install solution one search information passed app bring user exact information drove app compared common web link implementation may reduce number steps required example search hotels boston user currently needs shortened | [
1355,
4668,
1582,
4785
] | Test |
4,520 | 4 | Software_forensics:software forensics software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert past methods code comparison included hashing statistical analysis text matching tokenization methods compared software code produced single measure indicating whether copying occurred however measures accurate enough admissible court results accurate algorithms could easily fooled simple substitutions code methods take account fact code could similar reasons copying 2003 robert zeidman developed algorithms incorporated codesuite tool multidimensional software correlation divides software code basic elements determines elements similar “ correlated. ” also created procedure filtering interpreting correlations eliminate reasons correlation due copying common algorithms third-party code common identifier names common author automatic code generation combination algorithms procedures resulted reliable quantitative analysis available previously zeidman ’ book software ip detective handbook considered standard textbook software forensics codesuite tools methodology used many software ip litigations including connectu v. facebook symantec v. irs baker mckenzie sco group inc. v. international business machines corp following use software tools compare code determine amount correlation expert use iterative filtering process determine correlated code due third-party code code generation tools commonly used names common algorithms common programmers copying correlation due copying copier authority rights holder copyright infringement occurred software contain trade secrets provide competitive advantage business determine trade secret theft tools processes used detect copyright infringement code copied without authority code characteristics trade secret—it generally known business keeps secret secrecy maintains value business—then copied code constitutes trade secret theft trade secret theft also involve taking code functionality without literally copying code comparing code functionality difficult problem yet accomplished algorithm reasonable time reason finding theft code functionality still mostly manual process trade secret functionality currently possible scientifically detect software patent infringement software patents cover general implementation rather specific source code example program implements patented invention written many available programming languages using different function names variable names performing operations different sequences many combinations ways implement inventions software even powerful modern computers consider combinations code might infringe patent work still left human experts using knowledge experience problem many software forensics trying automate finding algorithm simplifying process one important rule forensic analysis objective facts must considered first reviewing comments code searching internet find information companies distribute code programmers wrote code useful objective facts regarding correlation considered analysis performed using forensic tools procedures analysts begin looking subjective evidence like comments code information subjective evidence conflicts objective analysis analysts need doubt subjective evidence fake copyright notices open source notifications programmer names added source code copying took place order disguise copying uncommon real-world cases code theft | [
3931,
3700
] | Validation |
4,521 | 4 | Malcon:malcon malcon premier international technology security conference focusing exclusively proactive malware research analysis malcon part information sharing analysis center support government india executed india uk based multinational media company ubm plc also owns infamous black hat briefings malcon aims bringing together malware information security researchers across globe share key research insights building containment next generation malwares unlike hacker conventions malcon opposed much debated ‘ zero day ’ ‘ full disclosure ’ first malcon conference took place december 2010 mumbai pune india many attendees malcon include security professionals government employees lawyers researchers journalists hackers interest malwares global impact economy event promotes “ proactive ” research malware coding openly invites malcoders come forward demonstrate creation malcon founded 2010 rajshekhar murthy known thebluegenius science graduate ex-employee microsoft corporation since inception malcon widely backed numerous government organizations ntro eventually malcon became part information sharing analysis center isac non-profit support government india 2011 event organizers issued faq outlines philosophy malcon explain objective “ aim help security industry well software industry understand fine ‘ art ’ malware development covers even exploits build better secure code well work towards mitigating potential new attack vectors. ” interview kerbsonsecurity quoted conference done inviting best well known security experts share statistics slides ‘ analysis ’ malwares benefit community today except awareness need malcon conference bridge ignored gap security companies malcoders get common platform talk like concept ‘ ethical hacking ’ helped organizations see hackers bad time accept ‘ ethical malcoding ’ required research identify mitigate newer malwares ‘ proactive ’ way rajshekhar murthy coined new security term “ ethical malcoding ” differentiate malcoders work background independently various security firms research financial gain another term guuware describe software ’ may similar attributes malware used defensive purposes malcon approach openly inviting ethical malcoders gained lot international attention faced criticism notable security sites bloggers part malcon faq maintains “ rapid analysis detection technology malcon conference new malwares constantly created even available handful security vendors team researchers analysis enough active open participation ‘ ethical malcoders ’ help advance research containment capability existing methods ” malcon convention following format malware comic announced malcon team day maha shivaratri 20 february 2012 stated planned release zero-days using comics comic expected two formats web printed version printed version specifically indian government officials intelligence agencies law enforcement groups regular attendees conference creation malware journal formally disclosed malcon 2011 quarterly journal collaboration various hacker groups objective helping coders understand art behind malcoding offensive defense security journal also seen remarkable significant point history evolution hackers cyber warfare capabilities india | [
5452,
1594,
4115,
5051,
7614,
1350,
2684,
2912,
3486,
7050
] | Test |
4,522 | 4 | Project_Zero:project zero project zero team security analysts employed google tasked finding zero-day vulnerabilities secret hackable bugs exploited criminals state-sponsored hackers intelligence agencies announced 15th july 2014 finding number flaws software used many end-users researching problems critical heartbleed vulnerability google decided form full-time team dedicated finding vulnerabilities google software software used users new project announced 15 july 2014 google security blog launched one principal innovations project zero provided strict 90-day disclosure deadline along publicly visible bugtracker vulnerability disclosure process documented idea project zero traced back 2010 establishment fits larger trend google counter-surveillance initiatives wake 2013 global surveillance disclosures edward snowden team formerly headed chris evans previously head google chrome security team subsequently joined tesla motors notable members include security researchers ben hawkes ian beer tavis ormandy hawkes eventually became team manager team focus finding bugs novel attacks also researching publicly documenting flaws could exploited practice done ensure defenders sufficient understanding attacks team keeps extensive research blog articles describe individual attacks detail bugs found project zero team reported manufacturer made publicly visible patch released 90 days passed without patch released 90-day-deadline google way implementing responsible disclosure giving software companies 90 days fix problem informing public users take necessary steps avoid attacks cases team discloses flaws even updates fixes could released leaving users compromised system vulnerable one first project zero reports attracted attention involved flaw allowed hackers take control software running safari browser efforts team specifically beer cited apple brief note thanks 30 september 2014 google detected security flaw within windows 8.1 system call ntapphelpcachecontrol allows normal user gain administrative access microsoft notified problem immediately fix problem within 90 days meant information bug made publicly available 29 december 2014 releasing bug public elicited response microsoft working problem 9th march 2015 google project zero blog posted guest post disclosed previously known hardware flaw commonly deployed dram called row hammer could exploited escalate privileges local users post spawned large quantity follow-up research academic hardware community 19 february 2017 google discovered flaw within cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data data cached search engines member project zero team referred flaw cloudbleed 27 march 2017 tavis ormandy project zero discovered vulnerability popular password manager lastpass 31 march 2017 lastpass announced fixed problem project zero involved discovering meltdown spectre vulnerabilities affecting many modern cpus discovered mid-2017 disclosed early january 2018 issue discovered jann horn independently researchers reported security flaw scheduled published 9 january 2018 moving date growing speculation 18 april 2019 project zero discovered bug apple imessage wherein certain malformed message could cause springboard ... crash respawn repeatedly causing ui displayed phone stop responding input would completely crash iphone ui making inoperable.this bug would persist even hard reset flaw also affected imessage mac different results apple fixed bug within 90 day period project zero released | [
6788,
3089,
2560,
5737,
208,
3864,
6628,
5305,
7050,
7106,
5509,
1123,
3050,
1237,
84,
1332,
5358
] | Test |
4,523 | 4 | American_Society_of_Digital_Forensics_&_eDiscovery:american society digital forensics amp ediscovery american society digital forensics ediscovery asdfed national professional association organized 501c3 profit organization organisations stated aims promote field digital forensics ediscovery asdfed founded georgia not-for-profit corporation currently publishes technical bulletins newsletters online news announcements hold national meetings seminars conferences organisation composed professionals legal technology litigation support professions society regional chapters across united states including atlanta chicago san diego new york city washington d.c.. asdfed ’ first chapter launched atlanta georgia chapter ’ leadership team composed president senior vice president least one vice president secretary treasurer end chapter president term remains chapter board additional year national asdfed organization composed three separate distinctive entities first board directors responsible overall guidance direction organization fiscal oversight second chapter support center provides membership packets support chapter third national leadership assembly nla nla composed current president senior vice president chapter primary charge nla updating revising asdfed common body knowledge first years organisation appointed steering committee members included | [
1715,
3517,
3179,
2195,
5561,
4316,
3700,
7825,
7181,
1380,
6020,
1756,
5150,
7105,
3823,
5254,
6488,
8148
] | Test |
4,524 | 6 | Program_Files:program files program files directory name standard folder microsoft windows operating systems applications part operating system conventionally installed typically application installed 'program files directory subdirectory application-specific resources shared resources example resources used multiple applications one company typically stored nowiki /nowiki common program files nowiki /nowiki directory standard windows installation 'program files directory codice_1 localized equivalent thereof 'common program files localized equivalent thereof subdirectory 'program files windows vista later paths 'program files 'common program files directories localized disk instead localized names ntfs junction points non-localized locations additionally windows shell localizes name program files folder depending system user interface display language 'program files 'common program files moved system startup actual paths 'program files 'common program files loaded windows registry stored codice_2 codice_3 values codice_4 made accessible rest system via volatile environment variables codice_5 codice_6 applications also obtain locations paths querying codice_7 using codice_8 windows management instrumentation querying shell using csidls codice_9 localization-independent methods x86-64 ia-64 versions windows two folders application files program files folder serves default installation target 64-bit programs program files x86 folder default installation target 32-bit programs need wow64 emulation layer 64-bit windows versions also codice_10 environment variable dirids csidls different 32-bit 64-bit environments apis merely return different results depending whether calling process emulated backwards compatible 8.3 limitations old file allocation table filenames names 'program files 'program files x86 'common program files shortened system codice_11 codice_12 n digit sequence number clean install 1 1 2 'program files 'program files x86 present windows installed ntfs volume default 'program files folder modified members 'administrators user groups issue programs created windows 9x operating systems file system security programs could therefore also store data 'program files programs store data 'program files usually run correctly windows nt systems normal user privileges unless security lowered affected subdirectories windows vista addressed issue introducing file registry virtualization | [
5012,
1447,
5371,
3948,
7527,
7529,
7172,
5737,
2567,
4694,
5042,
6110,
1481,
5055,
1867,
2248,
432,
6148,
6857,
786,
2266,
4751,
4759,
1534,
7619,
4047,
5480,
5483,
1556,
5487,
6198,
3028,
6922,
7660,
7666,
515,
8024,
5521,
3747,
1237,
... | Validation |
4,525 | 9 | Tracing_just-in-time_compilation:tracing just-in-time compilation tracing just-in-time compilation technique used virtual machines optimize execution program runtime done recording linear sequence frequently executed operations compiling native machine code executing opposed traditional just-in-time jit compilers work per-method basis just-in-time compilation technique increase execution speed programs compiling parts program machine code runtime one way categorize different jit compilers compilation scope whereas method-based jit compilers translate one method time machine code tracing jits use frequently executed loops unit compilation tracing jits based assumptions programs spend time loops program hot loops subsequent loop iterations often take similar paths virtual machines tracing jit often mixed-mode execution environments meaning either interpreter method compiler addition tracing jit tracing jit compiler goes various phases runtime first profiling information loops collected hot loop identified special tracing mode entered records executed operations loop sequence operations called trace trace optimized compiled machine code trace loop executed compiled trace called instead program counterpart steps explained detail following goal profiling identify hot loops often done counting number iterations every loop count loop exceeds certain threshold loop considered hot tracing mode entered tracing phase execution loop proceeds normally addition every executed operation recorded trace recorded operations often stored form intermediate representation tracing follows function calls leads inlined trace tracing continues loop reaches end jumps back start since trace recorded following one concrete execution path loop later executions trace diverge path identify places happen special guard instructions inserted trace one example place statements guard quick check determine whether original condition still true guard fails execution trace aborted since tracing done execution trace made contain runtime information e.g type information information later used optimization phase increase code efficiency traces easy optimize since represent one execution path means control flow exists needs handling typical optimizations include constant-subexpression elimination dead-code elimination register allocation invariant-code motion constant folding escape analysis optimization trace turned machine code similarly optimization easy due linear nature traces trace compiled machine code executed subsequent iterations loop trace execution continues guard fails whereas idea jits reaches back 1960s tracing jits become used often recently first mention idea similar today idea tracing jits 1970 observed compiled code could derived interpreter run-time simply storing actions performed interpretation first implementation tracing dynamo software dynamic optimization system capable transparently improving performance native instruction stream executes processor native instruction stream interpreted hot instruction sequence found sequence optimized version generated cached executed dynamo later extended dynamorio one dynamorio-based project framework interpreter construction combines tracing partial evaluation used dynamically remove interpreter overhead language implementations 2006 hotpathvm first tracing jit compiler high-level language developed vm capable dynamically identifying frequently executed bytecode instructions traced compiled machine code using static single assignment ssa construction motivation hotpathvm efficient jvm resource constrained mobile devices another example tracing jit tracemonkey one mozilla ’ javascript implementations firefox 2009 tracemonkey compiles frequently executed loop traces dynamic language javascript run-time specialize generated code actual dynamic types occurring path another project utilizes tracing jits pypy enables use tracing jits language implementations written pypy translation toolchain thus improving performance program executed using interpreter possible tracing interpreter instead program executed interpreter tracing jits also explored microsoft spur project common intermediate language cil spur generic tracer cil also used trace javascript implementation consider following python program computes sum squares successive whole numbers sum exceeds 100000 def square x 0 0 true trace program could look something like note function call codice_1 inlined trace statement turned codice_2 | [
4116,
5012,
6982,
1361,
6002,
3623,
5218,
7357,
572,
1854,
6368,
7474,
2420,
5771,
6567,
5606,
6778,
1990,
8150,
5190
] | Test |
4,526 | 1 | Vectorwise:vectorwise actian vector formerly known vectorwise sql relational database management system designed high performance analytical database applications published record breaking results transaction processing performance council tpc-h benchmark database sizes 100 gb 300 gb 1 tb 3 tb non-clustered hardware vectorwise originated x100 research project carried within centrum wiskunde informatica cwi dutch national research institute mathematics computer science 2003 2008 spun start-up company 2008 acquired ingres corporation 2011 released commercial product june 2010 initially 64-bit linux platform later also windows starting 3.5 release april 2014 product name shortened vector june 2014 actian vortex announced clustered mpp version vector working hadoop storage hdfs actian vortex later renamed actian vector hadoop basic architecture design principles x100 engine vectorwise database well described two phd theses vectorwise founders marcin żukowski balancing vectorized query execution bandwidth-optimized storage sandor héman updating compressed column stores supervision another founder professor peter boncz x100 engine integrated ingres sql front-end making database operatable using ingres sql syntax ingres set client dba tools query execution architecture makes use vectorized query execution processing chunks cache-fitting vectors data allows involve principles vector processing single instruction multiple data simd perform operation multiple data simultaneously exploit data level parallelism modern hardware also reduces overheads found traditional row-at-a-time processing found rdbmses database storage compressed column-oriented format scan-optimised buffer manager actian vortex hdfs proprietary format used loading big amounts data supported direct appends stable storage small transactional updates supported patent-pending positional delta trees pdts specialized b-tree-like structures indexed differences top stable storage seamlessly patched scans transparently propagated stable storage background process method storing differences patch-like structures rewriting stable storage bulk made possible work filesystem like hdfs files append-only comparative transaction processing performance council tpc-h performance test monetdb carried original creator centrum wiskunde informatica cwi 2003 showed room improvement performance analytical database result cwi researchers proposed new architecture using pipelined query processing vectorised processing improve performance analytical queries led creation x100 project intention designing new kernel monetdb called monetdb/x100 x100 project team 2007 damon best paper award paper vectorized data processing cell broadband engine well 2008 damon best paper award paper dsm vs. nsm cpu performance tradeoffs block-oriented query processing august 2009 originators x100 project ten year best paper award 35th international conference large data bases vldb 1999 paper database architecture optimized new bottleneck memory access recognised vldb project team made great progress implementing ideas contained paper previous 10 years central premise paper traditional relational database systems designed late 1970s early 1980s time database performance dictated time required read write data hard disk time available cpu relatively slow main memory relatively small little data could loaded memory time time hardware improved cpu speed memory size doubling roughly every two years accordance moore ’ law design traditional relational database systems adapted cwi research team described improvements database code data structures make best use modern hardware 2008 x100 project spun monetdb separate project right renamed vectorwise co-founders included peter a. boncz marcin żukowski june 2010 vectorwise technology officially announced ingres corporation release ingres vectorwise 1.0 march 2011 vectorwise 1.5 released publishing record breaking result tpc-h 100 gb benchmark new features included parallel query execution single query executed multiple cpu cores improved bulk loading enhanced sql support june 2011 vectorwise 1.6 released publishing record breaking results tpc-h 100 gb 300 gb 1 tb non-clustered benchmark december 2011 vectorwise 2.0 released new sql support analytical functions rank percentile enhanced date time timestamp datatypes support disk spilling hash joins aggregation june 2012 vectorwise 2.5 released release storage format reorganized allow storing database multiple location background update propagation mechanism pdts stable storage enhanced allow rewriting changed blocks instead full rewrites new patented predictive buffer manager pbm introduced march 2013 vectorwise 3.0 released new features included efficient storage engine support data types analytical sql functions enhanced ddl features improved monitoring profiling accessibility march 2014 actian vector 3.5 released new rebranded shortened name new features included support partitioned tables improved disk spilling online backup capabilities improved sql support e.g codice_1 dml operations codice_2 codice_3 window aggregation functions march 2015 actian vector 4 released june 2014 hadoop summit 2014 san jose actian announced actian vortex clustered mpp version vector level sql support working hadoop storage directly hdfs actian vortex since released later renamed actian vector hadoop non-clustered actian vector releases also updated match actian vector hadoop 4 released december 2015 april 2019 actian avalanche released cloud option high-performance actian vector following releases available supported actian may 2019 | [
5419,
6462,
3915,
4457,
1237,
5571,
7499,
578,
4747
] | Test |
4,527 | 7 | Oracle_Clusterware:oracle clusterware oracle clusterware cross-platform cluster software required run real application clusters rac option oracle database provides basic clustering services operating-system level enable oracle database software run clustering mode earlier versions oracle release 9i earlier rac required vendor-supplied clusterware like sun cluster veritas cluster server except running linux microsoft windows oracle clusterware software enables nodes communicate allowing form cluster nodes behaves single logical server oracle clusterware run cluster ready services crs consisting two key components oracle cluster registry ocr records maintains cluster node membership information voting disk polls consistent heartbeat information nodes cluster running acts tiebreaker communication failures crs service four components handling variety functions cluster ready services daemon crsd oracle cluster synchronization service daemon ocssd event volume manager daemon evmd oracle process clusterware daemon oprocd failure death crs daemon cause node failure triggers automatic reboots nodes avoid corruption data due possible failure communication nodes also known fencing crs daemon runs root super user unix platforms runs service windows platforms following functions provided oracle cluster ready services daemon crsd oracle cluster synchronization services daemon ocssd provides basic ‘ group services ’ support group services distributed group membership system allows applications coordinate activities achieve common result provides synchronization services nodes access node membership information well enabling basic cluster services including cluster group services cluster locking also run without integration vendor clusterware failure ocssd causes machine reboot avoid split-brain situation also required single instance configuration automatic storage management asm used asm new feature oracle 10g ocssd runs oracle user following functions provided oracle cluster synchronization services daemon ocssd third component ocs event volume management logger daemon evmd evmd spawns permanent child process called evmlogger generates events evmd child process ‘ evmlogger ’ spawns new children processes demand scans callout directory invoke callouts restart automatically failures death evmd process halt instance evmd runs oracle user oprocd provides server fencing solution oracle clusterware process monitor oracle clusterware uses hang check timer watchdog timer depending implementation cluster integrity oprocd locked memory runs real time process sleeps fixed time runs root user failure oprocd process causes node restart oprocd important even monitored process called oclsomon causes cluster node reboot oprocd hung references 1.http //docs.oracle.com/cd/b28359_01/rac.111/b28255/intro.htm babcheee | [
7788,
7213,
3915,
4759,
5571,
7427,
578
] | Test |
4,528 | 4 | Altor_Networks:altor networks altor networks inc. juniper networks company provider security virtual data centers clouds company developed world ’ first firewall purpose-built virtual networks software security appliance runs virtualized environment enforces security policy per-virtual-machine basis data center administrators could pinpoint broad range virtual network security comprises create roles-based security policies security policies could continuously enforced individual virtual machines vm even moved throughout virtualized data center headquartered redwood shores california united states altor founded 2007 security networking experts check point software cisco oracle corporation received funding accel partners dag ventures foundation capital juniper networks december 6 2010 juniper networks announced acquired altor networks computer virtualization use mainframe computers since ibm vm/370 platform release early 1970s vm technology became widely available release vmware workstation 1999 vmware server line 2001 estimated 50 workloads would running inside virtualized environments 2012 whenever virtualization technology includes hypervisor virtual network created within hypervisor layer transparently network virtual machines operating single virtualized environment virtual network provides benefits administrative responsibilities physical network addition new challenges founders altor networks became aware early adoption virtualization technologies data centers accelerating many years several problems virtual network security particular became apparent decided way address challenges provide solution operated entirely within virtualized environment purpose-built appliance provide firewalling security services directly inside virtual network without recourse external hardware firewalls intrusion detection appliances associated vlan rerouting virtual network physical network back altor released virtual network security analyzer vnsa tool monitor analyze virtual network traffic march 2008 followed altor vf 1.0 included vnsa module october 2008 integrated signature-based network intrusion detection incorporated altor vf 3.0 release september 2009 release altor v4.0 leverages virtual machine introspection bring visibility internal virtual machine states compliance assessment automated security enforcement ator networks offers virtual security appliance use within vmware esx ongoing efforts add support xen/citrix microsoft hyperv/viridian platforms 40,000 firewalls help please sans intrusion detection faqs intrusion protection detection within virtual environment | [
6918,
4890,
4295,
651,
5041,
6731,
6043
] | Validation |
4,529 | 2 | Event_monitoring:event monitoring computer science event monitoring process collecting analyzing signaling event occurrences subscribers operating system processes active database rules well human operators event occurrences may stem arbitrary sources software hardware operating systems database management systems application software processors event monitoring may use time series database event monitoring makes use logical bus transport event occurrences sources subscribers event sources signal event occurrences event subscribers event subscribers receive event occurrences event bus distributed set physical nodes standalone computer systems typical examples event buses found graphical systems x window system microsoft windows well development tools sdt event collection process collecting event occurrences filtered event log analysis filtered event log logged event occurrences meaningful use future implies event occurrences removed filtered event log useless future event log analysis process analyzing filtered event log aggregate event occurrences decide whether event occurrence signalled event signalling process signalling event occurrences event bus something monitored denoted monitored object example application operating system database hardware etc monitored objects monitored object must properly conditioned event sensors enable event monitoring object must instrumented event sensors monitored object event sensors sensors signal event occurrences whenever event occurs whenever something monitored probe effect must managed discussed gait object monitored behavior changed particular concurrent system processes run parallel poses particular problem reason whenever sensors introduced system processes may execute different order cause problem example trying localize fault monitoring system change behavior way fault may result failure essence fault masked monitoring system probe effect difference behavior monitored object un-instrumented counterpart according schütz avoid compensate ignore probe effect critical real-time system timeliness i.e. ability system meet time constraints deadlines significant avoidance option example instrument system testing remove instrumentation delivery invalidates results testing based complete system less critical real-time system e.g. media-based systems compensation acceptable example performance testing non-concurrent systems ignorance acceptable since behavior respect order execution left unchanged event log analysis known event composition active databases chronicle recognition artificial intelligence real-time logic evaluation real-time systems essentially event log analysis used pattern matching filtering event occurrences aggregation event occurrences composite event occurrences commonly dynamic programming strategies algorithms employed save results previous analyses future use since example pattern may match event occurrences several consecutive analysis processing contrast general rule processing employed assert new facts facts cf inference engine usually based backtracking techniques event log analysis algorithms commonly greedy example composite said occurred fact never revoked may done backtracking based algorithm several mechanisms proposed event log analysis finite state automata petri nets procedural either based imperative programming language object-oriented programming languages modification boyer–moore string search algorithm simple temporal networks | [
2858,
4759,
5571,
2054
] | Validation |
4,530 | 7 | IBM_Integration_Bus:ibm integration bus ibm app connect enterprise abbreviated ibm ace formerly known ibm integration bus websphere message broker ibm integration broker websphere product family allows business information flow disparate applications across multiple hardware software platforms rules applied data flowing message broker route transform information product enterprise service bus supplying communication channel applications services service-oriented architecture ibm ace provides capabilities build solutions needed support diverse integration requirements set connectors range data sources including packaged applications files mobile devices messaging systems databases benefit using ibm ace tool enables existing applications web services without costly legacy application rewrites ace avoids point-to-point strain development resources connecting application service multiple protocols including soap http jms modern secure authentication mechanisms including ability perform actions behalf masquerading delegate users mq http soap nodes supported ldap x-auth o-auth two-way ssl major focus ibm ace latest release capability product runtime fully hosted cloud hosting runtime cloud provides certain advantages potential cost savings compared hosting runtime premises simplifies maintenance application os-level patches sometimes disruptive business continuity also cloud hosting ibm ace runtime allows easy expansion capacity adding horsepower cpu configuration cloud environment adding additional nodes active-active configuration another advantage maintaining ace runtimes cloud ability configure access ace functionality separate apart internal network using datapower api connect devices allows people services public internet access enterprise service bus without passing internal network secure configuration esb deployed internal premises network ibm ace embeds common language runtime invoke .net logic part integration also includes full support visual studio development environment including integrated debugger code templates ibm integration bus includes comprehensive set patterns samples demonstrate bi-directional connectivity microsoft dynamics crm msmq several improvements made current release among ability configure runtime parameters using property file part deployed artifacts contained bar file previously way configure runtime parameters run mqsi command command line new way configuration referred policy document created new policy editor policy documents stored source code control system different policy exist different environments dev int qa prod ibm ace compatible several virtualization platforms right out-of-the-box docker prime example ace download global docker repository runtime ibm ace run locally ace administrative console built right runtime docker image active local configuration administration commands needed fully activate message flow deploy bar file fact construct message flows microservices package microservices docker deployable object directly message flows bar files contain policy files node configuration automatic little human intervention needed complete application deployment ibm represents following features key differentiators ibm ace product compared industry products provide services enterprise service bus ibm delivers iib software either traditional software install local premises premise ibm cloud private ibm administered cloud environment integration bus cloud environment reduces capital expenditures increases application hardware availability offloads skills managing integration bus environment ibm cloud engineers promotes ability end users focus developing solutions rather installing configuring managing iib software offering intended compatible on-premises product within constraints cloud environment users use development tooling cloud on-premises software assets generated deployed either originally product developed neon new era networks inc. company acquired sybase 2001 product later re-branded ibm product called 'mqseries integrator 'mqsi short versions mqsi ran version 2.0 product added websphere family re-branded 'websphere mq integrator version 2.1 2.1 version numbers became synchronized rest websphere family jumped version 5.0 name changed 'websphere business integration message broker wbimb version development environment redesigned using eclipse support web services integrated product since version 6.0 product known 'websphere message broker websphere message broker version 7.0 announced october 2009 websphere message broker version 8.0 announced october 2011 april 2013 ibm announced websphere message broker product undergoing another rebranding name change ibm integration bus version 9 includes new nodes decision service node enables content based routing based rules engine requires ibm websphere operational decision management product ibm websphere enterprise service bus product discontinued release ibm integration bus ibm offering transitional licenses move ibm integration bus websphere message broker transfer license websphere enterprise service bus enables customers exchange websphere enterprise service bus license entitlements websphere message broker license entitlements following license transfer entitlement use websphere enterprise service bus reduced cease reflects websphere enterprise service bus license entitlements relinquished exchange ibm announced impact 2013 wesb end-of-life five years feature development wesb product occur ibm integration bus consists following components soa developer defines message flows ibm integration toolkit including number message flow nodes represents set actions define processing step way message flow nodes joined together determine processing steps carried order conditions message flow includes input node provides source messages processed processed one ways optionally deliver one output nodes message received bit stream without representational structure format converted parser tree structure used internally message flow message delivered final destination converted back bit stream ibm integration bus supports wide variety data formats including standards-based formats xml dfdl json industry formats hl7 edi swift custom formats comprehensive range operations performed data including routing filtering enrichment multicast publish-subscribe sequencing aggregation flexible integration capabilities able support customer choice solution architecture including service-oriented event-oriented data-driven file-based batch real-time ibm integration bus unifies business process management grid providing workhorse behind something taking directions bpm tooling tells ibm integration bus ibm integration bus includes set performance monitoring tools visually portray current server throughput rates showing various metrics elapsed cpu time ways immediately draw attention performance bottlenecks spikes demand drill granular details rates individual connectors tools enable correlate performance information configuration changes quickly determine performance impact specific configuration changes version 7 earlier primary way general text binary messages modeled parsed container called message set associated 'mrm parser version 8 onwards messages modeled parsed using new open technology called dfdl open grid forum ibm strategic technology modeling parsing general text binary data mrm parser message sets remain fully supported part product order use message sets developer must enable disabled default encourage adoption dfdl technology ibm integration bus supports policy-driven traffic shaping enables greater visibility system administrators operational control workload traffic shaping enables system administrators meet demands quantity new endpoints mobile cloud applications exponentially increases adjusting available system resources meet new demand delay redirect traffic cope load spikes traffic monitoring enables notifications system administrators business stakeholders increases business awareness enables trend discovery ibm integration bus reduces cost complexity systems unifying method company uses implement interfaces disparate systems integration node runtime forms enterprise service bus service-oriented architecture efficiently increasing flexibility connecting unlike systems unified homogeneous architecture key feature ibm integration bus ability abstract business logic away transport protocol specifics ibm integration bus toolkit enables developers graphically design mediations known message flows related artifacts developed resources packaged broker archive bar file deployed integration node runtime environment point integration node able continually process messages according logic described message flow wide variety data formats supported may modeled using standard xml schema dfdl schema modeling developer create transformations various formats using nodes supplied toolkit either graphically using mapping node programmatically using compute node using java esql .net ibm integration bus message flows used service-oriented architecture properly designed middleware analysts integrated event-driven soa schemas sometimes referred soa 2.0 businesses rely processing events might part business process issuing trade order purchasing insurance policy reading data using sensor monitoring information gathered infrastructure performance websphere message broker includes rich complex-event-processing capabilities enable analysis events perform validation enrichment transformation intelligent routing messages based set business rules developer creates message flows cyclical workflow probably agile software development developers create message flow generate bar file deploy message flow contained bar file test message flow repeat necessary achieve reliable functionality based earnings reported ibm 1q13 annualized revenue ibm middleware software unit increased 14 billion 7 billion 2011 license maintenance revenue ibm middleware products reached 7 billion 2011 2012 ibm expected increase market share total market increase ten percent worldwide application infrastructure middleware software market grew 9.9 percent 2011 19.4 billion according gartner gartner reported ibm continues number one growing key areas including enterprise service bus suites message oriented middleware market transaction processing monitor market integration appliances ibm publishes performance reports websphere message broker provide sample throughput figures performance varies depending message sizes message volumes processing complexity complexity message transformations system capacities cpu memory network etc software version patch levels configuration settings factors published tests demonstrate message rates excess 10,000 per second particular configurations version 8 onwards new global cache feature enhances overall performance capability throughput rates cache rides top ibm websphere extremescale bundled ibm integration bus dedicated message flow node available use message flows access cache achieved compute nodes languages like java esql .net developer choose many pre-designed message flow 'nodes used build message flow nodes different purposes nodes map data one format another instance cobol copybook canonical xml nodes evaluate content data route flow differently based certain criteria many types node used developing message flows following node transformation technology options available ibm integration bus distributed systems localized following cultures pattern captures commonly recurring solution problem example request-reply pattern specification pattern describes problem addressed problem important constraints solution patterns typically emerge common usage application particular product technology pattern used generate customized solutions recurring problem efficient way pattern recognition development process called service-oriented modeling version 7 introduced patterns patterns cover range categories including file processing application integration message based integration currently available platforms ibm integration bus | [
4759,
3849,
900,
6986,
5571,
736,
578,
5666,
7921,
2776,
2961,
2517,
3915,
352,
7315,
971,
5711
] | Test |
4,531 | 4 | Rootpipe:rootpipe rootpipe security vulnerability found versions os x allows privilege escalation whereby user administrative rights program executed administrative user obtain superuser root access considered problematic first user account created os x furnished administrator rights default leveraging security vulnerabilities system unpatched web browser rootpipe could used attacker help gain complete control operating system emil kvarnhammar truesec security firm credited discovery says found vulnerability several days binary analysis recommends creating account without administrative privileges used normal everyday work using filevault older exploit issue later published exploit-db suggesting issue dates back june 2010 appears exploit used author presentation trusteer rapport 44con 2011 vulnerability reported apple inc. october 2014 reported present os x versions 10.7.5 10.8.2 10.9.5 10.10.2 os x 10.10.3 officially designated patched apple kvarnhammar crediting patrick wardle blogged vulnerability still present version 1 july 2015 kvarnhammer noted additional restrictions introduced os x 10.10.4 adding comment two days later believed then-current versions os x 10.9 security update 2015-005 10.10 safe exploit november 2017 similar vulnerability revealed allowed logging root password | [
704,
3932,
4025,
7328,
1528,
2991,
7799,
7066,
2912,
376,
1173,
6526,
998,
3528,
3277,
2923,
7818,
208,
2021,
3864,
5922,
6628,
6904,
5305,
1376,
6541,
3633,
6194,
924,
1383,
2854,
7600,
6740,
5675,
2587,
2678,
3038,
5330,
600,
1307,
30... | Test |
4,532 | 3 | Hudson_Soft_HuC6280:hudson soft huc6280 huc6280 8-bit microprocessor japanese company hudson soft improved version wdc 65c02 cpu upgraded cmos version popular nmos-based mos technology 6502 8-bit cpu manufactured hudson seiko epson notable product using huc6280 nec turbografx-16 video game console huc6280 contains 65c02 core several additional instructions internal peripheral functions interrupt controller memory management unit timer 8-bit parallel i/o port programmable sound generator psg processor operates two speeds 1.79 mhz 7.16 mhz huc6280 64 kb logical address space 2 mb physical address space access entire memory space huc6280 uses mmu memory management unit splits memory space segments 8 kb logical address space split follows logical 8 kb segment page associated 8-bit register mpr0-7 contains index 8 kb segment bank physical memory map page two special instructions used access registers tami transfer content accumulator mpr register 0-7 tmai transfer mpr register accumulator programmable sound generator psg provides 6 sound channels conveniently paired according functionality provide waveform playback common allows 32 byte 5 bit unsigned linear sample played back selected frequencies frequency modulation takes one step allowing playback frequency dynamically adjusted according specified pattern white noise used simulate percussion instruments effects explosions means pseudo-random square wave alternatively channel individually switched direct d/a mode programmer send data directly sound mixer allowing complex sound patterns generated speech inevitably requires programming effort cpu time | [
7960,
7519,
3774,
468,
7531,
5296,
7730,
2237,
7668,
7222,
1237,
3918,
5087
] | Test |
4,533 | 4 | Direct_kernel_object_manipulation:direct kernel object manipulation direct kernel object manipulation dkom common rootkit technique microsoft windows hide potentially damaging third-party processes drivers files intermediate connections task manager event scheduler core rootkit employs dkom hides object manager task manager modifying linked list containing list active threads processes type rootkit essentially hide traces object manager wrapping pointer away rootkit possible due fact kernel modules loadable drivers direct access kernel memory privileged access system kernel pings find list processes running system relies eprocess find however windows kernel thread based process based pointers freely modified without unintended effects modifying linked list pointers wrap around rootkit process rootkit becomes invisible windows event viewer system integrity applications rely list allows dkom rootkits free rein targeted system dkom uses process represented object interconnected one another operating system within process pre-allocated set space contains address current next mutex_locked thread vital information listed eprocess memory section object manager contains double linked list known processes running also known eprocess however dkom take advantage structure modifying front link flink point previous node processor want hide pointing back link blink hidden processor previous structure modifying subsection eprocess block list currently active processes points around hidden process essentially hides paper trail given process injector scrutiny scheduler process hidden yet runs indefinitely thread active due round-robin policy main issue type rootkit hidden processes still able run despite various context switches windows scheduler threads segregated perform tasks processes rather thread calls multiple processes given time frame process controlled round-robin nature scheduler threads put idle allow threads active even though process becomes invisible task manager process still runs concurrently system threads active makes detecting hidden processes created rootkit extremely difficult detecting rootkits separated many complex layers include integrity checking behavioral detection checking cpu usage ongoing outgoing network traffic signatures drivers simple anti-virus tools detect common rootkits however case kernel type rootkit types rootkits hide system table event viewer detecting requires looking hooked functions difficult implement also requires iterating every node eprocess however even though presence malicious processes physically present handler calls made background processes point threads network connections points processes drivers point threads dkom rootkit viable hide presence every single reference eprocess means rootkit routinely update linkers point away iterating every entity scheduler threads object headers etc detecting dkom rootkit possible certain memory patterns behaviors may appear scheduler one found actual rootkit eventually found well | [
8103,
6823,
4759
] | Test |
4,534 | 2 | DesktopBSD:desktopbsd desktopbsd unix-derivative desktop-oriented operating system based freebsd goal combine stability freebsd ease-of-use k desktop environment 3 default graphical user interface desktopbsd essentially customized installation freebsd fork freebsd desktopbsd always based freebsd latest stable branch incorporates certain customized pre-installed software kde desktopbsd utilities configuration files common misconception desktopbsd intended rival trueos bsd-based desktop distribution since similar structure goals however desktopbsd project started approximately one year pc-bsd project despite fact first pc-bsd release came desktopbsd neither desktopbsd pc-bsd projects intend rival completely independent projects distinctive features intended outcomes example desktopbsd uses ports packages additional software installation whereas pc-bsd introduced pbis current release 1.7 made available september 7 2009 release announcement stated last final release desktopbsd project lead developer could longer contribute time required maintain may 2010 development desktopbsd restarted new leadership development announcements stopped soon afterwards leading speculation project dropped however 10 march 2013 forum post appeared announcing project process revived roadmap desktopbsd 2.0 announced september 2015 desktopbsd site along posted screenshots gnome3-based desktop 1.7 release includes 7 september 2009 desktopbsd 1.7 made available project site | [
5268,
1523,
1341,
1254,
7514,
191,
6085,
6711,
1356,
1547,
4498,
7355,
481,
3457,
732,
2300,
5571,
6278,
8194,
8096,
1193,
1013,
3636,
4059,
5232,
8001,
6918,
5760,
3559,
6211,
3986,
4806,
5065,
594,
4441,
5865,
6477,
424,
2512,
5250,
1... | Validation |
4,535 | 8 | CL-HTTP:cl-http cl-http web server client proxy written common lisp based web application framework written john c. mallery 10 days starting 1994 symbolics lisp machine year port macintosh common lisp done 1996 cl-http became first web server support http 1.1 protocol runs unix linux bsd variants mac os x solaris symbolics genera microsoft windows cl-http makes extensive use common lisp object system macro capabilities lisp cl-http used several applications elm-art tutoring system written common lisp using cl-http later commercialized netcoach interbook early adaptive electronic textbook also written top cl-http cl-http used early tool create web interfaces applications 1994 cl-http used w3c members ietf http working group develop reference clients servers http 1.1 prominently cl-http used presidency bill clinton web server white house publications web site distributed daily press releases official publications clinton administration cl-http used example non-trivial lisp application | [
1716,
2451,
5983,
6876,
4759,
1445,
6701,
1819,
103,
6888,
2915,
6428,
7347,
6095,
2740,
3368,
6352,
3370,
5571,
5575,
486,
6191,
578,
3543,
4332,
4878,
5494,
3383,
5757,
6116,
6029,
3212,
933,
7750,
6210,
1116,
417,
54,
940,
6471,
1676... | Test |
4,536 | 4 | Data_remanence:data remanence data remanence residual representation digital data remains even attempts made remove erase data residue may result data left intact nominal file deletion operation reformatting storage media remove data previously written media physical properties storage media allow previously written data recovered data remanence may make inadvertent disclosure sensitive information possible storage media released uncontrolled environment e.g thrown trash lost various techniques developed counter data remanence techniques classified clearing purging/sanitizing destruction specific methods include overwriting degaussing encryption media destruction effective application countermeasures complicated several factors including media inaccessible media effectively erased advanced storage systems maintain histories data throughout data life cycle persistence data memory typically considered volatile several standards exist secure removal data elimination data remanence many operating systems file managers software provide facility file immediately deleted user requests action instead file moved holding area making easy user undo mistake similarly many software products automatically create backup copies files edited allow user restore original version recover possible crash autosave feature even explicit deleted file retention facility provided user use operating systems actually remove contents file deleted unless aware explicit erasure commands required like solid-state drive cases operating system issue serial ata trim command scsi unmap command let drive know longer maintain deleted data instead simply remove file entry file system directory requires less work therefore faster contents file—the actual data—remain storage medium data remain operating system reuses space new data systems enough filesystem metadata also left behind enable easy undeletion commonly available utility software even undelete become impossible data overwritten read software reads disk sectors directly computer forensics often employs software likewise reformatting repartitioning reimaging system unlikely write every area disk though cause disk appear empty case reimaging empty except files present image software finally even storage media overwritten physical properties media may permit recovery previous contents cases however recovery possible reading storage device usual way requires using laboratory techniques disassembling device directly accessing/reading components section complications gives explanations causes data remanence three levels commonly recognized eliminating remnant data clearing removal sensitive data storage devices way assurance data may reconstructed using normal system functions software file/data recovery utilities data may still recoverable without special laboratory techniques clearing typically administrative protection accidental disclosure within organization example hard drive re-used within organization contents may cleared prevent accidental disclosure next user purging sanitizing removal sensitive data system storage device intent data reconstructed known technique purging proportional sensitivity data generally done releasing media beyond control discarding old media moving media computer different security requirements storage media made unusable conventional equipment effectiveness destroying media varies medium method depending recording density media and/or destruction technique may leave data recoverable laboratory methods conversely destruction using appropriate techniques secure method preventing retrieval common method used counter data remanence overwrite storage media new data often called wiping shredding file disk analogy common methods destroying print media although mechanism bears similarity method often implemented software alone may able selectively target part media popular low-cost option applications overwriting generally acceptable method clearing long media writable damaged simplest overwrite technique writes data everywhere—often pattern zeros minimum prevent data retrieved simply reading media using standard system functions attempt counter advanced data recovery techniques specific overwrite patterns multiple passes often prescribed may generic patterns intended eradicate trace signatures example seven-pass pattern 0xf6 0x00 0xff random 0x00 0xff random sometimes erroneously attributed us standard dod 5220.22-m. one challenge overwrite areas disk may inaccessible due media degradation errors software overwrite may also problematic high-security environments require stronger controls data commingling provided software use use advanced storage technologies may also make file-based overwrite ineffective see discussion complications specialized machines software capable overwriting software sometimes standalone operating system specifically designed data destruction also machines specifically designed wipe hard drives department defense specifications dod 5220.22-m. peter gutmann investigated data recovery nominally overwritten media mid-1990s suggested magnetic force microscopy may able recover data developed specific patterns specific drive technologies designed counter patterns come known gutmann method daniel feenberg economist private national bureau economic research claims chances overwritten data recovered modern hard drive amount urban legend also points -minute gap rose mary woods created tape richard nixon discussing watergate break-in erased information gap recovered feenberg claims would easy task compared recovery modern high density digital signal november 2007 united states department defense considers overwriting acceptable clearing magnetic media within security area/zone sanitization method degaussing physical destruction acceptable latter hand according 2014 nist special publication 800-88 rev 1 p. 7 storage devices containing magnetic media single overwrite pass fixed pattern binary zeros typically hinders recovery data even state art laboratory techniques applied attempt retrieve data analysis wright et al recovery techniques including magnetic force microscopy also concludes single wipe required modern drives point long time required multiple wipes created situation many organisations ignore issue together – resulting data leaks loss degaussing removal reduction magnetic field disk drive using device called degausser designed media erased applied magnetic media degaussing may purge entire media element quickly effectively degaussing often renders hard disks inoperable erases low-level formatting done factory manufacturing cases possible return drive functional state serviced manufacturer however modern degaussers use strong magnetic pulse motor spins platters may destroyed degaussing process servicing may cost-effective degaussed computer tape dlt generally reformatted reused standard consumer hardware high-security environments one may required use degausser approved task example us government military jurisdictions one may required use degausser nsa evaluated products list encrypting data stored media may mitigate concerns data remanence decryption key strong carefully controlled may effectively make data media unrecoverable even key stored media may prove easier quicker overwrite key vs entire disk process called crypto-shredding encryption may done file-by-file basis whole disk cold boot attacks one possible methods subverting full-disk encryption method possibility storing plain text key unencrypted section medium see section complications data ram discussion side-channel attacks keyloggers acquisition written note containing decryption key rubber-hose cryptanalysis may offer greater chance success rely weaknesses cryptographic method employed relevance article minor thorough destruction underlying storage media certain way counter data remanence however process generally time-consuming cumbersome may require extremely thorough methods even small fragment media may contain large amounts data specific destruction techniques include storage media may areas become inaccessible normal means example magnetic disks may develop new bad sectors data written tapes require inter-record gaps modern hard disks often feature reallocation marginal sectors tracks automated way operating system would need work problem especially significant solid state drives ssds rely relatively large relocated bad block tables attempts counter data remanence overwriting may successful situations data remnants may persist nominally inaccessible areas data storage systems sophisticated features may make overwrite ineffective especially per-file basis example journaling file systems increase integrity data recording write operations multiple locations applying transaction-like semantics systems data remnants may exist locations outside nominal file storage location file systems also implement copy-on-write built-in revision control intent writing file never overwrites data in-place furthermore technologies raid anti-fragmentation techniques may result file data written multiple locations either design fault tolerance data remnants wear leveling also defeat data erasure relocating blocks time originally written time overwritten reason security protocols tailored operating systems software featuring automatic wear leveling recommend conducting free-space wipe given drive copying many small easily identifiable junk files files containing nonsensitive data fill much drive possible leaving amount free space necessary satisfactory operation system hardware software storage and/or system demands grow junk data files deleted necessary free space even deletion junk data files secure initial nonsensitivity reduces near zero consequences recovery data remanent optical media magnetic erased conventional degaussing write-once optical media cd-r dvd-r etc also purged overwriting rewritable optical media cd-rw dvd-rw may receptive overwriting methods successfully sanitizing optical discs include delaminating abrading metallic data layer shredding incinerating destructive electrical arcing exposure microwave energy submersion polycarbonate solvent e.g. acetone research center magnetic recording research university california san diego uncovered problems inherent erasing data stored solid-state drives ssds researchers discovered three problems file storage ssds solid-state drives flash-based differ hard-disk drives two ways first way data stored second way algorithms used manage access data differences exploited recover previously erased data ssds maintain layer indirection logical addresses used computer systems access data internal addresses identify physical storage layer indirection hides idiosyncratic media interfaces enhances ssd performance reliability lifespan see wear leveling also produce copies data invisible user sophisticated attacker could recover sanitizing entire disks sanitize commands built ssd hardware found effective implemented correctly software-only techniques sanitizing entire disks found work time testing none software techniques effective sanitizing individual files included well-known algorithms gutmann method us dod 5220.22-m rcmp tssit ops-ii schneier 7 pass mac os x secure erase trash trim feature many ssd devices properly implemented eventually erase data deleted process take time typically several minutes many older operating systems support feature combinations drives operating systems work data remanence observed static random-access memory sram typically considered volatile i.e contents degrade loss external power one study data retention observed even room temperature data remanence also observed dynamic random-access memory dram modern dram chips built-in self-refresh module require power supply retain data must also periodically refreshed prevent data contents fading away capacitors integrated circuits study found data remanence dram data retention seconds minutes room temperature full week without refresh cooled liquid nitrogen study authors able use cold boot attack recover cryptographic keys several popular full disk encryption systems including microsoft bitlocker apple filevault dm-crypt linux truecrypt despite memory degradation authors described study able take advantage redundancy way keys stored expanded efficient use key scheduling authors recommend computers powered rather left sleep state physical control owner cases certain modes software program bitlocker authors recommend boot password key removable usb device used tresor kernel patch linux specifically intended prevent cold boot attacks ram ensuring encryption keys neither user accessible stored ram | [
1710,
2717,
3599,
2813,
3685,
3951,
3100,
4406,
6272,
6353,
2566,
5571,
8191,
4957,
1480,
1020,
5150,
3037,
7110,
1972,
6052,
6488,
2349,
2350,
2529,
5440,
6500,
6327
] | Test |
4,537 | 3 | Apple-designed_processors:apple-designed processors apple inc. developed range system chip soc well system package sip processors powering mobile consumer devices tasks meet stringent power space constraints common mobile devices chips combine central processing unit cpu components single compact physical package johny srouji executive charge apple silicon design prior introduction apple series socs apple used several socs early revisions iphone ipod touch specified apple manufactured samsung integrate single arm-based processing core cpu graphics processing unit gpu electronics necessary provide mobile computing functions within single physical package apl0098 also 8900b s5l8900 package package pop system chip soc introduced june 29 2007 launch original iphone includes 412 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 90 nm process first generation ipod touch also used apl0278 also s5l8720 package package pop system chip soc introduced september 9 2008 launch second generation ipod touch includes 533 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 65 nm process apl0298 also s5l8920 package package pop system chip soc introduced june 8 2009 launch iphone 3gs includes 600 mhz single-core cortex-a8 cpu powervr sgx535 gpu manufactured samsung 65 nm process apl2298 also s5l8922 45 nm die shrunk version iphone 3gs soc introduced september 9 2009 launch third generation ipod touch family systems chip soc used multiple devices including apple portable devices certain models iphone ipad ipod touch apple tv digital media player integrate one arm-based processing cores cpu graphics processing unit gpu cache memory electronics necessary provide mobile computing functions within single physical package designed apple manufactured samsung tsmc apple a4 package package pop system chip soc designed apple inc. manufactured samsung combines arm cortex-a8 cpu powervr gpu emphasizes power efficiency chip commercially debuted release apple ipad tablet followed shortly iphone 4 smartphone 4th generation ipod touch 2nd generation apple tv superseded ipad 2 released following year apple a5 processor apple a4 based arm processor architecture first version released ran 1 ghz ipad contains arm cortex-a8 cpu core paired powervr sgx 535 graphics processor gpu built samsung 45-nanometer nm silicon chip fabrication process clock speed units used iphone 4 ipod touch 4th generation 800 mhz clock speed unit used apple tv revealed cortex-a8 core used a4 thought use performance enhancements developed chip designer intrinsity subsequently acquired apple collaboration samsung resulting core dubbed hummingbird able run far higher clock rates implementations remaining fully compatible cortex-a8 design provided arm performance improvements include additional l2 cache cortex-a8 cpu core used a4 also used samsung s5pc110a01 soc sgx535 a4 could theoretically push 35 million polygons per second 500 million pixels per second although real world performance may considerably less a4 processor package contain ram supports pop installation hence package two low-power 128 mb ddr sdram chips totaling 256 mb mounted top a4 used first-generation ipad fourth-generation ipod touch second-generation apple tv iphone 4 two 256 mb packages total 512 mb ram connected processor using arm 64-bit-wide amba 3 axi bus support ipad demand high graphics bandwidth width ram data bus double used previous arm11 arm9 based apple devices apple a5 system chip soc designed apple inc. manufactured samsung replaced a4 chip commercially debuted release apple ipad 2 tablet march 2011 followed release iphone 4s smartphone later year apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance a5 contains dual-core arm cortex-a9 cpu arm advanced simd extension marketed neon dual core powervr sgx543mp2 gpu gpu push 70 80 million polygons/second pixel fill rate 2 billion pixels/second apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life clock speed unit used iphone 4s 800 mhz like a4 a5 process size 45 nm updated 32 nm version a5 processor used third generation apple tv ipod touch 5th generation ipad mini new version ipad 2 version ipad2,4 chip apple tv one core locked markings square package indicates named apl2498 software chip called s5l8942 32 nm variant a5 provides around 15 better battery life web browsing 30 better playing 3d games approximately 20 better battery life video playback march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single-core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 6.1×6.2 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 apple a5x system-on-a-chip soc designed apple inc. announced march 7 2012 launch third generation ipad high performance variant apple a5 apple claims twice graphics performance a5 superseded fourth generation ipad apple a6x processor soc quad-core graphics unit powervr sgx543mp4 instead previous dual-core well quad-channel memory controller provides memory bandwidth 12.8 gb/s roughly three times a5 added graphics cores extra memory channels add large die size 165 mm² example twice size nvidia tegra 3 mainly due large powervr sgx543mp4 gpu clock frequency dual arm cortex-a9 cores shown operate 1 ghz frequency a5 ram a5x separate main cpu package apple a6 package package pop system chip soc designed apple introduced september 12 2012 launch iphone 5 year later inherited minor successor iphone 5c apple states twice fast twice graphics power compared predecessor apple a5 22 smaller draws less power 45 nm a5 a6 said use 1.3 ghz custom apple-designed armv7 based dual-core cpu called swift rather licensed cpu arm like previous designs integrated 266 mhz triple-core powervr sgx 543mp3 graphics processing unit gpu swift core a6 uses new tweaked instruction set armv7s featuring elements arm cortex-a15 support advanced simd v2 vfpv4 a6 manufactured samsung high-κ metal gate hkmg 32 nm process apple a6x system-on-a-chip soc designed apple inc. introduced launch fourth generation ipad october 23 2012 high performance variant apple a6 apple claims a6x twice cpu performance twice graphics performance predecessor apple a5x like a6 soc continues use dual-core swift cpu new quad core gpu quad channel memory slightly higher 1.4 ghz cpu clock rate uses integrated quad-core powervr sgx 554mp4 graphics processing unit gpu running 300 mhz quad-channel memory subsystem compared a6 a6x 30 larger continues manufactured samsung high-κ metal gate hkmg 32 nm process apple a7 package package pop 64-bit system-on-a-chip soc designed apple first appearance iphone 5s introduced september 10 2013 chip would also used ipad air ipad mini 2 ipad mini 3 apple states twice fast twice graphics power compared predecessor apple a6 a7 features apple-designed 1.3–1.4 ghz 64-bit armv8-a dual-core cpu called cyclone integrated powervr g6430 gpu four cluster configuration armv8-a architecture doubles number registers a7 compared a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size apple a8 package package pop 64-bit system-on-a-chip soc designed apple manufactured tsmc first appearance iphone 6 iphone 6 plus introduced september 9 2014 year later would drive ipad mini 4 apple states 25 cpu performance 50 graphics performance drawing 50 power compared predecessor apple a7 february 9 2018 apple released homepod powered apple a8 1 gb ram a8 features apple-designed 1.4 ghz 64-bit armv8-a dual-core cpu integrated powervr gx6450 gpu four cluster configuration a8 manufactured 20 nm process tsmc replaced samsung manufacturer apple mobile device processors contains 2 billion transistors despite double number transistors compared a7 physical size reduced 13 89 mm consistent shrink known new microarchitecture apple a8x 64-bit system chip soc designed apple introduced launch ipad air 2 october 16 2014 high performance variant apple a8 apple states 40 cpu performance 2.5 times graphics performance predecessor apple a7 unlike a8 soc uses triple-core cpu new octa-core gpu dual channel memory slightly higher 1.5 ghz cpu clock rate uses integrated octa-core powervr gxa6850 graphics processing unit gpu running 450 mhz dual-channel memory subsystem manufactured tsmc 20 nm fabrication process consists 3 billion transistors apple a9 64-bit arm based system chip soc designed apple inc first appeared iphone 6s 6s plus introduced september 9 2015 apple states 70 cpu performance 90 graphics performance compared predecessor apple a8 dual sourced first apple soc manufactured samsung 14 nm finfet lpe process tsmc 16 nm finfet process subsequently included iphone se ipad 2017 apple a9x 64-bit system chip soc designed apple inc announced september 9 2015 released november 11 2015 first appeared ipad pro offers 80 cpu performance two times gpu performance predecessor apple a8x manufactured tsmc using 16 nm finfet process apple a10 fusion 64-bit arm based system chip soc designed apple inc first appeared iphone 7 7 plus introduced september 7 2016 a10 also featured ipad 2018 ipod touch 7th generation new quad core design two high performance cores two smaller highly efficient cores 40 faster a9 50 faster graphics made tsmc 16 nm finfet process apple a10x fusion 64-bit arm based system chip soc designed apple inc first appeared 10.5 ipad pro second generation 12.9 ipad pro announced june 5 2017 variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x september 12 2017 apple announced apple tv 4k would powered a10x chip made tsmc 10 nm finfet process apple a11 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 two high-performance cores 25 faster a10 fusion four high-efficiency cores 70 faster energy-efficient cores a10 apple a12 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone xs xs max xr introduced september 12 2018 also within 2019 models ipad air ipad mini two high-performance cores 15 faster a11 bionic four high-efficiency cores 50 lower power usage energy-efficient cores a11 bionic a12 manufactured tsmc using 7 nm finfet process first ship smartphone apple a12x bionic 64-bit arm-based system chip soc designed apple inc first appeared 11.0 ipad pro third generation 12.9 ipad pro announced october 30 2018 offers 35 faster single-core 90 faster multi-core cpu performance predecessor a10x four high-performance cores four high-efficiency cores a12x manufactured tsmc using 7 nm finfet process first ship tablet apple series family systems package sip used apple watch uses customized application processor together memory storage support processors wireless connectivity sensors i/o comprise complete computer single package designed apple manufactured contract manufacturers samsung apple s1 integrated computer designed apple includes memory storage support circuits like wireless modems i/o controllers sealed integrated package announced september 9 2014 part wish could say event first appearance original apple watch used apple watch series 1 dual-core processor almost identical s2 exception built-in gps receiver used apple watch series 2 dual-core processor built-in gps receiver used apple watch series 3 dual-core processor 70 faster apple s2 built-in gps receiver also option cellular modem internal esim module also includes w2 chip used apple watch series 4 apple designed custom 64-bit dual-core processor 2x faster performance also contains w3 wireless chip supports bluetooth 5 apple t1 chip armv7 soc apple driving system management controller smc touch id sensor 2016 2017 macbook pro touch bar addition traditional tasks smc chip operates secure enclave processing encryption fingerprints well acting gatekeeper microphone facetime hd camera protecting possible targets potential hacking attempts t1 runs bridgeos variant watchos separate intel cpu running macos apple t2 chip soc apple first released imac pro 2017 64-bit armv8 chip variant a10 t8010 runs separate operating system called bridgeos 2.0 watchos derivative provides secure enclave encrypted keys gives users ability lock computer boot process handles system functions like camera audio control handles on-the-fly encryption decryption solid-state drive t2 also delivers enhanced imaging processing imac pro facetime hd camera july 12 2018 apple released updated macbook pro includes t2 chip among things enables hey siri feature november 7 2018 apple released updated mac mini macbook air t2 chip apple w series family system chip soc wireless chips focus bluetooth wi-fi connectivity apple w1 soc apple used 2016 airpods select beats headphones maintains bluetooth class 1 connection computer device decodes audio stream sent apple w2 wireless chip apple used apple watch series 3 integrated apple s3 sip apple released implementation chip makes wi-fi 85 faster bluetooth wi-fi 50 power efficient previous model chip design apple w3 wireless chip apple used apple watch series 4 integrated apple s4 sip supports bluetooth 5.0 apple h1 chip first used 2019 version airpods specifically designed headphones bluetooth 5.0 offers 30 lower latency compared w1 chip prior version airpods | [
6788,
6793,
3940,
6082,
6421,
7890,
1083,
5732,
722,
1094,
4320,
2926,
4690,
5037,
5740,
1473,
734,
5750,
740,
5752,
7554,
405,
5405,
2532,
5406,
1864,
1117,
6125,
2954,
1123,
7572,
6482,
6847,
67,
4003,
6142,
2609,
1895,
4373,
1897,
72... | Test |
4,538 | 4 | AOL_Active_Virus_Shield:aol active virus shield aol active virus shield commonly referred avs free antivirus utility made available aol engine based one used kaspersky anti-virus program longer available active virus shield includes numerous features found kaspersky anti-virus software main feature malware scanning uses kaspersky underlying engine detects variety malware viruses spyware even joke programs also offers real-time file e-mail scanning protection latest version active virus shield version 6.0.2.621 supports windows vista active virus shield light compared commercial anti-virus products also consume much memory startup program also benefits kaspersky regular definition updates typically around every two hours enable new viruses effectively detected programs update less regularly addition active virus shield better detection rates free programs avg free avast home edition active virus shield lack features kaspersky 6.0 proactive protection http protection license provided valid one year although email address used initially easily used renew 10 times also support mail scanning using tls ssl users also reported compatibility problems certain applications mcafee personal firewall plus zonealarm logitech products active virus shield longer available download august 1 2007 replaced mcafee virus scan plus special edition aol available free users free aol account even though active virus shield longer available officially latest version program still obtained mirror server hosted help also still offered already using application | [
5452,
4759,
5571,
5401
] | Validation |
4,539 | 2 | Redirection_(computing):redirection computing computing redirection form interprocess communication function common command-line interpreters including various unix shells redirect standard streams user-specified locations unix-like operating systems programs redirection dup2 2 system call less-flexible higher-level stdio analogues freopen 3 popen 3 redirection usually implemented placing certain characters commands typically syntax characters follows using codice_1 redirect input codice_2 redirect output command1 file1 executes command1 placing output file1 opposed displaying terminal usual destination standard output clobber existing data file1 using command1 file1 executes command1 file1 source input opposed keyboard usual source standard input command1 infile outfile combines two capabilities command1 reads infile writes outfile append output end file rather clobbering codice_3 operator used command1 » file1 read stream literal inline file passed standard input one use document using codice_4 operator tr a-z a-z « end_text one two three uno dos tres end_text read string one use string using codice_5 operator tr a-z a-z « one two three numbers= one two three tr a-z a-z « numbers programs run together one program reads output another need explicit intermediate file command1 command2 executes command1 using output input command2 commonly called piping character known pipe two programs performing commands may run parallel storage space working buffers linux allows 64k buffer plus whatever work space command processing requires example sort command unable produce output input records read last record received might turn first sorted order dr. alexia massalin experimental operating system synthesis would adjust priority task ran according fullness input output buffers produces end result using two redirects temporary file command1 tempfile command2 tempfile rm tempfile command2 start executing command1 finished sufficiently large scratch file required hold intermediate results well whatever work space task required example although dos allows pipe syntax employs second approach thus suppose long-running program worker produces various messages works second program timestamp copies record stdin stdout prefixed system date time record received sequence worker timestamp logfile.txt would produce timestamps worker finished merely showing swiftly output file could read written good example command piping combining codice_6 another command achieve something interactive non-interactive shell e.g echo -e 'user\npass ftp localhost runs ftp client input user press return pass casual use initial step pipeline often codice_7 codice_6 reading file string often replaced input indirection string use cat piping rather input redirection known useless use cat example following commands cat infile cmd echo string cmd echo -e 'user\npass ftp localhost replaced cmd infile cmd « string ftp localhost « 'user\npass' codice_6 often shell-internal command use criticized cat external command unix shells derived original bourne shell first two actions modified placing number file descriptor immediately character affect stream used redirection unix standard i/o streams example command1 2 file1 executes command1 directing standard error stream file1 shells derived csh c shell syntax instead appends ampersand character redirect characters thus achieving similar result reason distinguish file named 1 stdout i.e 'cat file 2 1 vs 'cat file 2 1 first case stderr redirected file named 1 second stderr redirected stdout another useful capability redirect one standard file handle another popular variation merge standard error standard output error messages processed together alternately usual output example find -name .profile results 2 1 try find files named .profile executed without redirection output hits stdout errors e.g lack privilege traverse protected directories stderr standard output directed file results error messages appear console see hits error messages file results merge stderr handle 2 stdout handle 1 using 2 1 merged output piped another program file merge sequence 2 1 must precede pipe symbol thus find -name .profile 2 1 less simplified non-posix conforming form command command file 2 1 available bourne shell prior version 4 final release standard shell debian almquist shell used debian/ubuntu command file command file possible use codice_10 codice_2 result commonly misunderstood rule redirection sets handle output stream independently codice_10 sets handle codice_13 whatever handle codice_14 points point usually stdout codice_2 redirects handle codice_14 something else e.g file change handle codice_13 still points stdout following example standard output written file errors redirected stderr stdout i.e sent screen command 2 1 file write errors standard output file order reversed standard output would first redirected file stderr would additionally redirected stdout handle already changed point file command file 2 1 redirection piping tokens chained together create complex commands example sort infile uniq -c sort -n outfile sorts lines infile lexicographical order writes unique lines prefixed number occurrences sorts resultant output numerically places final output outfile type construction used commonly shell scripts batch files standard command tee redirect output command several destinations ls -lrt tee xyz directs file list output standard output file xyz | [
4112,
3431,
3085,
7246,
4771,
7260,
5833,
5931,
3979,
149,
1975,
7032,
524,
3493,
4453,
5784,
878
] | Test |
4,540 | 2 | Sideways_address_space:sideways address space sideways address space acorn bbc microcomputer electron master-series microcomputer acorn bank switching implementation providing permanent system expansion days hard disk drives even floppy disk drives commonplace filing systems application utility software drivers made available sideways roms extra ram could fitted via sideways address space advanced user guide bbc micro refers sideways address space paged roms predated use address space ram expansion bbc b+ b+ 128 bbc master featured sideways ram standard machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kib ram 0x0000 0x7fff 16 kib sideways address space 0x8000 0xbfff 16 kib operating system space 0xc000 0xffff sideways address space bank-switched referred acorn paged address space allows access one 16 kib bank time bank rom ram bbc micro bbc master rom sockets motherboard four bbc micro take sideways roms bbc micro shipped single rom containing bbc basic roms added computer add software remain available times electron sideways address space exposed addition plus 1 add-on third-party equivalent plus 1 also introduced cartridge slots carried bbc master design alternative way package roms sideways roms permitted addition new filing systems os disc filing system application utility software software supplied roms two main benefits loads instantaneously requires little ram operate may use dedicated paged rom area ram normal software keeps clear allowed application software working space would normally possible utility software debuggers operate software held ram first bytes sideways roms contain details inform os handle include language service entry points rom type code version number pointer copyright information reset os validates sideways bank checking copyright string operation os talks valid roms jumping two entry points specific value accumulator set provides clean api expanding operating system negotiating bank switching ram sharing roms two entry points service entry point provides api access rom language entry point starting point application software contained rom service roms need language entry point exist extend os language roms roms provide application software gain name fact bbc basic language supplied default rom bank 15 roms often contain entry points user software must service entry point allow os call pure service roms typically extend features os without providing application software bbc micro electron require one language rom present post provide computer user interface else os report language halt version acorn mos bbc master built-in command line present default language rom configured addition rom banks ram could added computer via sideways address space could either used load use rom-images disk extra workspace machine code programs bbc model b hardwired deny writing sideways area write signal needs collected somewhere methods vary two common methods removing chips board placing expansion board occupies chips original sockets fitting ram module rom socket flying lead connected write signal elsewhere motherboard 64kb model b+ 12kb special sideways ram used sideways address selected high bit rom select register could used load rom images 128kb model b+ expansion board 64kb regular sideways ram addition 12kb special sideways ram main board bbc master came 64kb regular sideways ram could configured motherboard links banks rom ram addition 4kb special sideways ram 8kb ram paged operating system unlike b+ special sideways ram available user applications memory areas master used operating system filing system workspace electron cartridge ports wired assumption 'd used roms much bbc micro master slots replace ready signal r/w signal ram also plugged external cartridge ports acorn mos supports 16 sideways banks due limited motherboard space extra sideways sockets made available third-party expansion boards certain boards watford electronics sidewise board also provided option permanent battery backed-up ram allows developer testing new sideways rom software without burning eprom attempt write-protect switch could used prevent contents sideways ram modified | [
4339,
708,
2630,
5877,
5571,
7064,
7718,
6662,
3905
] | Validation |
4,541 | 2 | IDispatch:idispatch idispatch interface exposes ole automation protocol extending iunknown one standard interfaces exposed com objects com distinguishes three interface types custom vtable-based iunknown interfaces dispatch idispatch interfaces supporting introspection dual interfaces supporting types automation idispatch interface allows client application find properties methods supported object run-time i.e implements concept rtti also provides information necessary invoke properties methods client applications need aware object members compiled allows com activex objects called scripting programs platforms asp server javascript internet explorer calling conventions known time iis ie built contrast simple object library compiled linked program e.g dll call needs know function name parameters compile time script writer ask com object method property already knows documentation client execute function invoke provided idispatch interface form late-binding sort capability also supported dynamic data exchange dde never became popular due low-level dispatch interfaces flexible suffer additional introspection invocation overhead compared custom interfaces therefore often good idea support interface types dual interfaces way clients supporting vtable-based invocation use custom interface instead dispatch counterpart property method implemented object supports idispatch interface called dispatch id often abbreviated dispid dispid primary means identifying property method must supplied invoke function property method invoked along array variants containing parameters getidsofnames function used get appropriate dispid property method name string format idispatch derives iunknown extends four additional methods idispatch interface id defined guid value 00020400-0000-0000-c000-000000000046 | [
7936,
1499,
2451,
6840,
3135,
5910
] | Test |
4,542 | 4 | Cyrix_coma_bug:cyrix coma bug cyrix coma bug design flaw cyrix 6x86 6x86l early 6x86mx processors allows non-privileged program hang computer according andrew balsa around time discovery f00f bug intel pentium serguei shtyliov moscow found flaw cyrix processor developing ide disk driver assembly language alexandr konosevich omsk researched bug coauthored article uwe post german technology magazine c't calling hidden cli bug cli instruction disables interrupts x86 architecture balsa member linux-kernel mailing list confirmed following c program uses inline x86-specific assembly language could compiled run unprivileged user execution program renders processor completely useless rebooted enters infinite loop interrupted allows user access cyrix system bug perform denial-of-service attack similar execution halt catch fire instruction although coma bug one particular instruction causes bug interrupt mask interrupts explicitly disabled instead anomaly cyrix instruction pipeline prevents interrupts serviced duration loop since loop never ends interrupts never serviced xchg instruction atomic meaning instructions allowed change state system executed order ensure atomicity designers cyrix made xchg uninterruptible due pipelining branch predicting however another xchg enters pipeline previous one completes causing deadlock fix unintentional instances bug insert another instruction loop nop instruction good candidate cyrix suggested serializing xchg opcode thus bypassing pipeline however techniques serve prevent deliberate attacks one way prevent bug enable bit 0x10 configuration register ccr1 disables implicit bus locking normally done xchg instruction since cpus affected bug designed work multi-processor systems loss xchg atomicity harmless | [
7533,
5737,
1691,
1237,
1435,
352,
4009,
578,
1335,
336
] | Test |
4,543 | 9 | Lisp_(programming_language):lisp programming language lisp historically lisp family computer programming languages long history distinctive fully parenthesized prefix notation originally specified 1958 lisp second-oldest high-level programming language widespread use today fortran older one year lisp changed since early days many dialects existed history today best-known general-purpose lisp dialects clojure common lisp scheme lisp originally created practical mathematical notation computer programs influenced notation alonzo church lambda calculus quickly became favored programming language artificial intelligence ai research one earliest programming languages lisp pioneered many ideas computer science including tree data structures automatic storage management dynamic typing conditionals higher-order functions recursion self-hosting compiler read–eval–print loop name lisp derives list processor linked lists one lisp major data structures lisp source code made lists thus lisp programs manipulate source code data structure giving rise macro systems allow programmers create new syntax new domain-specific languages embedded lisp interchangeability code data gives lisp instantly recognizable syntax program code written s-expressions parenthesized lists function call syntactic form written list function operator name first arguments following instance function takes three arguments would called john mccarthy developed lisp 1958 massachusetts institute technology mit mccarthy published design paper communications acm 1960 entitled recursive functions symbolic expressions computation machine part showed simple operators notation functions one build turing-complete language algorithms information processing language first ai language 1955 1956 already included many concepts list-processing recursion came used lisp mccarthy original notation used bracketed m-expressions would translated s-expressions example m-expression equivalent s-expression lisp implemented programmers rapidly chose use s-expressions m-expressions abandoned m-expressions surfaced short-lived attempts mlisp horace enea cgol vaughan pratt lisp first implemented steve russell ibm 704 computer russell read mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions two assembly language macros ibm 704 became primitive operations decomposing lists contents address part register number contents decrement part register number register used refer registers computer central processing unit cpu lisp dialects still use operations return first item list rest list respectively first complete lisp compiler written lisp implemented 1962 tim hart mike levin mit compiler introduced lisp model incremental compilation compiled interpreted functions intermix freely language used hart levin memo much closer modern lisp style mccarthy earlier code lisp difficult system implement compiler techniques stock hardware 1970s garbage collection routines developed mit graduate student daniel edwards made practical run lisp general-purpose computing systems efficiency still problem led creation lisp machines dedicated hardware running lisp environments programs 1980s 1990s great effort made unify work new lisp dialects mostly successors maclisp zetalisp nil new implementation lisp single language new language common lisp somewhat compatible dialects replaced book common lisp language notes compatibility various constructs 1994 ansi published common lisp standard ansi x3.226-1994 information technology programming language common lisp since inception lisp closely connected artificial intelligence research community especially pdp-10 systems lisp used implementation programming language micro planner used famous ai system shrdlu 1970s ai research spawned commercial offshoots performance existing lisp systems became growing issue sixty-year history lisp spawned many variations core theme s-expression language moreover given dialect may several implementations—for instance dozen implementations common lisp differences dialects may quite visible—for instance common lisp uses keyword codice_1 name function scheme uses codice_2 within dialect standardized however conforming implementations support core language different extensions libraries declined somewhat 1990s lisp experienced resurgence interest 2000 new activity focused around implementations common lisp scheme emacs lisp clojure racket includes development new portable libraries applications many new lisp programmers inspired writers paul graham eric s. raymond pursue language others considered antiquated new lisp programmers often describe language eye-opening experience claim substantially productive languages increase awareness may contrasted ai winter lisp brief gain mid-1990s dan weinreb lists survey common lisp implementations eleven actively maintained common lisp implementations scieneer common lisp new commercial implementation forked cmucl first release 2002 open source community created new supporting infrastructure cliki wiki collects common lisp related information common lisp directory lists resources lisp popular irc channel allows sharing commenting code snippets support lisppaste irc bot written lisp planet lisp collects contents various lisp-related blogs lispforum users discuss lisp topics lispjobs service announcing job offers weekly news service weekly lisp news common-lisp.net hosting site open source common lisp projects quicklisp library manager common lisp fifty years lisp 1958–2008 celebrated lisp50 oopsla regular local user meetings boston vancouver hamburg events include european common lisp meeting european lisp symposium international lisp conference scheme community actively maintains twenty implementations several significant new implementations chicken gambit gauche ikarus larceny ypsilon developed 2000s decade revised report algorithmic language scheme standard scheme widely accepted scheme community scheme requests implementation process created lot quasi standard libraries extensions scheme user communities individual scheme implementations continue grow new language standardization process started 2003 led rrs scheme standard 2007 academic use scheme teaching computer science seems declined somewhat universities longer using scheme computer science introductory courses mit uses python instead scheme undergraduate computer science program mitx massive open online course several new dialects lisp arc hy nu liskell lfe lisp flavored erlang parser julia implemented femtolisp dialect scheme julia inspired scheme often considered lisp common lisp scheme represent two major streams lisp development languages embody significantly different design choices common lisp successor maclisp primary influences lisp machine lisp maclisp nil s-1 lisp spice lisp scheme many features lisp machine lisp large lisp dialect used program lisp machines designed efficiently implementable personal computer workstation common lisp general-purpose programming language thus large language standard including many built-in data types functions macros language elements object system common lisp object system common lisp also borrowed certain features scheme lexical scoping lexical closures common lisp implementations available targeting different platforms llvm java virtual machine x86-64 powerpc alpha arm motorola 68000 mips operating systems windows macos linux solaris freebsd netbsd openbsd dragonfly bsd heroku scheme statically scoped properly tail-recursive dialect lisp programming language invented guy l. steele jr. gerald jay sussman designed exceptionally clear simple semantics different ways form expressions designed decade earlier common lisp scheme minimalist design much smaller set standard features certain implementation features tail-call optimization full continuations specified common lisp wide variety programming paradigms including imperative functional message passing styles find convenient expression scheme scheme continues evolve series standards revised report algorithmic language scheme series scheme requests implementation clojure recent dialect lisp targets mainly java virtual machine common language runtime clr python vm ruby vm yarv compiling javascript designed pragmatic general-purpose language clojure draws considerable influences haskell places strong emphasis immutability clojure provides access java frameworks libraries optional type hints type inference calls java avoid reflection enable fast primitive operations lisp dialects used scripting languages many applications best-known emacs lisp emacs editor autolisp later visual lisp autocad nyquist audacity scheme lilypond potential small size useful scheme interpreter makes particularly popular embedded scripting examples include siod tinyscheme successfully embedded gimp image processor generic name script-fu librep lisp interpreter john harper originally based emacs lisp language embedded sawfish window manager lisp first language structure program code represented faithfully directly standard data structure—a quality much later dubbed homoiconicity thus lisp functions manipulated altered even created within lisp program without lower-level manipulations generally considered one main advantages language regard expressive power makes language suitable syntactic macros metacircular evaluation conditional using if–then–else syntax invented mccarthy fortran context proposed inclusion algol made part algol 58 specification lisp mccarthy used general cond -structure algol 60 took if–then–else popularized lisp deeply influenced alan kay leader research team developed smalltalk xerox parc turn lisp influenced smalltalk later dialects adopting object-oriented programming features inheritance classes encapsulating instances message passing etc 1970s flavors object system introduced concept multiple inheritance mixin common lisp object system provides multiple inheritance multimethods multiple dispatch first-class generic functions yielding flexible powerful form dynamic dispatch served template many subsequent lisp including scheme object systems often implemented via metaobject protocol reflective metacircular design object system defined terms lisp second language smalltalk still one languages possess metaobject system many years later alan kay suggested result confluence features smalltalk lisp could regarded properly conceived object-oriented programming systems lisp introduced concept automatic garbage collection system walks heap looking unused memory progress modern sophisticated garbage collection algorithms generational garbage collection stimulated use lisp edsger w. dijkstra 1972 turing award lecture said largely resource requirements respect early computing hardware including early microprocessors lisp become popular outside ai community fortran algol-descended c language suitability complex dynamic applications lisp enjoying resurgence popular interest 2010s lisp expression oriented language unlike languages distinction made expressions statements code data written expressions expression evaluated produces value common lisp possibly multiple values embedded expressions value data type mccarthy 1958 paper introduced two types syntax symbolic expressions s-expressions sexps mirror internal representation code data meta expressions m-expressions express functions s-expressions m-expressions never found favor almost lisps today use s-expressions manipulate code data use parentheses lisp immediately obvious difference programming language families result students long given lisp nicknames lost stupid parentheses lots irritating superfluous parentheses however s-expression syntax also responsible much lisp power syntax extremely regular facilitates manipulation computer however syntax lisp limited traditional parentheses notation extended include alternative notations example xmlisp common lisp extension employs metaobject protocol integrate s-expressions extensible markup language xml reliance expressions gives language great flexibility lisp functions written lists processed exactly like data allows easy writing programs manipulate programs metaprogramming many lisp dialects exploit feature using macro systems enables extension language almost without limit lisp list written elements separated whitespace surrounded parentheses example list whose elements three atoms values implicitly typed respectively two integers lisp-specific data type called symbol declared empty list also represented special atom entity lisp atom list expressions written lists using prefix notation first element list name function name macro lambda expression name special operator see remainder list arguments example function returns arguments list expression evaluates list quote preceding example special operator returns argument without evaluating unquoted expressions recursively evaluated enclosing expression evaluated example evaluates list note third argument list lists nested arithmetic operators treated similarly expression evaluates 10 equivalent infix notation would lisp notion operators implemented algol-derived languages arithmetic operators lisp variadic functions n-ary able take number arguments c-style '++ increment operator sometimes implemented name incf giving syntax equivalent setq x x 1 returning new value x special operators sometimes called special forms provide lisp control structure example special operator takes three arguments first argument non-nil evaluates second argument otherwise evaluates third argument thus expression evaluates course would useful non-trivial expression substituted place lisp also provides logical operators operators short circuit evaluation return first nil non-nil argument respectively evaluate james another special operator used bind variables values evaluated within expression operator also used create functions arguments list arguments expression expressions function evaluates returned value value last expression evaluated expression evaluates function applied takes one argument binds returns number one greater argument lambda expressions treated differently named functions invoked way therefore expression evaluates 're function application execute anonymous function passing value 5 named functions created storing lambda expression symbol using defun macro original lisp two fundamental data types atoms lists list finite ordered sequence elements element either atom list atom number symbol symbol essentially unique named item written alphanumeric string source code used either variable name data item symbolic processing example list contains three elements symbol list number 2 essential difference atoms lists atoms immutable unique two atoms appeared different places source code written exactly way represented object whereas list separate object could altered independently lists could distinguished lists comparison operators data types introduced later lisp dialects programming styles evolved concept atom lost importance many dialects still retained predicate atom legacy compatibility defining true object cons lisp list implemented singly linked list cell list called cons scheme pair composed two pointers called car cdr respectively equivalent fields discussed article linked list many data structures built cons cells one basic called proper list proper list either special empty list symbol cons points datum may another cons structure list points another proper list given cons taken head linked list car points first element list cdr points rest list reason functions also called referring conses part linked list rather say tree thus lisp list atomic object instance container class c++ java would list nothing aggregate linked conses variable refers given list simply pointer first cons list traversal list done cdring list taking successive cdrs visit cons list using several higher-order functions map function list conses lists universal lisp systems common misconception lisp data structures fact simplistic lisps data structures vectors arrays hash tables structures forth parenthesized s-expressions represent linked list structures several ways represent list s-expression cons written dotted-pair notation car cdr longer proper list might written dotted-pair notation conventionally abbreviated list notation improper list may written combination two – list three conses whose last cdr i.e. list fully specified form lisp provides many built-in procedures accessing controlling lists lists created directly procedure takes number arguments returns list arguments way lists constructed cons pairs procedure used add element front list note procedure asymmetric handles list arguments lists constructed procedure appends two lists one another lisp lists linked lists appending two lists asymptotic time complexity formula_1 lisp lists simple linked lists share structure one another say two lists tail final sequence conses instance execution following common lisp code lists respectively however tail structure lists copy cons cells pointing memory locations lists sharing structure rather copying give dramatic performance improvement however technique interact undesired ways functions alter lists passed arguments altering one list replacing affect changes thereby also changes – possibly unexpected result source bugs functions alter arguments documented destructive reason aficionados functional programming avoid destructive functions scheme dialect favors functional style names destructive functions marked cautionary exclamation point bang —such read set car bang replaces car cons common lisp dialect destructive functions commonplace equivalent named replace car function rarely seen however common lisp includes special facility make easier define use destructive functions frequent style common lisp write code functionally without destructive calls prototyping add destructive calls optimization safe lisp evaluates expressions entered user symbols lists evaluate usually simpler expression – instance symbol evaluates value variable names evaluates however forms evaluate entering lisp returns expression also marked prevent evaluated necessary symbols lists role special operator abbreviation one quotation mark instance usually entering symbol returns value corresponding variable error variable refer literal symbol enter usually common lisp scheme also support backquote operator termed quasiquote scheme entered character grave accent almost plain quote except allows expressions evaluated values interpolated quoted list comma unquote comma-at splice operators variable value evaluates evaluates backquote often used defining macro expansions self-evaluating forms quoted forms lisp equivalent literals may possible modify values mutable literals program code instance function returns quoted form code calls function modifies form may alter behavior function subsequent iterations modifying quoted form like generally considered bad style defined ansi common lisp erroneous resulting undefined behavior compiled files file-compiler coalesce similar constants put write-protected memory etc. lisp formalization quotation noted douglas hofstadter gödel escher bach others example philosophical idea self-reference lisp family splits use dynamic static a.k.a lexical scope clojure common lisp scheme make use static scoping default newlisp picolisp embedded languages emacs autocad use dynamic scoping since version 24.1 emacs uses dynamic lexical scoping fundamental distinction lisp languages lisp textual representation program simply human-readable description internal data structures linked lists symbols number characters etc would used underlying lisp system lisp uses implement powerful macro system like macro languages c macro returns code compiled however unlike c macros macros lisp functions exploit full power lisp lisp code structure lists macros built list-processing functions language short anything lisp data structure lisp macros code contrast languages parser output purely internal language implementation manipulated programmer feature makes easy develop efficient languages within languages example common lisp object system implemented cleanly language extension using macros means application needs different inheritance mechanism use different object system stark contrast languages example java support multiple inheritance reasonable way add simplistic lisp implementations list structure directly interpreted run program function literally piece list structure traversed interpreter executing however substantial lisp systems also include compiler compiler translates list structure machine code bytecode execution code run fast code compiled conventional languages c. macros expand compilation step thus offer interesting options program needs precomputed table macro might create table compile time compiler need output table need call code create table run time lisp implementations even mechanism codice_3 allows code present compile time macro would need present emitted module lisp languages often used interactive command line may combined integrated development environment ide user types expressions command line directs ide transmit lisp system lisp reads entered expressions evaluates prints result reason lisp command line called read–eval–print loop repl basic operation repl follows simplistic description omits many elements real lisp quoting macros function accepts textual s-expressions input parses internal data structure instance type text prompt translates linked list three elements symbol number 1 number 2 happens list also valid piece lisp code evaluated car list names function—the addition operation note read single symbol read number one hundred twenty-three read string 123 function evaluates data returning zero lisp data result evaluation mean interpretation lisp systems compile every expression native machine code simple however describe evaluation interpretation evaluate list whose car names function first evaluates arguments given cdr applies function arguments case function addition applying argument list yields answer result evaluation symbol evaluates value symbol foo data like string 123 evaluates string list evaluates list 1 2 3 job function represent output user simple result trivial expression evaluated piece list structure would require traverse list print s-expression implement lisp repl necessary implement three functions infinite-loop function naturally implementation complex since must also implement special operators like done basic repl one line code lisp repl typically also provides input editing input history error handling interface debugger lisp usually evaluated eagerly common lisp arguments evaluated applicative order 'leftmost innermost scheme order arguments undefined leaving room optimization compiler lisp originally control structures many added language evolution lisp original conditional operator precursor later structures programmers scheme dialect often express loops using tail recursion scheme commonality academic computer science led students believe tail recursion common way write iterations lisp incorrect oft-seen lisp dialects imperative-style iteration constructs scheme loop common lisp complex expressions moreover key issue makes objective rather subjective matter scheme makes specific requirements handling tail calls thus reason use tail recursion generally encouraged scheme practice expressly supported language definition contrast ansi common lisp require optimization commonly termed tail call elimination thus fact tail recursive style casual replacement use traditional iteration constructs discouraged common lisp matter stylistic preference potentially one efficiency since apparent tail call common lisp may compile simple jump program correctness since tail recursion may increase stack use common lisp risking stack overflow lisp control structures special operators equivalent languages syntactic keywords expressions using operators surface appearance function calls differ arguments necessarily evaluated—or case iteration expression may evaluated contrast major programming languages lisp allows implementing control structures using language several control structures implemented lisp macros even macro-expanded programmer wants know work common lisp scheme operators non-local control flow differences operators deepest differences two dialects scheme supports re-entrant continuations using procedure allows program save later restore particular place execution common lisp support re-entrant continuations support several ways handling escape continuations often algorithm expressed lisp either imperative functional style noted scheme tends favor functional style using tail recursion continuations express control flow however imperative style still quite possible style preferred many common lisp programmers may seem familiar programmers used structured languages c preferred schemers closely resembles pure-functional languages haskell lisp early heritage list processing wide array higher-order functions relating iteration sequences many cases explicit loop would needed languages like loop c lisp task accomplished higher-order function true many functional programming languages good example function scheme called common lisp called given function one lists applies function successively lists elements order collecting results new list applies function corresponding pair list elements yielding result examples common lisp code basic hello world program lisp syntax lends naturally recursion mathematical problems enumeration recursively defined sets simple express notation evaluate number factorial alternative implementation takes less stack space previous version underlying lisp system optimizes tail recursion contrast iterative version uses common lisp macro following function reverses list lisp built-in reverse function thing various object systems models built top alongside lisp including | [
1445,
4302,
1450,
2915,
5731,
5734,
1476,
1478,
35,
5757,
7204,
4361,
5778,
4366,
5786,
1522,
7246,
7259,
1557,
7277,
144,
154,
7298,
4447,
160,
4454,
5878,
5883,
1616,
7333,
5911,
5915,
214,
218,
7374,
5948,
233,
7391,
1676,
4543,
5965... | Test |
4,544 | 9 | IBM_PL/S:ibm pl/s pl/s short programming language/systems machine-oriented programming language based pl/i developed ibm late 1960s name basic systems language bsl replacement assembly language internal software projects included support inline assembly explicit control register usage early projects using pl/s batch utility iehmove time sharing option mvt tso 1970s ibm rewriting flagship operating system pl/s although users frequently asked ibm release pl/s use ibm refused saying product proprietary concern open pl/s would give competitors amdahl itel national advanced systems storage technology corporation trilogy systems magnuson computer systems fujitsu hitachi pcm vendors competitive advantage however even though refused make available compiler shipped pl/s source code large parts os customers many thus became familiar reading closed pl/s meant ibm could easily modify enhance operating system pl/s succeeded pl/s ii pl/as programming language/advanced systems pl/x programming language/cross systems pl/ds programming language/distributed systems closely related language used develop dppx operating system pl/ds ii port s/370 architecture dppx/370 port market computers software shifted away ibm mainframes mvs ibm recanted offered current versions pl/s selected customers isvs developer partner program fully compliant pl/s compiler developed fujitsu ltd late-1970s using ibm pl/i optimizer compiler source code starting point pl/s compiler used internally fujitsu also external affiliates whether ibm aware improper use licensed intellectual property known phase names pl/s compiler corresponding phase names ibm pl/i optimizer compiler initial ibm phase name replaced initial j japan ibm copyright notices within modules deleted hide true origin ownership | [
336,
607,
3509,
5244,
6498,
5932,
6705,
6957,
3874,
6845,
1994
] | Test |
4,545 | 4 | BGP_hijacking:bgp hijacking bgp hijacking sometimes referred prefix hijacking route hijacking ip hijacking illegitimate takeover groups ip addresses corrupting internet routing tables maintained using border gateway protocol bgp internet global network enabling connected host identified unique ip address talk anywhere world achieved passing data one router another repeatedly moving packet closer destination hopefully delivered router must regularly supplied up-to-date routing tables global level individual ip addresses grouped together prefixes prefixes originated owned autonomous system routing tables ases maintained using border gateway protocol bgp group networks operate single external routing policy known autonomous system example sprint verizon unique identifier number bgp standard routing protocol used exchange information ip routing autonomous systems uses bgp advertise prefixes deliver traffic example network prefix 192.0.2.0/24 inside 64496 advertise provider and/or peer deliver traffic destined 192.0.2.0/24 although security extensions available bgp third-party route db resources exist validating routes default bgp protocol designed trust route announcements sent peers isps rigorously enforce checks bgp sessions ip hijacking occur deliberately accident one several ways common ways disruption normal routing network packets end forwarded towards wrong part network either enter endless loop discarded found mercy offending typically isps filter bgp traffic allowing bgp advertisements downstream networks contain valid ip space however history hijacking incidents shows always case resource public key infrastructure rpki designed authenticate route origins via cryptographic certificate chains demonstrating address block range ownership widely deployed yet deployed ip hijacking errant issues origin via accident intent detectable filterable ip hijacking sometimes used malicious users obtain ip addresses use spamming distributed denial-of-service ddos attack like tcp reset attack session hijacking involves intrusion ongoing bgp session i.e. attacker successfully masquerades one peers bgp session requires information needed accomplish reset attack difference session hijacking attack may designed achieve simply bringing session bgp peers example objective may change routes used peer order facilitate eavesdropping black holing traffic analysis default ebgp peers attempt add routes received another peer device routing table attempt advertise nearly routes ebgp peers problem multi-homed organizations inadvertently advertise prefixes learned one another causing end customer become new best-path prefixes question example customer cisco router peering say verizon using filtering automatically attempt link two major carriers could cause providers prefer sending traffic customer perhaps t1 instead using high-speed dedicated links problem affect others peer two providers also cause ass prefer misconfigured link reality problem hardly ever occurs large isps isps tend restrict end customer advertise however isp filtering customer advertisements allow errant information advertised global routing table affect even large tier-1 providers concept bgp hijacking revolves around locating isp filtering advertisements intentionally otherwise locating isp whose internal isp-to-isp bgp session susceptible man-in-the-middle attack located attacker potentially advertise prefix want causing traffic diverted real source towards attacker done either overload isp attacker infiltrated perform dos impersonation attack entity whose prefix advertised uncommon attacker cause serious outages including complete loss connectivity early 2008 least eight us universities traffic diverted indonesia 90 minutes one morning attack kept mostly quiet involved also february 2008 large portion youtube address space redirected pakistan pta decided block access site inside country accidentally blackholed route global bgp table filtering md5/ttl protection already available bgp implementations thus preventing source attacks problem stems concept isps rarely ever filter advertisements isps common efficient way determine list permissible prefixes originate penalty allowing errant information advertised range simple filtering other/larger isps complete shutdown bgp session neighboring isp causing two isps cease peering repeated problems often end permanent termination peering agreements also noteworthy even causing major provider block shutdown smaller problematic provider global bgp table often reconfigure reroute traffic available routes peers take action errant isp fixes problem source one useful offshoot concept called bgp anycasting frequently used root dns servers allow multiple servers use ip address providing redundancy layer protection dos attacks without publishing hundreds server ip addresses difference situation point advertising prefix actually access real data dns case responds correctly end user requests | [
3528,
1462,
1691,
5064,
57,
3426
] | Test |
4,546 | 2 | Nokia_X6-00:nokia x6-00 nokia x6 music-oriented capacitive touchscreen smartphone portable entertainment device nokia announced early september 2009 nokia world 2009 germany x6 replaces nokia 5800 nokia flagship music-centred model still slot high-end touchscreen models like nokia n97 x6 nokia x3-00 first devices newly installed nokia xseries xseries nokia music-centred devices branded xpressmusic x6 x3 introduced day nokia launched new simpler naming strategy one number series letter original x6 includes comes music program licence unlimited free downloads nokia music store comes music version shipped late 2009 estimated retail price £529.99 €605 name later reused hmd global new android smartphone nokia x6 2018 version without comes music support €200 less released 23 february 2010 version 16 gb on-board storage another cheaper variation x6 also without comes music support released nokia mid-2010 version 8 gb on-board storage released asia north america 32 gb version released india instead 8 gb 16 gb versions provided ovi music unlimited offer x6 notable slimmer body 5800 13.8 mm 35 hours continuous music playback fast 3g network social networking supports easy access facebook myspace ovi yahoo im youtube vk windows live new software update released nokia x6-00 version 40.0.002 brings new version ovi maps ovi store improved browser improved chat ovi contacts however updates possible via phone require windows computer perform nokia willing update devices mail windows pc hobbyists provided unofficial symbian anna firmware releases | [
1066,
5979,
2271,
3082,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
506... | Test |
4,547 | 2 | DriveSpace:drivespace drivespace initially known doublespace disk compression utility supplied ms-dos starting version 6.0 1993 purpose drivespace increase amount data user could store disks transparently compressing decompressing data on-the-fly primarily intended use hard drives use floppy disks also supported common usage scenario user would one hard drive computer space allocated one partition usually drive c software would compress entire drive contents one large file root partition booting system driver would allocate large file drive c enabling files accessed normal microsoft decision add disk compression ms-dos 6.0 influenced fact competing dr dos earlier started include disk compression software since version 6.0 1991 instead developing product scratch microsoft licensed technology doubledisk product developed vertisoft adapted become doublespace instance loading driver controlling compression/decompression dblspace.bin became deeply integrated operating system loaded undocumented pre-load api even config.sys file microsoft originally sought license technology stac electronics similar product called stacker negotiations failed microsoft later successfully sued patent infringement stac electronics violating compression patents court case stac electronics claimed microsoft refused pay money attempted license stacker offering possibility stac electronics develop enhancement products computer programs particularly games incompatible doublespace effectively bypassed doublespace driver doublespace also consumed significant amount conventional memory making difficult run memory-intensive programs shortly release reports data loss emerged company called blossom software claimed found bug could lead data corruption bug occurred writing files heavily fragmented disks demonstrated program called bust.exe company sold program called doublecheck could used check fragmentation condition could lead error microsoft position error occurred unlikely conditions fixed problem ms-dos 6.2 fragmentation condition related way doublespace compresses individual clusters size say 8k fits disk occupying fewer sectors size 512 bytes fixed number required without doublespace 16 sectors example created possibility kind internal fragmentation issue doublespace would unable find enough consecutive sectors storing compressed cluster even plenty space available potential causes data loss included corruption doublespace memory areas programs doublespace memory areas protected ms-dos ran real mode microsoft attempted remedy ms-dos 6.2 version doublespace via feature called doubleguard would check corruption fact compressed contents compressed drive stored single file implied possibility user accidentally deleting his/her data deleting file could happen user inadvertently got access host drive containing file host drive usually mapped letter h compression driver however compression driver failed load user might see drive c turning computer doublespace could finish updating data structures could also result data loss problem compounded microsoft making write caching enabled default smartdrv disk cache software came ms-dos 6.0 change exiting application ms-dos prompt might appear data written disk however due lack controlled shutdown procedure found modern operating systems many users saw appearance ms-dos prompt indication safe switch computer typically case prior ms-dos 6.0 microsoft addressed issue ms-dos 6.2 write caching still enabled default cache would flushed allowing command prompt reappear addstor inc. offered add-on product called double tools doublespace contained number tools enhance functions version doublespace came ms-dos 6.0 included various diagnostic features ability compressed removable media auto-mounted used well support background defragmentation doublespace compressed drives defragment files background possible let doubletools replace low-level doublespace driver dblspace.bin one supplied doubletools replacing driver also enabled enhanced functionality product use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed another function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools vertisoft company developed doubledisk program microsoft subsequently licensed turned doublespace developed sold doublespace add-on program called spacemanager contained number usability enhancements also offered improved compression ratios products like later versions stacker stac electronics capable converting existing doublespace compressed drives format ms-dos 6.2 featured new improved version doublespace ability remove doublespace added program scandisk introduced release able scan non-compressed compressed drives including checks internal doublespace structures security features known doubleguard added prevent memory corruption leading data loss memory footprint doublespace driver reduced compared version shipped ms-dos 6.0 fix made fragmentation issue discussed following successful lawsuit stac electronics regarding demonstrated patent infringement microsoft released ms-dos 6.21 without doublespace court injunction also prevented distribution previous versions ms-dos included doublespace ms-dos 6.22 contained reimplemented version disk compression software time released name drivespace software essentially identical ms-dos 6.2 version doublespace user point view compatible previous versions windows 95 full support doublespace/drivespace via native 32-bit driver accessing compressed drives along graphical version software tools ms-dos drivespace users could upgrade windows 95 without troubles furthermore microsoft plus windows 95 pack contained version 3 drivespace version introduced new compression formats hipack ultrapack different performance characteristics even greater compression ratios along tool could recompress files disk using different formats depending frequently files used one could upgrade drivespace 2 drivespace 3 downgrade path back drivespace 2 one could however decompress drivespace 3 drive dos device driver drivespace 3 memory footprint around 150 kb new features caused difficulty users rebooting ms-dos mode windows 95 running games reduced amount conventional memory available drivespace 3 also shipped windows 95 osr2 many features disabled unless plus also installed drivespace could also used fat32 making little use pcs large hard drives windows 98 shipped drivespace 3 part operating system functionality windows 95 plus removal real mode support fat32 going mainstream decreasing popularity drivespace drivespace windows limited support drivespace longer supported hard disk compression still supported reading writing compressed removable media although drivespace operation supported beside deleting reallocating compressed drives possible restore full function drivespace 3 unofficially windows copying executable file windows 98 installation using replace executable included windows one could compress new drives could windows 98 dmsdos linux kernel driver developed late 1990s support reading writing doublespace/drivespace disks however reading especially writing compressed filesystems reliable specific versions 2.0 2.1 2.2 versions kernel dr-dos supported disk compression technology originally based superstor later stacker novell dos 7 1993 higher introduced emulation undocumented pre-load api order provide seamless support doublespace well since dr-dos drivers dpms-enabled whereas ms-dos one offer advantages dr-dos users allowed easier coexistence migration due possibility shared use already existing compressed volumes multi-boot scenarios dr-dos 7.02 higher also added support drivespace 1998 | [
7879,
1812,
3937,
3263,
6088,
378,
2198,
6096,
4687,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
5784,
435,
1140,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
5480,
126,
3711,
... | Test |
4,548 | 7 | Abacus_Data_Systems:abacus data systems abacus data systems dba abacusnext american software private cloud services provider headquartered san diego california abacusnext offers following abacus private cloud private cloud sold desktop-as-a-service within windows server 2012 r2 environment service relies veeam software backup support built intel-based architecture private cloud service colocated across three carrier-neutral data centers interconnected via self-run optical network data centers scalematrix san diego california skybox houston one houston texas supernap switch las vegas nevada abacusnext offers four windows-based platforms rely relational database management system two law practice management software lawyers abacuslaw uses advantage database amicus attorney uses microsoft sql server.. abacusnext two platforms accounting firms rely microsoft sql server resultscrm customer relationship management quickbooks officetools practice management software december 2015 american private equity investment firm providence equity partners took strategic majority investment abacusnext abacus data systems time | [
2961,
7715
] | Test |
4,549 | 2 | Smeegol_Linux:smeegol linux smeegol linux new meego opensuse linux-based open source mobile operating system made available novell opensuse goblin team name smeegol linux linux distribution combines opensuse meego netbook oriented user interface get new linux distribution designed netbooks makes smeegol linux unique compared upstream meego opensuse distribution core based opensuse meego user experience well changes adding mono-based banshee media player networkmanager-powered network configuration newer version evolution express range social networking features facebook twitter myspace flickr digg plus firefox chromium web browsers already pre-installed end-users also build customized smeegol linux os using suse studio | [
5540,
5453,
5803,
3081,
3174,
4759,
1535,
1260,
7528,
4400,
1176,
3097,
2559,
2564,
6725,
5391,
2300,
5486,
578,
5232,
6736,
7555,
5236,
3559,
5062,
3039,
1582,
5068,
2503,
2240,
424,
7030,
1227,
4186,
5872,
7126,
2071,
349,
352,
3751,
... | Train |
4,550 | 4 | Enhanced_privacy_ID:enhanced privacy id enhanced privacy id epid intel corporation ’ recommended algorithm attestation trusted system preserving privacy incorporated several intel chipsets since 2008 intel processors since 2011 rsac 2016 intel disclosed shipped 2.4b epid keys since 2008 epid complies international standards iso/iec 20008 20009 trusted computing group tcg tpm 2.0 authentication intel contributed epid intellectual property iso/iec rand-z terms intel recommending epid become standard across industry use authentication devices internet things iot december 2014 announced licensing technology third-party chip makers broadly enable use epid enhancement direct anonymous attestation daa algorithm daa digital signature algorithm supporting anonymity unlike traditional digital signature algorithms entity unique public verification key unique private signature key daa provides common group public verification key associated many typically millions unique private signature keys daa created device could prove external party kind device optionally software running device without needing provide device identity i.e. prove authentic member group without revealing member epid enhances daa providing additional utility able revoke private key given signature created key even key still unknown 1999 pentium iii added processor serial number psn way create identity security endpoints internet however privacy advocates especially concerned intel chose remove feature later versions building improving asymmetric cryptography time group keys intel labs researched standardized way get benefits psn preserving privacy three roles using epid issuer member verifier issuer entity issues unique epid private keys member group member entity trying prove membership group verifier entity checking epid signature establish whether signed entity device authentic member group current usage intel intel key generation facility issuer intel-based pc embedded epid key member server possibly running cloud verifier behalf party wishes know communicating trusted component device issuing epid key done directly issuer creating epid key delivering securely member blinded issuer know epid private key epid keys embedded devices ship advantage usages epid available inherently devices arrive field epid key issued using blinded protocol advantage usages since never question whether issuer knew epid key device option one epid key device time shipment use key prove another issuer valid device get issued different epid key using blinded issuing protocol recent years epid used attestation applications platforms used protected content streaming financial transactions also used attestation software guard extensions sgx released intel 2015 anticipated epid become prevalent iot inherent key distribution processor chip optional privacy benefits especially valued example usage epid prove device genuine device verifier wishing know part genuine would ask part sign cryptographic nonce epid key part would sign nonce also provide proof epid key revoked verifier checking validity signature proof would know part genuine epid proof anonymous unlinkable epid used attest platform securely stream digital rights management drm -protected content minimum level hardware security intel insider program uses epid platform attestation rights-holder data protection technology dpt transactions product 2-way authentication point sale pos terminal backend server based epid keys using hardware roots trust based epid authentication initial activation provisioning pos terminal securely performed remote server general epid used basis securely provision cryptographic key material air wire method securing iot epid used provide authentication also preserving privacy epid keys placed devices manufacturing ideal provisioning keys services device epid keys used devices services allowing users tracked iot devices using services yet required known transaction used application user choose require transaction unambiguously known e.g. financial transaction epid used persistent identity anonymity whereas alternative approaches exist persistent identity difficult convert persistent identity anonymous identity epid serve requirements enable anonymous identity mode operation enables persistence well thus epid ideal broad range anticipated iot uses security privacy foundational iot since iot security privacy extend beyond intel processors chipmaker processors sensors intel announced december 9 2014 intent license epid broadly chip manufacturers internet things applications august 18 2015 intel jointly announced licensing epid microchip atmel showed running microchip microcontroller intel developers forum internet things described network networks internal workings one network may appropriate disclose peer foreign network example use case involving redundant spare iot devices facilitates availability serviceability objectives network operations load balances replaces different devices need reflected peer foreign networks share device across network contexts peer expects particular type service data structure likely n't need know device failover replacement repair epid used share common public key certificate describes attests group similar devices used redundancy availability n't allow tracking specific device movements many cases peer networks want track movements would require potentially maintaining context involving multiple certificates device lifecycles privacy also consideration details device maintenance failover load balancing replacement inferred tracking authentication events epid privacy preserving properties ideal iot device identity allow device securely automatically onboard iot service immediately first power device essentially device performs secure boot anything else reaches across internet find iot service new owner chosen managing device epid attestation integral initial communication consequence epid attestation secure channel created device iot service epid attestation iot service knows talking real iot device using secure channel created reciprocal attestation iot device knows talking iot service new owner selected manage unlike pki key unchanging transaction transaction adversary lurking network see correlate traffic key used epid employed thus privacy onboarding preserved adversaries longer collect data create attack maps later use future iot device vulnerabilities discovered moreover additional keys securely provisioned air wire latest version software perhaps specific iot service downloaded default logins disabled secure iot device without operator intervention october 3rd 2017 intel announced intel® secure device onboard software solution help iot device manufacturers iot cloud services privately securely quickly onboard iot devices iot services objective onboard device iot platform superior onboarding experience ecosystem enablement roi | [
6049,
5785,
7567,
1698,
1353,
354
] | Test |
4,551 | 3 | Legacy_Plug_and_Play:legacy plug play term legacy plug play also shortened pnp describes series specifications microsoft windows features geared towards operating system configuration devices standards primarily aimed ibm pc standard bus later dubbed industry standard architecture isa related specifications also defined common external specialist busses commonly attached via isa time development including rs-232 parallel port devices windows feature plug play refers operating system functionality supports connectivity configuration management native plug play devices originally considered part feature set specifications plug play context refers primarily responsibilities interfaces associated windows driver development plug play allows detection devices without user intervention occasionally minor configuration device resources i/o ports device memory maps pnp specific set standards confused generic term plug play describes hardware specification alleviates need user configuration device resources plug play standard requires configuration devices handled system firmware provides details resources allocations operating system process invoked boot time computer first turned compatible devices identified assigned non-conflicting addresses interrupt request numbers term adopted microsoft reference windows 95 product operating systems amigaos autoconfig mac os nubus system already supported features time various names name even yggdrasil linux advertised plug play linux least 2 years windows 95 term plug play gradually became universal due worldwide acceptance windows typically non-pnp devices need identified computer bios setup pnp system reassign devices problems interactions legacy non-pnp devices pnp system cause fail leading technology historically referred plug pray legacy plug play defined microsoft intel specifications proposed changes legacy hardware well bios support operating system-bound discovery devices roles later assumed acpi standard also moves support power management configuration operating system opposed firmware previously required plug play bios apm specifications following standards compose microsoft describe legacy plug play opposed native plug-and-play specifications pci usb apart plug play bios specification standards still supported microsoft however support opposed advanced configuration power interface removed future version windows use plug play three requirements met plug-and-play hardware typically also requires sort id code supply order computer software correctly identify id code system integrated early industry standard architecture isa hardware common pcs plug play first introduced isa plug play caused greatest difficulties made pnp initially unreliable led derisive term plug pray since i/o addresses irq lines often set incorrectly early days later computer buses like mca eisa pci becoming industry standard time integrated functionality finally operating system computer needs able handle changes typically means looking interrupts bus saying configuration changed reading information bus locate happened older bus designs often required entire system read order locate changes time consuming lots devices modern designs use sort system either reduce eliminate hunt example usb uses hub system purpose change located os examines information device figure load appropriate device drivers order make work past all-or-nothing affair modern operating systems often include ability find proper driver internet install automatically | [
405,
7894,
4687,
1052,
4759,
5571,
5970,
6014,
6754,
3755,
2509
] | Test |
4,552 | 2 | WQL:wql windows management instrumentation query language wql microsoft implementation cim query language cql query language common information model cim standard distributed management task force dmtf subset ansi standard sql minor semantic changes wql dedicated wmi designed perform queries cim repository retrieve information get event notifications example following wql query selects drives computer less 2 mb free space | [
737,
4308
] | Test |
4,553 | 5 | Call_Admission_Control:call admission control call admission control cac prevents oversubscription voip networks used call set-up phase applies real-time media traffic opposed data traffic cac mechanisms complement distinct capabilities quality service tools protect voice traffic negative effects voice traffic keep excess voice traffic network since averts voice traffic congestion preventive congestion control procedure ensures enough bandwidth authorized flows integrated services rsvp reserve resources flow packets network using controlled-load service ensures call set supported cac rejects calls either insufficient cpu processing power upstream downstream traffic exceeds prespecified thresholds number calls handled exceeds specified limit connection admission control cac used prevent congestion connection-oriented protocols atm context several schemes available however voip differs uses rtp udp ip connectionless protocols | [
3821,
585,
4172,
7091
] | Test |
4,554 | 4 | Disaster_recovery:disaster recovery disaster recovery involves set policies tools procedures enable recovery continuation vital technology infrastructure systems following natural human-induced disaster disaster recovery focuses technology systems supporting critical business functions opposed business continuity involves keeping essential aspects business functioning despite significant disruptive events disaster recovery therefore considered subset business continuity service continuity itsc subset business continuity planning bcp encompasses disaster recovery planning wider resilience planning also incorporates elements infrastructure services relate communications voice telephony data communications itsc plan reflects recovery point objective rpo recent transactions recovery time objective rto time intervals planning includes arranging backup sites hot warm cold standby sites hardware needed continuity 2008 british standards institution launched specific standard connected supporting business continuity standard bs 25999 titled bs25777 specifically align computer continuity business continuity withdrawn following publication march 2011 iso/iec 27031 security techniques — guidelines information communication technology readiness business continuity itil defined terms recovery time objective rto targeted duration time service level within business process must restored disaster disruption order avoid unacceptable consequences associated break business continuity accepted business continuity planning methodology rto established business impact analysis bia owner process including identifying options time frames alternate manual workarounds good deal literature subject rto spoken complement recovery point objective rpo two metrics describing limits acceptable tolerable itsc performance terms time lost rto normal business process functioning terms data lost backed period time rpo respectively forbes overview noted recovery time actual rta critical metric business continuity disaster recovery rta established exercises actual events business continuity group times rehearsals actuals makes needed refinements recovery point objective rpo defined business continuity planning maximum targeted period data transactions might lost service due major incident rpo measured minutes even hours practice off-site mirrored backups must continuously maintained daily off-site backup tape suffice recovery instantaneous restore data/transactions period time goal without incurring significant risks significant losses rpo measures maximum time period recent data might permanently lost event major incident direct measure quantity loss instance bc plan restore last available backup rpo maximum interval backup safely vaulted offsite business impact analysis used determine rpo service rpo determined existent backup regime level preparation off-site data required period data might lost often starts near time beginning work prepare backups time backups taken off-site although data synchronization point point time timing performing physical backup must included one approach used halt processing update queue disk-to-disk copy made backup reflects earlier time copy operation data copied tape transmitted elsewhere rto rpo must take business risk account along major system design criteria rpo tied times backups sent offsite offsiting via synchronous copies offsite mirror allows unforeseen difficulty use physical transportation tapes transportable media comfortably covers backup needs relatively low cost recovery enacted predetermined site shared offsite space hardware completes package needed high volumes high value transaction data hardware split across two sites splitting across geographic areas adds resiliency planning disaster recovery information technology developed mid- late 1970s computer center managers began recognize dependence organizations computer systems time systems batch-oriented mainframes another offsite mainframe could loaded backup tapes pending recovery primary site downtime relatively less critical disaster recovery industry developed provide backup computer centers one earliest centers located sri lanka sungard availability services 1978 1980s 90s internal corporate timesharing online data entry real-time processing grew availability systems needed regulatory agencies became involved even rapid growth internet 2000s objectives 2 3 4 5 nines 99.999 often mandated high-availability solutions hot-site facilities sought service continuity essential many organizations implementation business continuity management bcm information security management icm part implementation operation information security management well business continuity management specified iso/iec 27001 iso 22301 respectively rise cloud computing since 2010 continues trend nowadays matters even less computing services physically served long network sufficiently reliable separate issue less concern since modern networks highly resilient design 'recovery service raas one security features benefits cloud computing promoted cloud security alliance disasters classified two broad categories first natural disasters floods hurricanes tornadoes earthquakes preventing natural disaster impossible risk management measures avoiding disaster-prone situations good planning help second category man-made disasters hazardous material spills infrastructure failure bio-terrorism disastrous bugs failed change implementations instances surveillance testing mitigation planning invaluable recent research supports idea implementing holistic pre-disaster planning approach cost-effective long run every 1 spent hazard mitigation disaster recovery plan saves society 4 response recovery costs 2015 disaster recovery statistics suggest downtime lasting one hour cost systems become increasingly critical smooth operation company arguably economy whole importance ensuring continued operation systems rapid recovery increased example companies major loss business data 43 never reopen 29 close within two years result preparation continuation recovery systems needs taken seriously involves significant investment time money aim ensuring minimal losses event disruptive event control measures steps mechanisms reduce eliminate various threats organizations different types measures included disaster recovery plan drp disaster recovery planning subset larger process known business continuity planning includes planning resumption applications data hardware electronic communications networking infrastructure business continuity plan bcp includes planning non-it related aspects key personnel facilities crisis communication reputation protection refer disaster recovery plan drp related infrastructure recovery continuity disaster recovery control measures classified following three types good disaster recovery plan measures dictate three types controls documented exercised regularly using so-called dr tests prior selecting disaster recovery strategy disaster recovery planner first refers organization business continuity plan indicate key metrics recovery point objective recovery time objective metrics business processes mapped systems infrastructure failure properly plan extend disaster impact metrics mapped organization reviews budget rto rpo metrics must fit available budget cost-benefit analysis often dictates disaster recovery measures implemented adding cloud-based backup benefits local offsite tape archiving new york times wrote adds layer data protection common strategies data protection include many cases organization may elect use outsourced disaster recovery provider provide stand-by site systems rather using remote facilities increasingly via cloud computing addition preparing need recover systems organizations also implement precautionary measures objective preventing disaster first place may include disaster recovery service draas arrangement third party although vendor lists published disaster recovery product even though several large hardware vendors developed mobile/modular offerings installed made operational short time | [
7958,
5717,
1910,
3764,
1254,
7801,
3180,
906,
4684,
4594,
2390,
5568,
6187,
2655,
5741,
1280,
4783,
2936,
7189,
5496,
1391,
2442,
6130,
6391,
2961,
2254,
5889
] | Test |
4,555 | 2 | History_of_IBM_CKD_Controllers:history ibm ckd controllers beginning 1964 system/360 announcement ibm mainframes initially accessed ckd count key data subsystems via channel connected separate storage control units scus attached direct access storage devices dasd typically hard disk drive practice continued ibm larger mainframes thru system/370 however low end systems generally used lower cost integrated attachments function scu combined channel typically called integrated file adapter system/360 selector channel followed system/370 block multiplexor channel could operate selector channel allow attachment legacy subsystems scu evolved director controller latter typically labelled a-unit a-box controller least one dasd physically a-unit integrated storage control isc director within cabinet ibm system director could attach one four a-units one conventional dasd labeled b-unit could attach a-unit following sections list order announcement ibm mainframe ckd storage controls categorized conventional storage controls director type storage controls integrated controls attaching a-unit storage control frequently called storage control unit attaches system/360 system/370 channel one logically separate devices control unit device comporting system/360 and/or system/370 input/output architecture since control unit attached devices logically distinct either busy i/o initiated either present ending status becomes free conventional dasd storage controls listed section different interfaces attached dasd unique dasd dasd family 1972 ibm introduced standard dasd control interface used director type storage controls ibm 2820 storage control unit scu connects one two selector channels attach one four 2301 drum storage units ibm 2841 storage control unit direct access storage device dasd control unit introduced system/360 first shipped 1965 offered least 1975 2841 microprogrammed control unit intended use controlling access disk strip file slow-speed drum storage unit connected one two standard system/360 channels could also attached ibm 1130 ibm 1800 data acquisition control system add support 2311 disks ibm 2841 storage control unit initially capable attaching combinations eight following dasd standard offering 2841 scu number 2311 dasd eight less eight units single type units intermixed example 2841 two 2303 drum storages supported six additional 2321 data cells features 2841 included two-channel switch file scan record overflow special features dasd devices introduced 2841 used different storage controls discussed following sections ibm 2314 family scus dasds scus connect one two selector channels attach one nine drives eight online plus one optional service drive accessible scu maintenance purposes model numbers reflect packaging differences otherwise versions 2314 family functionally models 2835 storage control connects one two block multiplexer channels attaches one two 2305 fixed head storage modules 3830 model 1 storage control unit connects one two four channels attach one eight 3330 dasd spindles 3380 model cj2 provides storage functions one 3380 dasd two devices storage control functions 3990 model two paths a-units single unit connects two four eight block multiplexor channels three 3380 b units models bj4 bk4 attached 3380 model cj2 providing head-of-storage-facility function 14 devices ibm storage control unit evolved director controller latter typically packaged labelled a-unit a-box controller least one dasd physically a-unit dasd unit without controller became known b-unit terms a-unit a-box b-unit initially used instead units containing controller dasds given product type numbers specifically 3333 a-unit containing 3330 dasd 3333-11 a-unit containing two double capacity 3330-11 dasds use suffixes b model number designate a-unit b-units began 3340 dasd 3340 model a2 3340 b2 respectively practice using digits suffix dasd model number represent type unit number dasd unit continued subsequent ckd dasd example 3380 model a4 one controller four access mechanisms one unit 3380 model aa4 two controllers four access mechanisms one unit 3380 model b4 four access mechanisms combination a-unit one optional b-units string string switch optional feature a-units allows controller a-unit switched two directors thereby providing additional paths string dasd 3830 model 2 storage control associated integrated storage controls announced august 1972 first instance storage control director a-units 3830-2 connects one two four block multiplexer channels attach combination four a-units i.e. combination 3333s 3340-a2s 3350-a2/a2fs maximum 32 physical drives 6 additional drives attached a-unit integrated storage control system/370 models 158 168 functions identically 3830-2 3830-3 attaches four 3333s 3350-a2/a2f/c2/c2fs additional functions support 3850 mass storage system 3350 drives used staging drives native mode integrated storage controller staging adapter functions identically 3830-3 ibm 3880 storage control models 1 2 3 two directors per cabinet director attach one two four eight block multiplexor channels model 4 one director attaches 3370 fba 3375 ckd strings storage director limited specific devices use diskettes storage director initialized attach exclusively one supported types strings first box string must a-unit remaining boxes must compatible b-units last 3350 3350 string 3350-c2 ibm allowed field upgrades among models 1 2 3 directors attach four intermixed 3330 3350 a-units four 3340 a-units two 3380 a-units 3380 storage control model 11 model 13 model 21 model 23 two directors director attach one two four block multiplexor channels large semiconductor buffers called subsystem storage added 3380 storage controls models 13 23 caching models 11 21 paging caching semiconductor buffers first introduced dasd ckd subsystems memorex 1978 storagetek 1981 3880 model 13 two caching storage directors access subsystem storage larger portion subsystem storage cache used store active data quick access smaller portion storage directory used locate data stored cache cache storage director attaches one two 3380 a-units turn attach three 3380 b-units total 16 devices 3380 dasd two actuators 3880 model 13 32 device addresses model 23 increased cache size somewhat improved performance otherwise performed functions paging well established computer dedicated ckd paging devices going back drums included s/360 announcement 1978 storagetek 4305 first ckd device using semiconductor memory paging 3880 model 11 two storage directors director 1 access subsystem storage paging director 2 nonpaging director 1 attaches one string eight 3350 dasds director 2 attaches combination one four 3330 a-units 3350 a-units a-unit attaching three additional b-units 32 dasds 3990 dual directors director attach four eight block multiplexor channels characteristics specific models include model 1 field upgraded model 2 3 model 6 improved reliability availability serviceability otherwise functionally model 3 january 4 1968 ibm announced system 360 model 25 included disk attachment control dac attaching four 2311 dasd integrated attachment simulates channel storage control unit cpu attached 2311 units merging functions dac eliminates need channel separate storage control differences 2311 connected 2841 scu one connected dac september 23 1970 ibm announced part system/370 model 145 new integrated file adapter along new 2319-a1 dasd march 8 1981 support 2319-a1 announced integrated file adapter part announcement system/370 model 135 2319-a1 contained three 2314 class disk drives plus piece storage control system unit conventional 2314 type dasd e.g. 2312 2313 and/or 2318 could attached 2319-a1 since could connect director type storage control 2319-a1 a-unit term came used ibm direct attachment 3333/3330 dasd subsystem 3340 dasf subsystem 3340/3344 das subsystem 3125-2 provided depending model features 16 spindles attached 3340 subsystem 3340 mdl a2 attached 3340 drives shared another s/370 except 3115-0 3125-0 via string switch capability 9315 direct attachment 3340 dasf subsystem 3340/3344 das subsystem 3115-2 provided depending model feature eight drives attached 3340 dasf subsystem via string switch feature 9315 3340 model a2 shared another s/370 except 3115-0 3125-0 one two 3330 3340 a-units attached integrated file adapter s/370 model 138 three appropriate b-units may attached a-unit 3344 b-units installed may installed first two possible strings three 3340 and/or 3344 b-units combination one two dasd adapters available depending upon model attachment one 3340 a-unit three additional 3340 3344 b-units providing eight devices string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching four 3340 a-units attached optional dasd adapter 3340 a-unit attached one three 3340 b-units 3344 b-units total 32 dasd four strings eight string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching | [
1640,
5012,
5502,
7331,
467
] | Test |
4,556 | 4 | International_Computer_Security_Association:international computer security association icsa labs international computer security association began ncsa national computer security association mission increase awareness need computer security provide education various security products technologies early days ncsa focused almost solely certification anti-virus software using consortia model ncsa worked together anti-virus software vendors develop one first anti-virus software certification schemes past decade organization added certification programs security-related products changed name icsa verizon business providing resources research intelligence certification testing products including anti-virus firewall ipsec vpn cryptography ssl vpn network ips anti-spyware pc firewall products | [
3123,
4890,
7708,
4014,
2998,
2805,
2644
] | Validation |
4,557 | 4 | Certified_Server_Validation:certified server validation certified server validation csv technical method email authentication intended fight spam focus smtp helo-identity mail transfer agents csv designed address problems marid asrg defined detail intent lightweight mta authentication protocol lmap expired asrg draft january 3 2007 internet drafts expired mailing list closed since traffic 6 months csv considers two questions start smtp session csv answers questions follows validate smtp session unknown sending smtp client using csv receiving smtp server level trust high enough process email session traditional manner delivering forwarding without need validation level trust low return error showing reason trusting sending smtp client level trust document result header email delivered forwarded and/or perform additional checks answers questions top article 'yes receivers expect email received email want mail sources motivated make answers yes easy unless email flow toxic reputable independent accreditation service vouch csv designed efficient elegant respect certainly beats spf coverage helo identities client smtp authorization csa proposed mechanism whereby domain admin advertise mail servers legitimate originators mail his/her domain done providing appropriate srv rrs dns infrastructure | [
5722,
6908
] | Test |
4,558 | 6 | OpenSFS:opensfs open scalable file systems inc. opensfs nonprofit organization promoting lustre file system opensfs founded 2010 ensure lustre remains vendor-neutral open free lustre high-performance parallel file system deployed computational data centers including many top500 systems first started development 1999 accelerated strategic computing initiative path forward project initially released 2003 september 2007 sun microsystems acquired assets cluster file systems inc acquired oracle corporation 2010 announcements oracle 2010 lustre user group ongoing development lustre open-source project question prompting lustre developers leave oracle opensfs founded october 2010 steward open source software lustre community founding members cray datadirect networks lawrence livermore national laboratory oak ridge national laboratory april 2013 norman morse ceo since founded resigned replaced galen shipman ornl 2015 charlie carrol cray replaced shipman chairman lustre bof supercomuting'16 stephen simms announced stewardship opensfs transferred remaining board members cray intel seagate become user-driven organization simms assumed role interim president board elections lug 2017 2011 lustre 2.1 first community release endorsed opensfs opensfs began direct funding community releases early 2012 focused introducing new features targeted every six months maintenance releases targeted every three months opensfs solicited proposals february 2013 lustre feature development parallel file system tools addressing lustre technical issues parallel file system incubators opensfs-funded releases included lustre 2.5 october 2013 containing lustre+hsm integration capability opensfs established lustre community portal support open source community since 2011 opensfs charge organizing annual lustre user group lug event traditionally held april discussion seminars lustre opensfs held first annual apac lustre users group events china japan 2013 | [
1494
] | Test |
4,559 | 6 | List_of_cryptographic_file_systems:list cryptographic file systems list filesystems support filesystem-level encryption confused full-disk encryption | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6458,
6117,
759,
5773,
6854,
5437,
4014,
4375,
6500,
6505,
3350,
5457,
5808,
4759,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2... | Test |
4,560 | 4 | Shinken_(software):shinken software shinken open source computer system network monitoring software application compatible nagios watches hosts services gathers performance data alerts users error conditions occur conditions clear shinken architecture aims offer easier load balancing high availability administrator manages single configuration system automatically cuts parts dispatches worker nodes takes name functionality shinken japanese sword shinken written jean gabès proof concept new nagios architecture believing new implementation faster flexible old c code proposed new development branch nagios 4 proposal turned nagios authors shinken became independent network monitoring software application compatible nagios shinken designed run operating systems python runs development environment linux also runs well unix variants windows reactionner process responsible sending notifications also run android os free software licensed terms affero general public license published free software foundation shinken installation consists several processes optimized specific task multiple instances type process either single host spread many hosts adding processes automatically distributes load shinken webui builtin web interface provides near real time status information configuration interaction dashboard visualize trending data graphite databases visualization dependency tree graphs shinken skonfui independent web front-end used manage discovery process configuration tasks shinken-admin cli script used manage runtime process level aspects system changing logging levels getting health reports install.sh cli script main management script install remove update shinken associated software shinken open test-driven development approach contributors project providing new features code refactoring code quality bug fixing source code hosted github integration server runs tests commit depth tests regular intervals shinken documentation hosted wiki | [
5983,
4759,
2281,
3775,
6428,
2566,
5571,
6908,
578,
3383,
6029,
7848,
7214,
5965,
1237,
1435
] | Test |
4,561 | 5 | TCP_Vegas:tcp vegas tcp vegas tcp congestion avoidance algorithm emphasizes packet delay rather packet loss signal help determine rate send packets developed university arizona lawrence brakmo larry l. peterson introduced 1994 tcp vegas detects congestion incipient stage based increasing round-trip time rtt values packets connection unlike flavors reno new reno etc. detect congestion actually happened via packet loss algorithm depends heavily accurate calculation base rtt value small throughput connection less bandwidth available value large overrun connection lot research going regarding fairness provided linear increase/decrease mechanism congestion control vegas one interesting caveat vegas inter-operated versions like reno case performance vegas degrades vegas reduces sending rate reno detects congestion early hence gives greater bandwidth co-existing tcp reno flows tcp vegas one several flavors tcp congestion avoidance algorithms one series efforts tcp tuning adapt congestion control system behaviors new challenges faced increases available bandwidth internet components networks like internet2 tcp vegas implemented linux kernel freebsd possibly operating systems well | [
7148,
7054,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
5571,
2119,
6908,
7091,
2219,
3383,
3640,
3797,
6286,
2043,
5850,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880,
1151
] | Test |
4,562 | 2 | Frédéric_Lepied:frédéric lepied frédéric lepied born 1967 french computer engineer cto mandriva january 2006 born 1967 frédéric lepied took early interest computer science educated bréguet school noisy-le-grand france 1999 joined mandrakesoft research development team known author rpmlint rpm packages checker similar debian lintian program maintainer several core packages including xfree86 initscripts time wrote o'reilly book cvs 2000 maintained wacom tablet driver xfree86 x.org 2001 spent one year canada mandrakesoft montreal office became mandrakesoft cto came back france 2002 frédéric lepied left mandriva february 3 2006 joined intel corporation manage software manufacturers relationships late 2008 joined splitted desktop systems innovative hardware company chief strategy 2013 became vp software engineering enovance joining red hat 2015 | [
1155,
7108,
6586
] | Test |
4,563 | 7 | Toast,_Inc.:toast inc. toast inc. cloud-based restaurant software company based boston massachusetts company provides restaurant management point sale pos system built android operating system toast founded cambridge massachusetts 2012 steve fredette aman narang jonathan grimm 2016 toast received 30 million round series b funding bessemer venture partners gv formerly google ventures toast used thousands restaurants small cafes nationwide enterprises across u.s. toast founders steve fredette aman narang jonathan grimm met software company endeca graduating mit cambridge endeca acquired oracle 2011 left start toast grimm narang fredette initially created consumer app centered mobile payments customer loyalty promotions social aspects integrated restaurants ’ existing pos systems company started realize restaurants far needs able accept payments using phone tablet company pivoted full restaurant technology platform solutions pos online ordering gift cards analytics features two years later company signed 1,000 merchants across united states grew 120 employees requiring company upgrade space 7,000 square feet cambridge 40,000 square feet hatch fenway co-working space 2013 toast received investments several boston executives including former ceo endeca steve papa serves board member company early 2015 toast announced chris comparato chief executive officer comparato previously served senior vice president customer success acquia senior vice president worldwide customer solutions endeca august toast announced signed 1,000 customers two years revealing 550 year-over-year growth november toast released first restaurant report analyzed market restaurant technology well restaurant owners ’ challenges preferred technology features january 2016 toast received 30 million round series b funding bessemer venture partners gv previously known google ventures alphabet company funding led bvp partner kent bennett general partner android co-founder rich miner several undisclosed investors also participated round february 2018 needham-based tripadvisor partnered toast inc july 2018 company became one unicorn startup companies series round financing raising 115 million valuing company 1.4 billion first quarter 2019 company raised 250 million based valuation 2.7 billion equity raise led tcv tiger global management july 2019 toast acquired chicago-based human resources payroll software company stratex company also said would add additional 1,000 employees 2019 toast restaurant management system operates android operating system backend managed via mobile device via web browser real-time associated hardware includes receipt printer cash drawer kitchen display screen magstripe card reader 2015 merchant maverick named toast one best pos systems pizza parlors 2016 toast recognized notable player restaurant technology landscape pymnts.com may 2016 new england venture capital association nevca named toast winner hottest startup a+ 2016 nevy awards | [] | Test |
4,564 | 9 | Exception_safety:exception safety exception safety guarantees originally formalized david abrahams set contractual guidelines class library implementers clients use reasoning exception handling safety programming language uses exceptions particularly c++ several levels exception safety decreasing order safety usually least basic exception safety required write robust code languages higher levels safety sometimes difficult achieve might incur overhead due extra copying key mechanism exception safety codice_1 clause similar exception handling syntax ensure certain code always run block exited including exceptions several languages constructs simplify notably using dispose pattern named codice_2 codice_3 codice_4-with-resources consider smart vector type c++ java item added vector vector must actually add internal list objects update count field says many objects may also need allocate new memory existing capacity n't sufficient exception safety alternatives | [
505,
3238,
244,
5844
] | Test |
4,565 | 5 | Links_(web_browser):links web browser links open source text graphic web browser pull-down menu system renders complex pages partial html 4.0 support including tables frames support multiple character sets utf-8 supports color monochrome terminals allows horizontal scrolling intended users want retain many typical elements graphical user interfaces pop-up windows menus etc text-only environment original version links developed mikuláš patočka czech republic group twibright labs later developed version 2 links browser displays graphics renders fonts different sizes spatial anti-aliasing support javascript used version 2.1pre28 resulting browser fast display many pages intended graphical mode works even unix systems without x window system window environment using either svgalib framebuffer system graphics card graphics stack several peculiarities unusual web browser fonts displayed links derived system compiled binary grayscale bitmaps portable network graphics png format allows browser one executable file independent system libraries however increases size executable 5 mb fonts anti-aliased without hinting small line pitch artificial sharpening employed increase legibility subpixel sampling increases legibility lcd displays allowed links anti-aliased fonts time anti-aliased font libraries uncommon graphic elements images text first converted given gamma space according known assumed gamma information png jpeg etc known user gamma setting 48 bits per pixel photometrically linear space resampled bilinear resampling target size possibly taking aspect ratio correction account data passed high-performance restartable dithering engine used regardless monitor bit depth i.e. also 24 bits per pixel colour floyd-steinberg dithering engine takes account gamma characteristics monitor uses 768 kib dithering tables avoid time expensive calculations technique similar self-modifying code function templates used maximize speed dithering engine without using assembly language optimization non-portable images scaled also use subpixel sampling lcd increase level detail reason high quality processing provide proper realistic sampling images photorealistic display regardless monitor gamma without colour fringing caused 8-bit gamma correction built x server also increases perceived colour depth 24 bits per pixel links graphics drivers x server linux framebuffer svgalib os/2 pmshell atheos gui allows run graphics mode even platforms n't x server experimental/enhanced links elinks fork links led petr baudis based links 0.9 open development incorporates patches links versions additional extension scripting lua internet users hacked links another version links browser merged elinks features links 2 andrey mirtchovski ported plan 9 bell labs considered good browser operating system though users complained inability cut paste plan 9 snarf buffer last release hacked links july 9 2003 changes unreleased links also ported run sony psp platform pspradio rafael cabezas last version 2.1pre23_psp_r1261 released february 6 2007 beos port updated françois revol also added gui support also runs haiku | [
4655,
6802,
5378,
7537,
6809,
393,
3291,
2574,
2577,
6452,
4352,
4725,
1136,
6858,
445,
1152,
1525,
7628,
5821,
3368,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
5887,
6966,
5542,
1276,
5571,
2027,
7015,
7749,
2049,
2812,
... | Train |
4,566 | 2 | Time-sharing_system_evolution:time-sharing system evolution article covers evolution time-sharing systems providing links major early time-sharing operating systems showing subsequent evolution time-sharing developed late 1950s realization single expensive computer could efficiently utilized multitasking multiprogramming operating system allowed multiple users simultaneous interactive access typically individual user would enter bursts information followed long pauses group users working time pauses one user would filled activity others similarly small slices time spent waiting disk tape network input could granted users given optimal group size overall process could efficient user would use computer terminal initially electromechanical teleprinters teletype model 33 asr friden flexowriter 1970 progressively superseded crt-based units dec vt05 datapoint 2200 lear siegler adm-3a terminals initially linked nearby computer via current loop serial cables conventional telegraph circuits provided ptts specialist digital leased lines t1 modems bell 103 successors allowed remote higher-speed use analogue voice telephone network see details additional systems table relationships shown purpose grouping entries reflect influences e.g. os/2 influenced vax/vms ms-dos legacy x86 platform cambridge multiple-access system first time-sharing system developed outside united states | [
4291,
7605,
785,
4759,
6256,
190,
4670,
8066,
13,
3951,
5911,
1734,
3276,
299,
1180,
391,
1743,
5041,
4695,
7546,
4786,
578,
5396,
3874,
6197,
7003,
402,
2582,
2226,
6380,
4435,
5244,
2236,
1774,
7295,
4985,
7396,
768,
6849,
4366,
6236,... | Train |
4,567 | 4 | Data_commingling:data commingling data commingling computer science occurs different items kinds data stored way become commonly accessible supposed remain separated cloud computing occur different customer data sits server data commingled present security vulnerability data commingling also occur due high speed data transmission mixing situation data one security level inadvertently purposely mixed data lower higher security level transmission portal portal vehicles wire fiber optics microwave various radio frequency transmission portals commingling cause breaches security become source legal issues entity corporation individual data commingling also occur personal computers personal software programs used business security government etc uses early formulation stages entities non-profit profit corporations llc llp etc. creation use stand-alone computers stand-alone networks absolutely unconnected involved individuals easiest safest way prevent data commingling | [
2961
] | Test |
4,568 | 5 | Reliable_Server_Pooling:reliable server pooling reliable server pooling rserpool computer protocol framework management access multiple coordinated pooled servers rserpool ietf standard developed ietf rserpool working group documented rfc 5351 rfc 5352 rfc 5353 rfc 5354 rfc 5355 rfc 5356 terminology rserpool server denoted pool element pe pool identified pool element identifier pe id 32-bit number pe id randomly chosen upon pe registration pool set pools denoted handlespace older literature may denoted namespace denomination dropped order avoid confusion domain name system dns pool handlespace identified unique pool handle ph represented arbitrary byte vector usually ascii unicode name pool e.g downloadpool webserverpool handlespace certain scope e.g organization company denoted operation scope explicitly goal rserpool manage global internet pools within single handlespace due localisation operation scopes possible keep handlespace flat phs hierarchy contrast domain name system top-level sub-domains constraint results significant simplification handlespace management within operation scope handlespace managed redundant pool registrars pr also denoted enrp servers name servers ns prs redundant order avoid pr become single point failure spof pr operation scope identified registrar id pr id 32-bit random number necessary ensure uniqueness pr ids pr contains complete copy operation scope handlespace prs operation scope synchronize view handlespace using endpoint handlespace redundancy protocol enrp older versions protocol use term endpoint namespace redundancy protocol naming replaced avoid confusion dns abbreviation kept due handlespace synchronization enrp prs operation scope functionally equal prs fails pr able seamlessly replace using aggregate server access protocol asap pe add pool remove requesting registration deregistration arbitrary pr operation scope case successful registration pr chosen registration becomes pe home-pr pr-h pr-h informs prs operation scope registration deregistration pes also monitors availability pes asap keep-alive messages keep-alive message pr-h acknowledged pe within certain time interval pe fails answer within certain timeout assumed dead immediately removed handlespace furthermore pe expected re-register regularly re-registration also possible pe change list transport addresses policy information use service pool client — called pool user pu rserpool terminology — first request resolution pool ph list pe identities arbitrary pr operation scope selection procedure denoted handle resolution case requested pool existing pr select list pe identities according pool pool member selection policy also simply denoted pool policy possible pool policies e.g random selection random least-loaded pe least used first case necessary selection information pes selected randomly required maintain up-to-date load information second case selecting least-loaded pe using appropriate selection policy e.g possible equally distribute request load onto pool pes reception list pe identities pr pu write pe information local cache cache denoted pu-side cache cache pu select exactly one pe — using pool selection policy — establish connection using application protocol e.g http sctp tcp case web server using connection service provided server used case establishment connection fails connection aborted service usage new pe selected repeating described selection procedure information pu-side cache outdated pe identity may directly selected cache skipping effort asking pr handle resolution re-establishing connection new pe state application session re-instantiated new pe procedure necessary session resumption denoted failover procedure course application-specific ftp download example failover procedure could mean tell new ftp server file name last received data position ftp server able resume download session since failover procedure highly application-dependent part rserpool though rserpool provides far reaching support implementation arbitrary failover schemes session layer mechanisms make possible rserpool components configure automatically prs announce via udp ip multicast announces received pes pus prs allowing learn list prs currently available operation scope advantage using ip multicast instead broadcast mechanism also work routers e.g lans inter-connected via vpn announces — case e.g switched ethernet — heard processed stations actually interested information case ip multicast available course possible statically configure pr addresses following implementations known | [
3821,
4709,
6461,
2043,
4715,
4720,
4014,
4677
] | Validation |
4,569 | 6 | IBM_SAN_File_System:ibm san file system ibm san file system distributed heterogeneous file system developed ibm used storage area networks many virtualization features included allowing heterogeneous operating systems access data file spaces write-in-place b-trees used db2 database later better known core btrfs ibm discontinued selling san file system april 2007 replaced ibm general parallel file system gpfs | [
6117,
1254,
4295,
4759,
5571,
4672,
578,
6046
] | Test |
4,570 | 8 | Matomo_(software):matomo software matomo formerly piwik pronounced free open source web analytics application developed team international developers runs php/mysql webserver tracks online visits one websites displays reports visits analysis matomo used 1,455,000 websites 1.3 websites known traffic analysis tools translated 54 languages new versions released regularly piwik released late 2007 replacement phpmyvisites full api support cleaner ui modern graphs better architecture better performance 21 november 2008 sourceforge.net announced availability piwik hosted application developers piwik selected sourceforge project month july 2009 august 2009 piwik named among best open source enterprise infoworld 2009 bossie awards december 2012 piwik started crowdfunding requested new features september 2013 matthieu aubry maciej zawadziński ceo clearcode founded piwik pro provided support features open source piwik clearcode bought matthieu aubry june 2016 become sole owner piwik pro january 2018 piwik officially renamed matomo | [
2810,
6029,
3915,
6233,
5571,
4600,
6214,
7848
] | Validation |
4,571 | 6 | The_Circle_(file_system):circle file system circle peer-to-peer distributed file system written mainly python based chord distributed hash table dht development circle ceased 2004 supports file sharing instant messaging buddy lists internet relay chat model sending message channel personalized trust-based news service unusually supports dht implementation vulnerable denial service attacks circle homepage circle currently runs linux bsd windows mac os x | [
6025,
2984,
1691,
5965,
4759,
3338,
578,
6367
] | Test |
4,572 | 3 | The_Hunt_for_Red_October_(1987_video_game):hunt red october 1987 video game hunt red october video game based book hunt red october released 1987 available atari st amiga apple ii apple macintosh zx spectrum msx commodore 64 ibm pc port apple iigs released 1989 player must navigate red october towards u.s. waters avoiding soviet navy game combination submarine simulator strategy game computer gaming world 1988 described excellent submarine simulator controlled entirely mouse replay value game also praised soviets change tactics game 1992 survey magazine wargames modern settings much negative giving game one half stars five stating probably turn purchasers wargame genre product | [
6380
] | Test |
4,573 | 9 | Lazy_evaluation:lazy evaluation programming language theory lazy evaluation call-by-need evaluation strategy delays evaluation expression value needed non-strict evaluation also avoids repeated evaluations sharing sharing reduce running time certain functions exponential factor non-strict evaluation strategies call-by-name however lengthy operations would appropriate perform time-sensitive operations handling user inputs video game benefits lazy evaluation include lazy evaluation often combined memoization described jon bentley writing efficient programs function value computed parameter set parameters result stored lookup table indexed values parameters next time function called table consulted determine whether result combination parameter values already available stored result simply returned function evaluated another entry added lookup table reuse lazy evaluation lead reduction memory footprint since values created needed however lazy evaluation difficult combine imperative features exception handling input/output order operations becomes indeterminate lazy evaluation introduce memory leaks opposite lazy evaluation eager evaluation sometimes known strict evaluation eager evaluation evaluation strategy employed programming languages lazy evaluation introduced lambda calculus christopher wadsworth programming languages independently introduced peter henderson james h. morris daniel p. friedman david s. wise delayed evaluation used particularly functional programming languages using delayed evaluation expression evaluated soon gets bound variable evaluator forced produce expression value statement codice_1 i.e assignment result expression variable clearly calls expression evaluated result placed codice_2 actually codice_2 irrelevant need value via reference codice_2 later expression whose evaluation could deferred though eventually rapidly growing tree dependencies would pruned produce symbol rather another outside world see delayed evaluation advantage able create calculable infinite lists without infinite loops size matters interfering computation example one could create function creates infinite list often called stream fibonacci numbers calculation n -th fibonacci number would merely extraction element infinite list forcing evaluation first n members list example haskell programming language list fibonacci numbers written haskell syntax codice_5 prepends element list codice_6 returns list without first element codice_7 uses specified function case addition combine corresponding elements two lists produce third provided programmer careful values required produce particular result evaluated however certain calculations may result program attempting evaluate infinite number elements example requesting length list trying sum elements list fold operation would result program either failing terminate running memory almost common eager languages statements evaluate lazy fashion evaluates evaluates true evaluate b otherwise evaluates c either b c evaluated conversely eager language expected behavior still evaluate e computing value f e even though e unused function f. however user-defined control structures depend exact syntax example j would evaluated eager language lazy language j would evaluated never lazy evaluation allows control structures defined normally primitives compile-time techniques j side effects introduce run time errors subtle differences l l complex usually possible introduce user-defined lazy control structures eager languages functions though may depart language syntax eager evaluation often involved code bodies like j need wrapped function value executed called short-circuit evaluation boolean control structures sometimes called lazy many languages offer notion infinite data-structures allow definitions data given terms infinite ranges unending recursion actual values computed needed take example trivial program haskell function numberfrominfinitelist value infinity infinite range actual value specifically specific value certain index needed list evaluated even evaluated needed desired index compound expression might form easilycomputed lotsofwork easy part gives true lot work could avoided instance suppose large number n checked determine prime number function isprime n available alas require lot computation evaluate perhaps n=2 mod n,2 ≠0 isprime n help many evaluations arbitrary values n. compound expression might form safetotry expression whereby safetotry false attempt evaluating expression lest run-time error signalled divide-by-zero index-out-of-bounds etc instance following pseudocode locates last non-zero element array elements array zero loop work l 0 case loop must terminated without attempting reference element zero array exist computer windowing systems painting information screen driven expose events drive display code last possible moment windowing systems avoid computing unnecessary display content updates another example laziness modern computer systems copy-on-write page allocation demand paging memory allocated value stored memory changed laziness useful high performance scenarios example unix mmap function provides demand driven loading pages disk pages actually touched loaded memory unneeded memory allocated matlab implements copy edit arrays copied actual memory storage replicated content changed possibly leading memory error updating element afterwards instead copy operation programming languages delay evaluation expressions default others provide functions special syntax delay evaluation miranda haskell evaluation function arguments delayed default many languages evaluation delayed explicitly suspending computation using special syntax scheme codice_8 codice_9 ocaml codice_10 codice_11 generally wrapping expression thunk object representing explicitly delayed evaluation called lazy future perl 6 uses lazy evaluation lists one assign infinite lists variables use arguments functions unlike haskell miranda perl 6 n't use lazy evaluation arithmetic operators functions default lazy programming languages haskell although default evaluate expressions demanded possible cases make code eager—or conversely make lazy made eager done explicitly coding something forces evaluation may make code eager avoiding code may make code lazy strict evaluation usually implies eagerness technically different concepts however optimisation implemented compilers called strictness analysis cases allows compiler infer value always used cases may render programmer choice whether force particular value irrelevant strictness analysis force strict evaluation haskell marking constructor fields strict means values always demanded immediately codice_12 function also used demand value immediately pass useful constructor field generally lazy however neither techniques implements recursive strictness—for function called codice_13 invented also pattern matching haskell 98 strict default codice_14 qualifier used make lazy python 2.x codice_15 function computes list integers entire list stored memory first assignment statement evaluated example eager immediate evaluation python 3.x codice_15 function returns special range object computes elements list demand elements range object generated needed e.g. codice_17 evaluated following example example lazy deferred evaluation python 2.x possible use function called codice_18 returns object generates numbers range demand advantage codice_19 generated object always take amount memory version 2.2 forward python manifests lazy evaluation implementing iterators lazy sequences unlike tuple list sequences instance python 2 .net framework possible lazy evaluation using class system.lazy class easily exploited f using lazy keyword force method force evaluation also specialized collections like microsoft.fsharp.collections.seq provide built-in support lazy evaluation let fibonacci seq.unfold fun x x x 0i,1i fibonacci seq.nth 1000 c vb.net class system.lazy directly used public int sum practical example // recursive calculation n'th fibonacci number public int fib int n public void main another way use yield keyword // eager evaluation public ienumerable int fibonacci int x // lazy evaluation public ienumerable int lazyfibonacci int x | [
3599,
7152,
5,
7,
1450,
718,
6428,
3630,
3968,
1477,
1854,
7557,
56,
6137,
769,
5082,
1889,
4737,
6148,
2619,
6882,
5117,
4778,
2311,
1954,
4070,
5164,
154,
3737,
162,
1231,
5883,
6614,
2740,
4497,
3106,
920,
7005,
5583,
3120,
7009,
7... | Test |
4,574 | 1 | Profit_impact_of_marketing_strategy:profit impact marketing strategy profit impact market strategy pims® project uses empirical data determine business strategies make difference success failure used develop strategies resource allocation marketing important strategic metrics market share product quality investment intensity service quality measured pims® strongly correlated financial performance one surprising findings factors work identically across different industries pims® yields solid evidence support common sense counter-intuitive principles gaining sustaining competitive advantage tom peters nancy austin pims project originally initiated senior managers general electric wanted know business units profitable others direction sidney schoeffler economics professor hired ge purpose pims project launched 1960s internal empirical study aim make ge different strategic business units sbus comparable since ge highly diversified time key factors sought would impact economic success regardless product particular return investment roi i.e profit per unit tied capital used measure success 1972 project transferred marketing sciences institute wing harvard business school extended companies 1976 american strategic planning institute cambridge massachusetts took charge project 1970 1983 roughly 2600 strategic business units sbus around 200 companies took part surveys provided key figures project today around 12,570 observations 4200 sbus pims associates london worldwide competence design centre pims® since 1990s part malik management fredmund malik st. gallen switzerland since 2005 pims project analysed data gathered identify options problems resources opportunities faced sbu based spread business across different industries hoped data could drawn upon provide business industry empirical evidence strategies lead increased profitability database continues updated drawn upon academics companies today pims® databases currently comprise 25,000 years business experience sbu level i.e customer interface takes place marketing investment decisions made sbu characterized hundreds factors period 3+ years including market share competitors customer preference relative prices service quality innovation rate vertical integration etc. well number market attractiveness factors fairly detailed income statement balance sheet employee data pims study 50 different core metrics regularly surveyed important presented characteristics business environment market attractiveness competitive strength supply chain fitness dynamics change economic success factors variables explained variables appear obvious pims® advantage providing empirical data defines quantitative relationships attributes would consider reasonable companies wishing use service provide detailed information main strategic business units including based data provided pims® provides four reports lancaster massingham ashford following factors correlate particularly strongly roi ros success factors investment intensity correlates negatively explains approx 15 one hand formal-analytical reason increasing investment intensity i.e investment volume relation sales depreciation volume relation sales depreciation intensity also increases thus profit decreases hand investment intensity high fixed assets increase urge also use capacities i.e increase output volume certain circumstances lower prices thus profit margin relative market share correlates positively explains approx 12 main reason positive influence relative market share economies scale higher market share larger production volume lower unit costs also explained experience curve moreover market share increases power vis-à-vis suppliers means better conditions achieved relative product quality correlates positively explains approx 10 important reasons positive correlation higher achievable prices premium products also higher willingness consumers buy high-quality services sales volume increases thus positively influences market share see another reason lower complaint costs overall factors surveyed explain 70 percent differences profitability successful unsuccessful business areas pims database measured variance clearly could argued database operating information gathered period 1970 1983 outdated however data continues collected participating companies pims argues provides unique source time-series data conclusions proven stable time also suggested pims heavily biased towards traditional metal-bashing industries car manufacturing perhaps surprising considering era majority surveys carried reality 2006 3,800+ businesses contained within database includes data consumer industrial service sectors also heavily weighted towards large companies expense small entrepreneurial firms resulted data collection method used generally larger firms prepared pay consulting fee provide survey data return access database compare business large businesses sbus mintzberg 1998 claims database dominated large established firms suitable technique assessing state rather getting page 99 criticism important one trying get average results across industries give us laws marketplace dubious enterprise sampling strategy important one wants obtain results representative → pims master database heart pims program includes 25,000 years business experience across broad spectrum industries worldwide 90 companies processed one-third manufacture consumer goods 15 manufacture capital goods remaining business units suppliers raw materials semi-finished products components accessories industry commerce trade services companies account less 10 total companies yet represent fairly large sample 250 strategic business units category half business units pims database market products services nationally united states canada 11 serve regional markets north america european companies also numerous today around 1,000 business units continental european countries 600 uk important criticism leveled pims fact causation implies correlation correlation imply causation one important findings pims program find statistically significant relationship profitability market share see buzzell gale 1987 empirical work conducted pims suggested high market share yielded high profitability correlation considered true causal relationship fact correlation imply causation multivariate correlation analysis high market share associated high profits high profits could associated high market share third factor common could caused correlation many analysts believe possible use statistical causality test determine causation whole problem correlation insufficient determine causation first place using another correlation used tests determine causation → connection market share already indicated frequent allegations correlations used pims investigations draw conclusions causal relationships i.e correlation equated causality however problem obvious examined detail development pims program backhaus et al formulate aptly primary field application regression analysis investigation causal relationships cause-effect relationships also refer relationships backhaus et al 2006 p. 46 emphasis original authors add following emphasized neither regression analysis statistical methods prove causalities beyond doubt rather regression analysis prove correlations variables necessary yet sufficient condition causality backhaus et al 2006 p.48 f. within framework pims studies thus possible determine causalities help time series analyses due availability data longer periods see example barilits 1994 p. 61 correlations sense including pims program initially give nothing reason investigate possible causalities substantiated intensively another important criticism pims take account heterogeneity data set presumption pims analysis laws marketplace apply industries however statistical assumptions employed econometric analysis make assumption cross-sectional observations come one statistical distribution cross-sectional observations tends achilles heel virtually cross-sectional analyses homogeneous assumption false cross-sectional observations drawn different populations one use estimation techniques fixed-effects control different population means co-variances also differ across populations meaning behavior differs across populations way one control aspect run regressions population separately means laws marketplace differ across populations directly contradicting one main presumptions using pims data base analysis tellis golder 1996 claim pims defines markets narrowly respondents described market narrowly give appearance high market share believe self reporting bias makes conclusions suspect also concerned defunct companies included leading survivor bias | [
317
] | Test |
4,575 | 2 | IPad:ipad ipad line tablet computers designed developed marketed apple inc. run ios ipados mobile operating systems first ipad released april 3 2010 recent ipad models sixth-generation ipad released march 27 2018 fifth-generation ipad mini released march 18 2019 third-generation ipad air released march 18 2019 third-generation ipad pro released november 7 2018. apple sold 360 million ipads though sales peaked 2013 popular tablet computer sales second quarter 2018 user interface built around device multi-touch screen including virtual keyboard ipads connect via wi-fi models also cellular connectivity ipads shoot video take photos play music perform internet functions web-browsing emailing functions games reference gps navigation social networking etc enabled downloading installing apps app store million apps ipad apple third parties nine versions ipad first generation established design precedents persisted models 2nd-generation ipad ipad 2 introduced new thinner design dual-core apple a5 processor vga front-facing 720p rear-facing cameras designed facetime video calling third generation added retina display new apple a5x processor quad-core graphics processor 5-megapixel camera hd 1080p video recording voice dictation 4g lte fourth generation added apple a6x processor replaced 30-pin connector all-digital lightning connector ipad air added apple a7 processor apple m7 motion coprocessor reduced thickness first time since ipad 2 ipad air 2 added apple a8x processor apple m8 motion coprocessor 8-megapixel camera touch id fingerprint sensor reduced thickness ipad introduced 2017 added apple a9 processor sacrificing improvements ipad air 2 introduced exchange lower launch price 2018 apple released 2018 model ipad apple a10 fusion processor apple pencil support year later 2019 ipad air released 10.5-inch display apple a12 chip five versions ipad mini screen size first generation similar internal specifications ipad 2 uses lightning connector instead ipad mini 2 added retina display apple a7 processor apple m7 motion coprocessor closely matching internal specifications ipad air ipad mini 3 added touch id fingerprint sensor ipad mini 4 features apple a8 apple m8 motion coprocessor 5th generation features apple a12 soc three generations ipad pro first generation came 9.7 12.9 screen sizes second came 10.5 12.9 sizes third 11 12.9 sizes ipad pros unique features smart connector exclusive series ipads apple co-founder steve jobs said 1983 speech company strategy simple want want put incredibly great computer book carry around learn use 20 minutes ... really want radio link n't hook anything 're communication larger databases computers apple first tablet computer newton messagepad 100 introduced 1993 powered arm6 processor core developed arm 1990 spinout acorn computers apple invested apple also developed prototype powerbook duo based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple re-entered mobile-computing markets 2007 iphone smaller ipad featuring camera mobile phone pioneered multi-touch finger-sensitive touchscreen interface apple ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked apple tablet specific names included itablet islate ipad announced january 27 2010 steve jobs apple press conference yerba buena center arts san francisco jobs later said apple begun developing ipad iphone jonathan ive 1991 created industrial design stylus-based tablet macintosh folio first project apple 2004 studio company participating development large tablet prototype later described crude involving projectors ive stated seeking produce tablet first came agree jobs phone important tablet innovations would work well ipad internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders first-generation ipad march 12 2010 major change device announcement available pre-order change behavior side switch perform either sound muting screen rotation locking user selectable wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time initially ipad available order apple store since become available purchase retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china jobs unveiled ipad 2 press conference march 2 2011 33 thinner predecessor 15 lighter ipad 2 better processor dual core apple a5 apple says twice fast predecessor cpu operations nine times fast gpu operations ipad 2 includes front back cameras support facetime videophone application well three-axis gyroscope retained original 10‑hour battery life similar pricing scheme successor ipad 2 unveiled march 7 2012 apple ceo tim cook yerba buena center arts new ipad contained new dual core a5x processor quad-core graphics retina display resolution 2,048 1,536 pixels 50 percent pixels standard high definition tv screen brief controversy erupted revealed lte advertised work countries october 23 2012 apple announced fourth generation ipad began shipping november 2 2012 new hardware includes a6x processor hd facetime camera improved lte compatibility all-digital lightning connector available storage increments pricing structure third generation following announcement fourth-generation ipad previous generation discontinued alongside launch fourth generation hardware apple announced ipad mini screen measuring 7.9 inches aimed emerging sector smaller tablets kindle fire nexus 7 hardware new ipad mini similar ipad 2 1,024 768 pixel resolution screen dual core a5 processor 53 lighter 7.2 mm thick released november 2 2012 16 gb 32 gb 64 gb capacities wi-fi wi‑fi cellular versions october 22 2013 apple introduced fifth generation ipad called ipad air second generation ipad mini called ipad mini 2 comes retina display ipad air went sale november 1 2013 starting 499 ipad mini 2 released november 12 2013 starting 399 first quarter 2014 apple reported sold 25 million ipads all-time quarterly record compared 22.9 million year-ago quarter october 2014 apple released ipad air 2 ipad mini 3 ipad air 2 first ios device feature triple core cpu 2gb ram well thinner faster predecessor ipad air features touch id available gold color option ipad mini 3 similar ipad mini 2 design hardware also includes touch id available gold color september 2015 ipad pro announced included 12.9-inch screen 9.7-inch version announced march 2016 addition 256 gb option ipad pro models march 21 2017 new ipad announced hardware includes a9 processor designed budget version ipad june 2017 ipad pro second generation hardware announced 12.9 10.5-inch screens march 28 2018 new ipad 9.7-inch 2018 model 6th generation announced new model uses a10 fusion processor fully supports apple pencil replaces 2017 model october 30 2018 third-generation ipad pro announced first generation support 1tb storage march 18 2019 apple announced ipad air 2019 ipad mini 2019 a12 bionic processors ipad first two generations touchscreen display 1,024 768 pixel liquid-crystal display diagonal fingerprint- scratch-resistant glass steve jobs said 7-inch screen would small express software 10 inches minimum tablet screen like iphone ipad designed controlled bare fingers normal non-conductive gloves styli work although special gloves capacitive styli designed use display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch rotation lock available onscreen menu ios 4.3 update released ipad 2 setting added allow user specify whether side switch used rotation lock mute first generation ipad camera ipad 2 front vga camera rear-facing 720p camera capable still images taken low quality 0.3 megapixels 30fps video rear-facing camera 5× digital zoom still images shoot photo video fullscreen aspect ratio unlike iphone 4 shoots widescreen aspect ratio unlike iphone ipad support tap focus allow tap set auto exposure cameras allow facetime video messaging iphone 4 fourth generation ipod touch snow leopard lion mountain lion macs ipad two internal speakers reproducing left right channel audio located bottom-right unit original ipad speakers push sound two small sealed channels leading three audio ports carved device ipad 2 speakers behind single grill volume switch right side unit 3.5-mm trrs connector audio-out jack top-left corner device provides stereo sound headphones without microphones and/or volume controls ipad also contains microphone used voice recording built-in bluetooth 2.1 edr interface allows wireless headphones keyboards used ipad however ios currently support file transfer via bluetooth ipad also features 1,024×768 vga video output limited applications screen capture connecting external display television accessory adapter ipad uses internal rechargeable lithium-ion polymer lipo battery batteries made taiwan simplo technology 60 dynapack international technology ipad designed charged high current 2 amperes using included 10 w usb power adapter usb cord usb connector one end 30-pin dock connector end charged standard usb port computer limited 500 milliamperes 0.5 amps result ipad running powered normal usb computer port may charge slowly high-power usb ports found newer apple computers accessories provide full charging capabilities apple claims battery generations ipad provide 10 hours video 140 hours audio playback one month standby like rechargeable battery technology ipad battery loses capacity time designed user-replaceable program similar battery-replacement program ipod original iphone apple replace ipad hold electrical charge refurbished ipad fee us 99 plus 6.95 shipping different unit supplied user data preserved refurbished unit new case warranty refurbished unit may vary jurisdictions independent companies also provide battery replacement service returning original unit new battery original case alternatively possible technically competent user buy install new battery task require soldering technically challenging ipad released three capacity options storage 16 32 64 gb internal flash memory january 29 2013 apple announced 128 gb model fourth generation ipad released february 5 data stored internal flash memory option expand storage apple sells camera connection kit sd card reader used transfer photos videos march 21 2016 apple announced 256 gb model ipad pro released march 31 2017 apple released 10.5-inch ipad pro revised 12.9-inch ipad pro 512 gb option first kind ios device 2018 apple released 11-inch 12.9-inch ipad pro 1tb option apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renders user data device cryptographically inaccessible ipad models come two basic variants wi-fi wi-fi cellular support cellular variants however support circuit-switched voice calls texts data connectivity side wi-fi 3g ipad micro-sim slot mini-sim 3g ipad used compatible gsm carrier unlike iphone usually sold 'locked specific carriers first generations ipad u.s. data network access via t-mobile network limited slower edge cellular speeds t-mobile 3g network time used different frequencies second generation ipad introduced third tier models cdma support verizon wireless united states available separately capable version ipad 4th generation uses micro-sim first generation ipad mini uses nano-sim introduced iphone 5 ipad mini available two different frequency bands worldwide devices support quad-band gsm quad-band umts frequencies one variant also supports lte bands 4 17 principally intended use u.s. network adds support lte bands 1 3 5 13 25 cdma ev-do rev rev b 5th generation ipad 2nd generation ipad mini introduced support many additional lte bands worldwide ipad air mini retina display cellular models come two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant ipad also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction moreover t-mobile usa selling ipad air mini retina display models became first ipads made available purchase directly four nationwide u.s. wireless carriers previously indicated u.s. carriers selling hardware variant device apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger also used ipods iphones 10 w charger included ipad apple sells camera connection kit consists two separate adapters dock connector one usb type sd card reader adapter used transfer photos videos plug usb audio card midi keyboard third party sells adapter includes usb sd microsd single unit adapter vga connectors allows ipad work external monitors projectors another adapter mirrors screen onto hdmi compatible devices 1080p works apps rotations unlike adapters allows ipad charge another dock connector hdmi adapter released advertised second generation ipad also works first-generation ipad iphone 4 fourth generation ipod touch smart covers screen protectors magnetically attach align face ipad 2 3 4 cover three folds allow convert stand also held together magnets original ipad owners could purchase black case included similarly folding cover smart cover meant minimal easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes cover removed five different colors polyurethane leather leather expensive smart covers compatible original ipad june 2012 apple started selling smart case case combined function smart cover back protection case compatible ipad 2 ipad 3rd 4th generation devices like iphone shares development environment ipad runs software software downloaded apple app store software written developers paid developer license registered devices ipad runs almost third-party iphone applications displaying iphone size enlarging fill ipad screen developers may also create modify apps take advantage ipad features onemillion apps optimized ipad application developers use ios sdk developing applications ipad ipad originally shipped customized ipad-only version iphone os dubbed v3.2 september 1 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 interface centred around home screen graphical list available applications home screen accessed time hardware button screen closing open application process users also add delete icons dock every home screen home screen holds twenty icons dock holds six icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs however may removed almost input given touch screen understands complex gestures using multi-touch ipad interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder layout music library similar ipod current symbian s60 phones ipad sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow likewise feature may disabled purposely wishing view screen another angle like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks ipad supports gapless playback like fifth-generation ipods introduced 2005 ipad play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback ipad allows users purchase download songs itunes store directly ipad includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken ipad camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc ipad use wi-fi network trilateration skyhook wireless provide location information applications google maps 3g model supports a-gps allow position calculated gps relative nearby cellphone towers also black strip back aid 3g reception ipad headphone jack proprietary apple dock connector ethernet usb port however apple camera connection kit accessory provides two dock connector adapters importing photos videos via usb sd memory cards ipad comes several applications including safari mail photos video ipod itunes app store ibooks maps notes calendar contacts several improved versions applications developed iphone mac apps currently missing weather calculator health apps ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place telephone calls wi-fi 3g using voip application ipad specific apps app store december 2010 reuters reported iphone ipad users lodged lawsuit apple alleging applications passing information third party advertisers without consent ipad optional ibooks application downloaded app store displays books epub-format content downloaded ibookstore ipad launch april 3 2010 ibookstore available united states several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books ipad despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble made kindle nook apps available ipad february 2010 condé nast said would sell ipad subscriptions several magazines june april 2010 new york times announced would begin publishing daily ipad top news section available free charge remainder payment subscription major news organizations including wall street journal bbc reuters released ipad applications newscorp created ipad-only publication daily february 2011 ceased operations december 2012 ipad assembled foxconn also manufactures apple ipod iphone mac mini largest plant shenzhen china pegatron shanghai china april 2011 foxconn announced would moving production ipad apple products brazil could begin production end 2011. isuppli estimated first-generation ipad 16 gb wi-fi version costs us 259.60 manufacture total excludes research development licensing royalty patent costs apple disclose makers ipad components teardown reports analysis industry insiders indicate various parts suppliers include ipad employ digital rights management drm os prevents users copying transferring certain content outside apple platform without authorization tv shows movies apps also ipad development model requires anyone creating app ipad sign non-disclosure agreement pay developer subscription critics argue apple centralized app approval process control platform could stifle software innovation particular concern digital rights advocates apple ability remotely disable delete apps ipad time digital rights advocates including free software foundation electronic frontier foundation computer engineer activist brewster kahle criticized ipad digital rights restrictions april 2010 paul sweeting analyst gigaom quoted national public radio saying ipad anti-internet hands ... offers major media companies opportunity essentially re-create old business model wherein pushing content terms rather going finding content search engine discovering content sweeting also thought limitations imposed apple impart feeling safe neighborhood saying apple offering gated community guard gate probably maid service laura sydell article author concludes consumers fears security internet viruses malware may happy opt apple gated community russian government switched ipads android devices security concerns like certain ios devices ipad jailbroken depending version ios running thus allowing applications programs authorized apple run device jailbroken users able download many applications previously unavailable app store via unofficial installers cydia well illegally pirated applications apple claims jailbreaking void factory warranty device united states even though jailbreaking legal ipad released april 2010 first jailbroken may 2010 spirit jailbreak ios version 3.1.2 ipad jailbroken ios versions 4.3 4.3.3 web-based tool jailbreakme 3.0 released july 2011 ios versions including 5.0 5.0.1 using redsn0w absinthe 2.0 released may 25 2012 first jailbreak method ios 5.1.1 devices except 32 nm version ipad 2 apple app store provides iphone ipad applications imposes censorship content become issue book publishers magazines seeking use platform guardian newspaper described role apple analogous british magazine distributor wh smith many years imposed content restrictions due exclusion pornography app store youporn others changed video format flash h.264 html5 specifically ipad e-mail exchange ryan tate valleywag steve jobs claimed ipad offers freedom porn leading many upset replies including adbustings berlin artist johannes p. osterhoff san francisco wwdc10 may 28 2010 ipad released australia canada japan well several larger european countries media reaction launch mixed media noted positive response fans device thousands people queued first day sale number countries media reaction ipad announcement mixed walter mossberg wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model 499 price lower pre-release estimates tech press wall street analysts apple competitors expecting much higher entry price point cnet also criticized ipad apparent lack wireless sync portable devices microsoft zune number years built-in itunes app able download internet well reviews ipad generally favorable walt mossberg wall street journal called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities ars technica said sharing files computer one least favorite parts ipad experience media also praised quantity applications well bookstore media applications contrast criticized ipad closed system mentioned ipad faces competition android-based tablets outsold ipads 2013 surpassing ipads second quarter 2013 overtaken ipad installed base lost majority web browsing android statcounter estimates south america africa asia many large countries eastern europe independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx ipad tablets still wide margin globally second used android tablets market share however differs widely regions ipad lost market share globally every year since 2012 statcounter started tracking tablets separately according statcounter statistics tracks web use gives operating system/platform share based ipad lost majority use south america android also lose majority gaining back asia africa lost wide margin android 70 ipad mostly used consumers also taken business users within 90 days release ipad managed penetrate 50 fortune 100 companies companies adopting ipads business offices distributing making available ipads employees examples uses workplace include attorneys responding clients medical professionals accessing health records patient exams managers approving employee requests survey frost sullivan shows ipad usage office workplaces linked goals increased employee productivity reduced paperwork increased revenue research firm estimates mobile-office application market north america may reach 6.85 billion 2015 estimated 1.76 billion 2010 since march 2011 us federal aviation administration faa approved ipad in-cockpit use cut paper consumption several airlines 2011 alaska airlines became first airline replace pilots paper manuals ipads weighing compared printed flight manuals hopes fewer back muscle injuries dozen airlines followed suit including united distributed ipads cockpits also many airlines offer inflight magazine downloadable application ipad ipad several uses classroom praised valuable tool homeschooling soon ipad released reported 81 top book apps children ipad also called revolutionary tool help children autism learn communicate socialize easily healthcare field ipads iphones used help hospitals manage supply chain example novation healthcare contracting services company developed vha pricelynx based mobile application platform business intelligence software vendor microstrategy business intelligence app help health care organizations manage purchasing procedures efficiently save money hospitals guillermo ramas novation states doctors wo n't walk around hospital laptop ipad perfect walk around hospital long information need 2013 gianna chien aged 14 presented 8,000 doctors heart rhythm society meeting apple ipad 2 cases interfere life-saving heart devices pacemakers magnets inside ipad user guide advised pacemaker users keep ipads least away pacemaker study 2014 found ipad 2 could cause electromagnetic interference emi implantable cardioverter defibrillators united states fans attending super bowl xlv first super bowl since ipad released could use official national football league nfl app navigate cowboys stadium 2011 tampa bay buccaneers became first nfl club discontinue use paper copies playbooks instead distributed players playbook videos electronic format via ipad 2 ipad able support many music creation applications addition itunes music playback software include sound samplers guitar voice effects processors sequencers synthesized sounds sampled loops virtual synthesizers drum machines theremin-style touch responsive instruments drum pads many gorillaz 2010 album fall created almost exclusively using ipad damon albarn tour band music video luna sea 2012 single rouge filmed entirely ipad ipad greatly increased social television use viewers use ipad convenient second networked computer second screen communicating viewers television provider viewers use web browser specialized applications discuss program viewers broadcast content providers may use second screen interact viewers real time example latter facility allows content providers conduct real-time polls collect comments program displayed text main television screen viewer interaction via second screen becoming increasingly popular | [
6788,
7514,
3940,
7890,
2555,
5732,
722,
1094,
6808,
4320,
2926,
4690,
5037,
28,
734,
2570,
6444,
5752,
6113,
405,
5405,
7189,
3648,
6119,
5062,
6125,
2954,
1123,
7572,
1496,
6479,
6482,
6847,
4003,
6142,
2609,
5786,
1895,
4373,
1897,
7... | Test |
4,576 | 4 | Martian_packet:martian packet martian packet ip packet seen public internet contains source destination address reserved special-use internet assigned numbers authority iana public internet packet either spoofed source address actually originate claimed packet delivered requirement found martian packets commonly arise ip address spoofing denial-of-service attacks also arise network equipment malfunction misconfiguration host linux terminology martian packet ip packet received kernel specific interface routing tables indicate source ip expected another interface name derived packet mars meaning packet seems earth ipv4 ipv6 martian packets source destination addresses within special-use ranges defined rfc 6890 6to4 ipv6 transition technology ipv6 address encodes originating ipv4 address every ipv4 /32 corresponding unique ipv6 /48 prefix 6to4 relays use encoded value determining end site 6to4 tunnel 6to4 addresses corresponding ipv4 martians routable never appear public internet teredo another ipv6 transition technology encodes originating ipv4 address ipv6 address however encoding format encodes teredo server address tunnel information ipv4 client address thus definable set prefixes specific 2001:0 :/32 teredo packets martian end-site addresses however possible spoof teredo packets teredo server ipv4 address set martian | [
2737,
3821,
1691,
578,
3819
] | Test |
4,577 | 5 | Port_Control_Protocol:port control protocol port control protocol pcp computer networking protocol allows hosts ipv4 ipv6 networks control incoming ipv4 ipv6 packets translated forwarded upstream router performs network address translation nat packet filtering allowing hosts create explicit port forwarding rules handling network traffic easily configured make hosts placed behind nats firewalls reachable rest internet also act network servers requirement many applications additionally explicit port forwarding rules available pcp allow hosts reduce amount generated traffic eliminating workarounds form outgoing nat keepalive messages required maintaining connections servers various nat traversal techniques tcp hole punching time less generated traffic reduces power consumption directly improving battery runtime mobile devices pcp standardized 2013 successor nat port mapping protocol nat-pmp shares similar protocol concepts packet formats environments universal plug play internet gateway device upnp igd used local network interworking function upnp igd pcp required embedded igd upnp igd-pcp iwf specified rfc6970 dhcp ipv4 ipv6 options configure hosts port control protocol pcp server ip addresses specified rfc7291 procedure follow selecting server among list pcp server discussed rfc7488 environments nat64 deployed pcp allows learn ipv6 prefix es used pcp-controlled nat64 device build ipv4-converted ipv6 addresses nat64 rfc7225 many applications network equipment deployments require network locations reachable outside local networks following originally envisioned model ip end-to-end connectivity across internet operate network servers accept connections remote clients example equipment ip camera includes network server provides remote surveillance ip networks usually network equipment deployments place devices behind routers firewalls perform nat enable sharing ipv4 address example packet filtering improved network security protection ending breaking end-to-end connectivity rendering equipment applications inaccessible rest internet making deployed equipment accessible extending server role beyond local network requires either manual configuration port forwarding network gateway usually cpe application-level workarounds initiate connections deployed equipment additional intermediate servers used merging firewall punching connections connections actual clients approaches downsides manual cpe configuration usually either inconvenient possible using additional intermediate servers increases complexity cost example online computer game acts client requires communication game server exchanging gameplay data order make possible game server provide data clients clients must made accessible server usually clients initiate connections game server open communication channels however open connections become idle subsequently closed network gateways leading necessity maintaining using form keepalive messages keepalive messages small messages sent client server create traffic communication channel therefore prevent gateway servers closing thus keeping connection alive requires constant exchange empty messages client server increases network chatter wastes network bandwidth cpu cycles decreases autonomy battery-powered devices additionally network applications example ftp require dynamic opening multiple connections involves application-level gateways algs additionally increases complexity pcp allows equipment applications create explicit mappings external ip address protocol port internal ip address protocol port explicit mappings place inbound communication reach hosts behind nat firewall either expands server roles beyond boundaries local networks makes use various services simplified less resource-consuming created mappings permanent extent known lifetime extended similar way dynamic host configuration protocol dhcp implements leases time pcp allows applications create additional mappings dynamically required reduces eliminates need alg-enabled nat devices firewalls created explicit mappings known lifetime commonly several hours need application-level keepalive messages exchanged hosts servers purpose preserving mapping result network usage power consumption reduced application-level keepalive logic longer needs implemented client server sides pcp mapping response provides application associated externally visible parameters ip address protocol port announced clients application-specific ways incoming connections established additionally pcp inform applications external ip address changed mapping already established various types nat handled pcp providing support nat64 nat66 nat44 inclusion pcp ipv4 ipv6 firewall devices also supported pcp designed used large-scale aggregation points example part carrier-grade nats inside less expensive consumer-grade devices long-term ip camera temperature sensor acting server example short-term mappings playing online computer game example supported pcp supports transport layer protocols use 16-bit port numbers example tcp udp stream control transmission protocol sctp datagram congestion control protocol dccp protocols use port numbers example resource reservation protocol rsvp encapsulating security payload esp icmp icmpv6 supported ipv4 firewall ipv6 firewall nptv6 ipv6 prefix translation functions supported one client per external ip address case nat pcp specification define mechanism dealing multi-homed networks multiple network gateways default routes nonetheless possible implement pcp networks using coordination mechanism conntrackd however different networks external ip address es given pcp mapping use one protocol requires one specific external ip address provided client network become unavailable pcp mapping would updated use external ip address network pcp standardized 2013 successor nat port mapping protocol nat-pmp sharing similar protocol concepts packet formats one design differences nat-pmp pretty much limited deployment consumer-grade devices pcp designed also support carrier-grade equipment since 2005 nat-pmp implemented various apple products nat-pmp relates internet gateway device protocol igdp standardized 2001 part universal plug play upnp specification igdp complex tailored toward manual configuration nat-pmp designed simplicity use within software applications excluding attackers capable altering network packets exchanged explicit pcp mapping created packets contain negotiation required establishing explicit mapping exchanged hosts pcp-enabled nat devices firewalls pcp considered secure long created explicit mappings exceed domain implicit mappings words implicit mappings created result way nat devices firewalls handling regular outbound client connections meaning pcp safe long new mapping possibilities introduced explicit mapping mechanism security standpoint important pcp feature mapping request option used option signifies ip address specified additionally part mapping request used internal address created explicit mapping rather following default behavior using source ip address actual mapping request packet purpose mapping requests end pcp-enabled nat device firewall granting explicit mapping privileges higher allowed implicit mappings due unknown rules imposed elsewhere specified ip address allowing way attacker steal traffic conduct denial-of-service dos attack additionally explicit pcp security mechanisms available extensions pcp protocol providing authentication access control mechanisms using authenticated integrity-protected in-band signalling channel relies extensible authentication protocol eap perform authentication devices involved pcp negotiation session pcp-enabled nat devices firewalls may still accept unauthenticated mapping requests time previously described explicit mapping constraints still apply internally pcp works exchanging control messages hosts pcp-enabled nat devices firewalls referred servers using user datagram protocol udp underlying protocol communication consists port mapping requests created hosts result responses submitted processed servers following udp nature unreliability means udp datagrams lost duplicated reordered submitting request guarantee response kind thus host requests also referred hints addition direct responses servers also generate gratuitous notifications example unicast notifications inform hosts changes external ip address exchanged messages contain means determining either transaction belong stage session represent simplified design based messages self-describing complete additional context required message successfully processed servers may decide silently ignore host requests case unable process moment cases hosts need retransmit request also hosts may safely decide silently ignore unwanted mapping responses purpose creating pcp requests ip address server either manually configured host found part host dhcp lease set host configured default gateway host request messages sent source udp port client server udp port 5351 listens unsolicited multicast server notifications server restart announcements sent server udp port 5351 udp port 5350 hosts listen maximum udp payload length pcp messages 1100 octets pcp message consists request response header containing opcode determines associated operation relevant opcode-specific information ports mapped zero options option described result codes returned part server responses result code associated lifetime tells hosts certain operations may retried repeated example result lifetimes specify long failure condition expected persist long created mapping last | [
7148,
456,
3172,
6879,
8,
2281,
6521,
1354,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
651,
7637,
5039,
5485,
4783,
2119,
6908,
3794,
2664,
7091,
2219,
3383,
3640,
3797,
5847,
2128,
2043,
3312,
2681,
2057,
3486,
3819,
3820,
3821,
7... | Train |
4,578 | 4 | Ari_Schwartz:ari schwartz ari m. schwartz former senior director cybersecurity united states national security council staff white house left role october 2015 previously director cybersecurity privacy civil liberties policy schwartz came white house serving senior advisor technology policy united states secretary commerce previously national institute standards technology served internet policy advisor working internet policy task force department commerce government service schwartz vice president chief operating officer center democracy technology cdt washington d.c. united states formerly cdt senior policy analyst subsequently center vice president coo cdt schwartz rsa conference award excellence public policy online trust alliance award excellence public policy october 2015 revealed schwartz stepped role senior director cybersecurity two-year tenure remarked always planned leave role period schwartz praised departure helping develop government cybersecurity framework voluntary guideline help companies bolster security programs honest broker industry civil society schwartz detroit michigan area holds bachelor degree sociology brandeis university | [] | Validation |
4,579 | 2 | Unique_set_size:unique set size computing unique set size uss portion main memory ram occupied process guaranteed private process unshared memory process reported uss concept used software running linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using | [
4625,
705,
8066,
578
] | Test |
4,580 | 5 | Synchronous_Data_Link_Control:synchronous data link control synchronous data link control sdlc computer communications protocol layer 2 protocol ibm systems network architecture sna sdlc supports multipoint links well error correction also runs assumption sna header present sdlc header sdlc mainly used ibm mainframe midrange systems however implementations exist many platforms many vendors use sdlc sna becoming rare mostly replaced ip-based protocols tunneled ip using anynet technologies united states sdlc found traffic control cabinets 1975 ibm developed first bit-oriented protocol sdlc work done ibm early 1970s de facto standard adopted iso high-level data link control hdlc 1979 ansi advanced data communication control procedures adccp latter standards added features asynchronous balanced mode frame sizes need multiples bit-octets also removed procedures messages test message sdlc operates independently communications link operate point-to-point multipoint loop facilities switched dedicated two-wire four-wire circuits full-duplex half-duplex operation unique characteristic sdlc ability mix half-duplex secondary stations full-duplex primary stations four-wire circuits thus reducing cost dedicated facilities intel used sdlc base protocol bitbus still popular europe fieldbus included support several controllers i8044/i8344 i80152 8044 controller still production third party vendors vendors putting hardware support sdlc slightly different hdlc communication controller chips 1980s included zilog motorola national semiconductor result wide variety equipment 1980s used common mainframe centric corporate networks norm 1980s common alternatives sna sdlc probably decnet digital data communications message protocol ddcmp burroughs network architecture bna burroughs data link control bdlc arpanet imps hdlc mostly extension sdlc features deleted renamed features present hdlc sdlc also sdlc later hdlc extensions iso/iec 13239 hdlc renamed sdlc frames hdlc names incorporated later versions sdlc features added hdlc subsequently added back later versions sdlc two u frames sdlc exist hdlc several u frames almost entirely unused hdlc existing primarily sdlc compatibility test u frame included early hdlc standards added later special mode sdlc operation supported e.g zilog scc incorporated hdlc sdlc loop mode mode primary number secondaries connected unidirectional ring network one transmit output connected next receive input secondary responsible copying frames arrive input reach rest ring eventually return primary except copying secondary operates half-duplex mode transmits protocol guarantees receive input secondary powered relay connects input directly output powering secondary waits opportune moment goes on-loop inserting data stream one-bit delay similar opportunity used go off-loop part clean shutdown sdlc loop mode frames arrive group ending final flag all-ones idle signal first seven 1-bits pattern 01111111 constitutes go-ahead sequence also called eop end poll giving secondary permission transmit secondary wishes transmit uses 1-bit delay convert final 1 bit sequence 0 bit making flag character transmits frames final flag transmits all-ones idle signal serve go-ahead next station loop group starts commands primary secondary appends responses primary receives go-ahead idle sequence knows secondaries finished may transmit commands beacon bcn response designed help locate breaks loop secondary see incoming traffic long time begins sending beacon response frames telling primary link secondary predecessor broken primary also receives copy commands sent indistinguishable responses appends special turnaround frame end commands separate responses unique sequence interpreted secondaries conventional one single all-zero byte runt frame address 0 reserved unused control field frame check sequence secondaries capable full-duplex operation also interpret shut-off sequence forcing abort transmission | [
6871,
3525,
1543,
7364,
5492,
1948,
3297,
3207,
5142,
3209,
7916,
3233,
4101,
3597,
1709
] | Test |
4,581 | 6 | File_change_log:file change log file change log tracks changes namespace files directories file system depending implementation file change log record changes creates links unlinks deletions renamed files data changes metadata changes example acls permissions file change log accessed file file system hidden accessed programmatically file change log differs file system journal log serve least two purposes first applications must scan entire file system discover changes since last scan reading file change log avoid scan scanning applications include backup utilities web crawler search engines replication programs second log serve audit record activity file system | [
3599,
2547,
7161,
4672,
3626,
6117,
6854,
5437,
80,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
4855,
7718,
200... | Test |
4,582 | 3 | Loco-Motion_(video_game):loco-motion video game loco-motion also known guttang gottong arcade puzzle game developed konami 1982 licensed centuri loco-motion player builds path unstoppable locomotive moving tracks allow pick passengers loco-motion basically updated version sliding block puzzle game player move tiles horizontally vertically within rectangular frame contains one empty square tiles sections railroad track player must use construct path locomotive never stops moving laid around edges frame several stations passengers must picked player uses joystick slide piece track vacant square use button accelerate locomotive however always motion stopped player must avoid running dead-end barricade barrier playfield edge edge empty square costs one life player moves pieces track around route locomotive take highlighted yellow dead end countdown timer occasionally appears station passengers waiting player picks countdown reaches zero remaining amount added score bonus points passengers send crazy train onto tracks player must avoid crashing countdown timer unoccupied station reaches zero station destroyed becomes pair barrier squares crazy trains crashed destroy creates new pair dead ends destroys station collision happens within higher levels special pieces track one entrance three different exits player choose exit locomotive takes picked randomly bonus points awarded time locomotive crosses one pieces track level cleared passengers pick player moves onto next level different layout bigger smaller dead ends also bonus stations appear frequently later levels one crazy trains screen outset player creates closed loop track rides several seconds loop sweeper appears moves around loop behind sweeper reaches locomotive player loses life sweepers crashed crazy trains destroy consequences extra life awarded 10,000 points bonus station points randomly determined beginning high 2,470 points locomotion ported intellivision tomy tutor meanwhile activision working game called happy trails strikingly similar gameplay happy trails released prior locomotion saw great reviews forcing intellivision release locomotion reduced price msx saw port konami name crazy train m-network also made prototype atari 2600 video game system however july 5 1983 release game cancelled unknown reasons confuzion 1985 zx spectrum commodore 64 similar design loco-motion game boy game boy color saw release game japan uk one four games part four volume set games called konami gb collection japan game released game boy super game boy features yet uk colorized translated english game boy color | [
1237
] | Test |
4,583 | 4 | Service_scan:service scan computer networks service scan identifies services running list open ports closely tied port scanning tools e.g nmap nessus support service scan preferable referring port list identify services running non-standard ports common practice service scanners work sending probe data port monitoring response example sending get probe could detect web server exact response give indication server multiple probes sent identify less common services nmap service scan captures information unidentified ports users encouraged submit details included updates almost vulnerability scanners built-in service scan results service scan used determine tests run port | [
1461,
1942,
3088,
4914
] | Test |
4,584 | 3 | Frequency_scaling:frequency scaling computer architecture frequency scaling also known frequency ramping technique increasing processor frequency enhance performance system containing processor question frequency ramping dominant force commodity processor performance increases mid-1980s roughly end 2004 effect processor frequency computer speed seen looking equation computer program runtime instructions per program total instructions executed given program cycles per instruction program-dependent architecture-dependent average value time per cycle definition inverse processor frequency increase frequency thus decreases runtime however power consumption chip given equation p power consumption c capacitance switched per clock cycle v voltage f processor frequency cycles per second increases frequency thus increase amount power used processor increasing processor power consumption led ultimately intel may 2004 cancellation tejas jayhawk processors generally cited end frequency scaling dominant computer architecture paradigm moore law still effect frequency scaling ended despite power issues transistor densities still doubling every 18 24 months end frequency scaling new transistors longer needed facilitate frequency scaling used add extra hardware additional cores facilitate parallel computing technique referred parallel scaling end frequency scaling dominant cause processor performance gains caused industry-wide shift parallel computing form multicore processors | [
7453,
6922,
7666,
3063
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.