node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,785
8
Deferred_deep_linking:deferred deep linking deferred deep linking one aspect mobile deep linking describes principle deep linking app yet installed case deep linking deferred application installed user implies clicking otherwise invoking deep link causes common use case drive installs linking functionality not-yet-installed app provides user incentive install deferred deep linking allows mobile developers mobile marketers deliver seamlessly automated user experience whether app previously installed improving conversion rates user retention currently industry standard deferred deep linking various platform providers offer differing levels support platforms real support majority option roll-your-own approach general approach provide mechanism url parameters passed around app store ie received source linking application click stored passed destination linked-to application installed launched major technical challenge solve approach identifying click caused install correct url parameters passed newly-installed app tying clicks installs family technologies known attribution
[ 4519 ]
Test
4,786
2
RSTS/E:rsts/e rsts multi-user time-sharing operating system initially developed evans griffiths hart boston acquired digital equipment corporation dec part hewlett packard pdp-11 series 16-bit minicomputers first version rsts rsts-11 version 1 implemented 1970 dec software engineers developed tss-8 time-sharing operating system pdp-8 last version rsts rsts/e version 10.1 released september 1992 rsts-11 rsts/e usually referred rsts article generally use shorter form kernel rsts programmed assembly language macro-11 compiled installed disk using cilus program running dos-11 operating system rsts booted extended version basic programming language dec called basic-plus system software cusps operating system including programs resource accounting login logout managing system written basic-plus 1970 1973 rsts ran 56k bytes magnetic core memory 64 kilobytes including memory-mapped i/o space would allow system 16 terminals maximum 17 jobs maximum program size 16k bytes end 1973 dec estimated 150 licensed systems running rsts 1973 memory management support included rsts rsts/e newer dec pdp-11/40 pdp-11/45 minicomputers pdp-11/20 supported rsts-11 introduction memory management newer pdp-11 computers meant machines able address four times amount memory 18-bit addressing 256k bytes also paved way developers separate user mode processes core kernel 1975 memory management support updated newer 22-bit addressable pdp-11/70 rsts systems could expanded use much two megabytes memory running 63 jobs rts ccl concepts introduced although compiled sysgen multi-terminal service introduced would allow single job ability control multiple terminals 128 total large-message send/receive interprocess communication became sophisticated efficient august 1,200 licensed systems 1977 installation process rsts longer dependent dos-11 rsts kernel could compiled rt-11 rts formatted kernel file rt-11 silus copied system disks computer time-sharing basic-plus rts well rt-11 rsx-11 teco third party rtss ran user mode processes independent rsts kernel systems manager could decide bootstrap phase rts run systems default kbm 3,100 licensed systems 1978 final memory management update included machines could support 22bit addressing rsts could use maximum amount memory available pdp-11 4 megabytes support also included supervisory mode made rsts first dec operating system capability decnet also supported well remote diagnostics field service technicians rdc colorado springs colorado dec subscription service end decade 5,000 licensed systems 1981 support separate instruction data space users unibus machines pdp-11/44 pdp-11/45 pdp-11/55 pdp-11/70 provided extension memory constraints individual program compiling programs use separate instruction data space would soon give program 64 kb instructions 64 kb buffering data dcl rts included well support newer revision decnet iii 1983 rsts/e v8.0-06 included support smallest 18-bit pdp-11 sold dec micropdp-11 pre-generated kernel cusps included distribution make installation micropdp-11 easier dec sold pre-generated version micropdp-11 microrsts reduced price however users needed purchase full version need generate kernel file system upgraded given designation rsts directory structure 1 rds1 previous versions rsts file system given designation rds0 newer file system designed support 1700 user accounts thought well 10,000 licensed users least equal number unlicensed users 1985 1989 rsts became mature product version 9 revisions dcl installed primary rts file system upgraded rds1.2 support new user account features passwords encrypted using modified des algorithm instead limited six 6 characters stored dec radix-50 format version 9 non-user system account project group zero designation 0,1 accounts project number 1 privileged unlike root account unix systems version 9 released additional accounts could created project zero multiple privileges could individually set account support lat protocol included well ability run newest version decnet iv network enhancements gave user connected terminal decserver ability communicate rsts machine easily could vax running vms dcl command structure dec operating systems also contributed familiar look feel another pseudo command file processor based vms features dcl command file processor fully supported integrated rsts extensive changes dcl monitor dcl executes command files part job therefore pseudo keyboard forcing commands keyboard necessary atpk 1994 dec sold pdp-11 software business mentec digital continued support pdp-11 customers short period assistance mentec staff issue ip rights digital later compaq later still hewlett packard straightforward much mis-information pervaded hobbyist user community digital mentec granted no-cost license anyone non-commercial hobby purpose use specific non-current versions several operating systems developed pdp-11 use specific pdp-11 emulator known simh emulators versions pdp software released use authorized disk images authorized operating systems may found internet along simh emulator ibm pc class computers thus possible hobbyist run rsts/e personal computer using software emulation fast faster originally ran real hardware standard complement documentation manuals accompanies rsts distribution consists least 11 large three-ring binders collectively known orange wall one small three-ring binder containing rsts/e quick reference guide paperback copy introduction basic aa-0155b-tk 11 three-ring binders contains volume 1 general information installation volume 2 system management volume 3 system usage volume 4 utilities volume 4a utilities volume 4b utilities volume 5 basic-plus volume 6 system programming volume 7 macro programming volume 7a macro programming volume 8 rms last software product description dec outlined following topics major features rsts/e version 10.1 rsts uses serial communication connection interact operator connection might local computer terminal 20 current loop interface rs-232 interface either local serial port remote connection via modem ethernet connection utilizing decnet lat many 128 terminals using multi-terminal service could connect rsts system running maximum 63 jobs depending processor used amount memory disk space system load rsts systems nowhere near many terminals users could also submit jobs run batch mode also batch program called atpk allowed users run series commands imaginary terminal pseudo-terminal semi-interactive mode similar batch commands ms-dos users connected system typing login command hello logged-out terminal pressing return actually typing command logged-out terminal simply started login program interpreted command one commands allowed used user yet logged logged associated program command chained otherwise message please say hello printed terminal prior version 9 user could also initiate 1 line login however left password screen anyone behind view examples follow one could determine status terminal command responses printed command interpreter logged-in user communicating basic-plus kbm given prompt ready user logged given prompt bye user would log supplying ppn number password user numbers consisted project number would equivalent group number unix comma programmer number numbers range 0 254 special exceptions specifying account project programmer number enclosed brackets typical user number could 10,5 project 10 programmer 5 2,146 254,31 200,220 etc user running system program logged system manager enabled ppn number 0,0 would appear systat cusp ** ** thus valid account number every project programmer number 0 usually reserved group account could referenced special symbol one user number 20,103 reference file name beginning would refer file stored account user number 20,0 feature would useful educational environments programmer number 0 could issued instructor class individuals students given accounts project number instructor could store account files marked shared project number would students class two special classes project numbers existed project number 0 generally reserved system software prior version 9 1 project 0 account named 0,1 programmers project number 1 privileged accounts equivalent single account root unix systems except account numbers 1,0 1,254 privileged accounts version 9 released account could granted specific privileges systems manager account 0,1 used store operating system file run-time library systems certain system files relating booting system author comments appear right bold dir command installed ccl equivalent run command direct program 0,1 account number directory name operating system storage account would referred project number 0 programmer number 1 numbers shown file represent size disk blocks block 512 bytes 1/2 kilobyte k c indicates file contiguous stored one file without separated pieces similar files microsoft windows system drive defragmented p indicates specially protected deleted even privileged user unless p bit cleared separate command numbers brackets like 40 represent protections file always displayed decimal protections indicate file may seen user users programmer number file read may altered another user whether file may executed ordimary user giving additional privileges protection codes similar r w x protections unix similar operating systems bsd linux code 60 equivalent private file code 63 private non-deletable file 40 public file library files kept account 1,1 usually referenced logical name lb account 1,2 system startup account much like unix system starting root contains system cusps could referenced prefixing cusp name dollar sign used account 1,3 1,4 1,5 account 1,1 also special privilege account user logged account permitted execute poke system call put values memory system thus account number 1,1 closest equivalent root unix-based systems one features rsts means execution programs environment used run various environments allowed programming basic-plus enhanced basic-plus-2 traditional programming languages cobol fortran environments separate one could start program one environment system would switch different environment running different program return user original environment started environments referred rts term command line interface rtss kbm prior version 9 systems manager needed define rts system would start one would execute compiled programs systems manager may also install special ccl commands take precedence kbm commands exception dcl ccl analogous shortcut program windows system symbolic link unix-based systems ccls installed memory-resident command either startup dynamically system running system manager i.e permanent like disk file logged user switch environments type language statements basic-plus programming language issue run commands specific programs issue special command called ccl execute program command options rsts systems managers generated kernel include control-t one line status option could tell program running rts program using much memory program taking much could expand much memory rts using programs written basic-plus ran basic rts allowed 32k bytes memory 64k total language interpreted different keyword internally converted unique byte code variables data indexed stored separately within memory space internal byte-code format known pcode interactive save command issued basic plus rts simply saved working memory area disk file .bac extension although format undocumented two electronic engineering undergraduates southampton university uk nick de smith david garrod developed decompiler could reverse engineer bac files original basic plus source complete original line numbers variable names subsequently worked dec rest memory used basic rts one wrote programs language permitted true binary executables basic-plus-2 fortran-iv macro assembler amount memory available would 56k 8k allocated rts standard basic-plus prompt ready response example starting version 9 dcl became primary startup rts even though ability execute binary programs became possible advent disappearing rsx rts see dcl incorporated recent versions dec operating systems rsx-11 rt-11 vms later openvms compatibility standard dcl prompt dollar sign example programs written rsx rts cobol macro assembler later releases basic-plus-2 could utilize maximum amount memory available binary program 56k due requirements rts needing top 8k use rsts version 7 later allowed rsx rts included kernel making completely disappear user address space thus allowing 64k bytes memory user programs programs got around limitations amount available memory using libraries permissible complicated overlay strategies calling programs chaining passing commands shared memory area called core common among practices rsx default kbm standard rsx prompt logged logged mcr monitor console routine sign example rt-11 rts emulated single job version rt-11 distribution like rsx emulation rt-11 occupied top 8k memory leaving bottom 56k cusps programs written fortran-iv macro assembler rt-11 default kbm standard rt-11 prompt logged logged sign example teco editor implemented rts maximize amount memory available editing buffer also first implemented rsts v5b release general purpose runtime systems rsx rt11 teco rts distributed rsts contain built-in kbm user would start teco like program running teco program teco.tec teco affine qedit direct ancestors first unix-based text editor ed rsts systems used ccl create file make filespec edit file teco filespec run teco program mung filespec data following program example teco could used calculate pi currently set 20 digits user typed unrecognised command system boot option prompt init.sys startup utility message type 'help help displayed user subsequently typed 'help including quotes prompt response amusing anyway ... followed actual help message one nice features system manager could compile kernel rotating display pattern gave illusion 2 snakes chasing around console lights normal kernel would give illusion 1 snake moving right left data lights across bottom system manager also compiled lights object module would see additional snake moving left right address lights across top accomplished using supervisory mode versions prior 9.0 rsx also similar display pattern would appear 2 snakes playing chicken would run center console command 'make allowed user make text file automatically enter teco text editor user typed 'make love system created file called 'love typed back 'not war kevin herbert later working dec added undocumented feature 90 allow user enter ^f see list open files user process complete blocks use file sizes beginning version 9.0 undocumented feature would allow system manager change display system date rsts became first operating system would display system date set numbers representing stardate commonly known tv series system industries bought source license rsts implement enhancement called simacs simultaneous machine access allowed special disk controller set semaphore flag disk access allowing multiple writes files rsts system disk shared multiple pdp-11 rsts systems feature implemented system industries controllers attached many dec computers designed dr. albert chu worked system industries required many changes way access disks accomplished rsts operating system fips file information processing system system handled i/o access single-threaded rsts allow disk access stall another machine active access block required fips could timeout request go next request 'come back stalled one round robin fashion code allow written philip hunt working system industries milipitas ca eventually worked digital equipment new england area late 1980s early '90s 1981 evans griffiths hart marketed ross/v product ross/v allowed user mode processes rsts cusps rtss user programs ability run unmodified vms vax-11 machines code emulation handled kernel processes would normally handled rsts kernel running pdp-11 original basic-plus language carried versions rsts subcontracted evans griffiths hart inc. fixed price 10,500 rsts applications run pdp-11 emulator information see pdp-11 rsts originally called btss name changed btss rtss product name btss marketed honeywell simple typing mistake changed name rtss rsts addition new memory management support ability install memory pdp-11/40 pdp-11/45 led another name change rsts-11 became rsts/e computer bureaus sometimes deployed user-11 rsts/e-based data management
[ 1807, 0, 4297, 4670, 5021, 13, 3271, 6804, 3276, 3626, 5041, 7546, 7550, 405, 1855, 2582, 4347, 7569, 65, 768, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 2300, 126, 6907, 4423, ...
Test
4,787
0
MBROLA:mbrola mbrola speech synthesis software worldwide collaborative project mbrola project web page provides diphone databases large number spoken languages mbrola software complete speech synthesis system languages text must first transformed phoneme prosodic information mbrola format separate software e.g espeakng necessary mbrola project started 1995 tcts lab faculté polytechnique de mons belgium scientific project obtain set speech synthesizers many languages possible first release mbrola software 1996 provided freeware non-commercial non-military application licenses created voice databases differ also mostly non-commercial non-military use due free usage non-commercial applications mbrola alternative choice private/home users de facto speech synthesis engine espeakng linux workstations mostly used commercial solutions e.g speaking time clocks boarding notifications ports terminals etc initial development voice databases updates support mbrola software ceased gradually closed-source binaries fell behind development recent hardware operating systems deal mbrola development team decided release mbrola open source software october 24 2018 source code released github gnu affero general public license january 23 2019 tool called mbrolator released provide creation mbrola database wav files license mbrola software uses mbrola multi-band resynthesis overlap add algorithm speech generation although diphone-based quality mbrola synthesis considered higher diphone synthesisers preprocesses diphones imposing constant pitch harmonic phases enhances concatenation slightly degrading segmental quality mbrola time-domain algorithm similar psola implies low computational load synthesis time unlike psola however mbrola require preliminary marking pitch periods feature made possible develop mbrola project around mbrola algorithm many speech research labs companies individuals around world provided diphone databases many languages voices notable omissions chinese
[ 3363, 2738, 4759, 5571, 2054, 150, 578, 7694, 1435, 1830 ]
Test
4,788
2
Kernel_virtual_address_space:kernel virtual address space kernel virtual address space kva virtual memory area linux kernel threads reside second part virtual address space occupied user virtual address space contain user threads
[ 578 ]
Train
4,789
9
LISP_2:lisp 2 lisp 2 programming language proposed 1960s successor lisp largely lisp-like semantics algol 60-like syntax today mostly remembered syntax fact many features beyond early lisps early lisps many limitations including limited data types slow numerics use fully parenthesized notation also considered problem inventor lisp john mccarthy expected issues addressed later version called notionally lisp 2 hence name lisp 1.5 successor earliest lisp lisp 2 joint project system development corporation information international inc. intended ibm built an/fsq-32 military computer development later shifted ibm 360/67 digital equipment corporation pdp-6 project eventually abandoned
[ 7878, 795, 1445, 556, 6087, 6981, 2734, 5734, 4704, 3880, 7481, 2600, 8025, 7032, 4543, 3749, 5883, 2439 ]
Validation
4,790
0
Affix_grammar_over_a_finite_lattice:affix grammar finite lattice linguistics affix grammars finite lattice agfl formalism notation context-free grammars finite set-valued features acceptable linguists many different schools agfl-project aims development technology natural language processing available gnu gpl
[ 5429 ]
Validation
4,791
4
Benild_Joseph:benild joseph benild joseph born 15 may 1992 indian cyber security researcher tedx speaker white hat hacker currently president information systems security association issa india chapter advisory board member cybersecurity ventures featured book hacking hacker authored roger grimes silicon india magazine listed one top 8 ethical hackers india benild joseph born wayanad kerala studied infant jesus english medium school interest technology prompted mother send computer institute later learnt programming coding penchant towards technology led hacking working ebay tesco citigroup law enforcement agencies government organizations india helping dealing cyber threats safeguarding digital assets
[]
Test
4,792
6
Block_allocation_map:block allocation map computer file systems block allocation map data structure used track disk blocks considered use blocks may also referred allocation units clusters cp/m used block allocation map directory directory entry could list 8 16 blocks depending disk format allocated file file used blocks additional directory entries would needed thus single file could multiple directory entries benefit method possibility use sparse files declaring large file size allocating blocks actually used detriment method disk may free space unallocated blocks data appended file directory entries used commodore dos used similarly named significantly different block availability map
[ 5562, 5672, 1254, 3359 ]
Test
4,793
1
ANSI-SPARC_Architecture:ansi-sparc architecture ansi-sparc architecture ansi-sparc stands american national standards institute standards planning requirements committee abstract design standard database management system dbms first proposed 1975 ansi-sparc model however never became formal standard mainstream dbms systems fully based tend exhibit full physical independence prevent direct user access conceptual level idea logical data independence widely adopted objectives three-level architecture separate user view three levels three level architecture aim enabling users access data personalised view distancing internal level external level means users need know data physically stored database level separation also allows database administrator dba change database storage structures without affecting users views three different types schema corresponding three levels ansi-sparc architecture overall description database called database schema
[ 927 ]
Test
4,794
3
PlayStation_2_homebrew:playstation 2 homebrew homebrew playstation 2 refers independent development video games consumers playstation 2 video game console sony released linux-based operating system ps2 package also includes keyboard mouse ethernet adapter hdd currently sony online store states linux kit longer sale north america however july 2005 european version still available kit boots installing proprietary interface run-time environment region-coded dvd european north america kits work ps2 respective regions europe australia ps2 came free yabasic interpreter bundled demo disc time allows simple programs created ps2 end-user included failed attempt circumvent uk tax defining console computer contained certain software port netbsd project blackrhino gnu/linux alternative debian-based distribution also available ps2 using homebrew programs e.g 'sms media player possible listen various audio file formats mp3 oma ogg vorbis aac flac ac3 watch various video formats divx/xvid mpeg1 mpeg2 mpeg4-asp avi container using console media played device connected console i.e external usb/firewire/thumb drive/hard disk drive fat32 internal hard disk early revision consoles optical cd-r w /dvd±r w disks modded systems patched disks network shares windows network ps2 host protocol homebrew programs launched directly memory card unmodified consoles using certain software takes advantage long known used exploit dealing boot part ee/iop process independence recent development may 2008 called free mcboot allows homebrew programs launched without trigger disc required older exploit also allows use homebrew unmodded systems without functional disc drive however installation exploit individual memory card requires either already exploited/modded system order launch installer boot image load app loads elf files network adapter hard drive also required copying one memory card another work newer exploit work newest ps2s scph-9000x model bios 2.30 work models prior newest versions free mcboot version 1.90 newer also ability install boot sony non-sony hdds using fat ps2 network adapter support called free hdboot fhdb minor issues possible game entirely hdd without needing use optical disc drive physical memory card homebrew programs used play patched backups original ps2 dvd games unmodified consoles install retail discs installed hard drive older models esr hd loader hd advance open ps2 loader homebrew emulators older computer gaming systems developed ps2
[ 2925, 7889, 578, 7116 ]
Validation
4,795
2
Dave_Cutler:dave cutler david neil dave cutler sr. born march 13 1942 american software engineer designer developer several operating systems computer industry operating systems microsoft windows nt digital equipment corporation rsx-11m vaxeln vms openvms cutler born lansing michigan grew dewitt michigan graduating olivet college michigan 1965 went work dupont cutler holds least 20 patents affiliate professor computer science department university washington cutler avid auto racing driver competed atlantic championship 1996 2002 scoring career best 8th milwaukee mile 2000 cutler member adelphic alpha pi fraternity olivet college michigan cutler first exposure computers came tasked perform computer simulations model one dupont customers using ibm gpss-3 language ibm model 7044 work led interest computers operating systems worked cutler left dupont pursue interest computer systems beginning digital equipment corporation 1971 worked famous mill facility maynard massachusetts april 1975 digital began hardware project code-named star design 32-bit virtual address extension pdp-11 june 1975 cutler together dick hustvedt peter lipman appointed technical project leaders software project code-named starlet develop totally new operating system star family processors two projects tightly integrated beginning three technical leaders starlet project together three technical leaders star project formed blue ribbon committee digital produced fifth design evolution programs design featured simplifications memory management process scheduling schemes earlier proposals architecture accepted star starlet projects culminated development vax-11/780 superminicomputer vax/vms operating system respectively digital began working new cpu using risc design principles 1986 cutler working dec decwest facility bellevue washington selected head prism project develop company ’ risc machine operating system code named mica embody next generation design principles compatibility layer unix vms risc machine based ecl technology one three ecl projects digital undertaking time funding research development r costs multiple ecl projects yielding products would ultimately compete strain three ecl projects vax 9000 one directly commercialized primarily early successes pmax advanced development project need differing business models prism canceled 1988 favor pmax prism later surfaced basis digital alpha family computer systems cutler known disdain things unix sardonic nature showed vms versus unix debates digital early 1980s expressed low opinion unix process input/output model reciting get byte get byte get byte byte byte tune finale rossini william tell overture cutler left digital microsoft october 1988 led development windows nt later worked targeting windows nt digital 64-bit alpha architecture based prism design windows 2000 demise windows alpha demise digital instrumental porting windows amd new 64-bit amd64 architecture officially involved windows xp pro 64-bit windows server 2003 sp1 64-bit releases moved working microsoft live platform august 2006 dave cutler awarded prestigious status senior technical fellow microsoft 2008 professional developers conference microsoft announced azure services platform cloud-based operating system microsoft developing conference keynote cutler mentioned lead developer project along amitabh srivastava spokesperson microsoft confirmed cutler longer working windows azure joined xbox team information provided cutler role working within team may 2013 microsoft announced xbox one console cutler mentioned worked development host os portion system running inside new gaming device apparently work focused creating optimized version microsoft hyper-v host os specifically designed xbox one
[ 2961, 2226, 6804, 4759, 5571, 4099, 6256, 534, 5932, 7396, 447 ]
Test
4,796
9
Maya_Embedded_Language:maya embedded language maya embedded language mel scripting language used simplify tasks autodesk 3d graphics software maya tasks achieved maya gui achieved mel well certain tasks available gui mel offers method speeding complicated repetitive tasks well allowing users redistribute specific set commands others may find useful mel syntactically similar perl tcl provides memory management dynamic array-allocation offers direct access functions specific maya majority standard maya commands default mel scripts saved maya program files directory mel fairly limited compared mainstream scripting languages mel primarily language meant journal maya session thus lacks many advanced features associative arrays python added maya alternative mel maya 8.5 still mel offers advantages python mel often criticized lack programming features object orientation practice however mel used metaprogramming language mel instructs maya node architecture solve problem since nodes form actual computational core maya using robust readily apparent programming method would inefficient approach many ways mel complements maya api somewhat clear boundaries allocated tasks makes mel harder learn fully understand tools designed using mel scripts generally come following categories example script copies selected object path maya also offers expression language super-set mel results nodes executed part maya dependency graph expressions developed maya expression editor allow scripts trigger maya evaluates scene file change time simulate complex behaviors perform useful tasks
[ 5983, 5965, 486, 4425 ]
Validation
4,797
4
BPO_security:bpo security information security emerged significant concern banks mobile phone companies businesses use call centers business process outsourcing bpo instances theft personal data reported call centers britain financial services authority examined standards india april 2005 banking code standards board audited eight india-based call centres 2006 handling million calls per month uk examinations extend africa-based call centres staffed workers indian origin bcsb report stated customer data subject level security uk high risk complex processes subject higher levels scrutiny similar activities onshore india nasscom said take breach security extremely seriously assist police probe three identifiable types illicit activities concerning fraud emanating call centers items 1 2 mostly subject police action call centres use internal procedures minimise risk mitigation measures include limited
[]
Validation
4,798
1
IBM_Informix:ibm informix ibm informix product family within ibm information management division centered several relational database management system rdbms offerings informix products originally developed informix corporation whose informix software subsidiary acquired ibm 2001 april 2017 ibm hcl technologies products platforms division agreed long-term 15-year partnership co-develop support market product ibm continued active development marketing key informix products current version 12.10 forms basis several product editions variation capacity functionality informix database used many high transaction rate oltp applications retail finance energy utilities manufacturing transportation sectors recently server enhanced support data warehouse workloads informix server supports object-relational model permitted ibm offer extensions support data types part sql standard widely used time series spatial extensions provide data type support language extensions permit high performance domain specific queries efficient storage datasets based time series spatial data current version ibm informix 12.10 code-named centaurus development major enhancements made previous releases adding built-in index compression integration json collections support mongodb json drivers server enhancement permitting database objects partitioned across multiple servers cluster grid aka sharding queries optionally return data locally connected server instance entire grid sql heterogeneous clusters fully supported several deployment options available including provide high levels data redundancy fault tolerance feature marketed ibm informix flexible grid informix offered number editions including free developer editions editions small mid-sized business editions supporting complete feature set designed used support largest enterprise applications also advanced data warehouse edition informix version includes informix warehouse accelerator uses combination newer technologies including in-memory data tokenization deep compression columnar database technology provide extreme high performance business intelligence data warehouse style queries informix timeseries unique feature database system allows efficient fast manipulation time series data generated devices smart electric meters found financial trading systems time stamped stock 'ticks type data well suited storage use normal sql supported style data organization unique among ibm database products apple mac environment supported informix since version 11.7 ibm several database products capabilities overlap areas informix often compared ibm major database product db2 offered mainframe zseries platform well unix linux speculation ibm would combine informix db2 database products proven unfounded ibm instead continued expand variety database products offers netezza data warehouse appliance cloudant nosql database ibm described approach market providing workload optimized systems informix generally considered optimized environments low database administration including use embedded database long track record supporting high transaction rates providing uptime characteristics needed mission critical applications manufacturing lines reservation systems informix widely deployed retail sector low administration overhead makes useful in-store deployments ability deeply embed informix gateways routers timeseries support small footprint low administration requirements informix also targeted internet-of-things solutions many data-handling requirements handled gateways embed informix connect sensors devices internet april 2017 ibm announced outsourcing development informix indian specialists hcl number ibm employees working informix would also move hcl part arrangement ibm continue market sell informix customers addition products based version 12.1 engine ibm informix family also includes number legacy database products still supported market include informix online informix standard edition se informix c-isam products simpler smaller footprint database engines also frequently embedded third party applications collectively products often referred informix classics ibm informix family also includes client-side development environment client-sdk supports number different environments including .net windows developers variety protocols unix linux environments ibm long-term plans informix db2 databases sharing technology although ibm continually denied fusion two products ibm training includes complete set core data servers training courses apply informix courses delve many essential informix concepts fundamentals advanced sql topics part ibm academic initiative ibm offering informix software documentation training higher education institutions worldwide new informix campus program ibm offering inclusive package informix materials college faculty called informix box offers hands-on labs powerpoints use lessons recorded training teachers dvds class material vmware virtual appliance images well t-shirts students users groups remain active belgium croatia france germany united states many countries iiug international informix users group acts federation user groups provides numerous services members
[ 1073, 1449, 2911, 3268, 3951, 1466, 6445, 6817, 3975, 6462, 3307, 7205, 6130, 7213, 1891, 4739, 4743, 784, 4747, 2265, 4028, 5810, 7248, 3005, 3011, 4408, 6184, 3371, 6543, 4798, 2674, 8012, 5866, 517, 7303, 4454, 4457, 6586, 8045, 3757, ...
Test
4,799
3
MIPS_Magnum:mips magnum mips magnum line computer workstations designed mips computer systems inc. based mips series risc microprocessors first magnum released march 1990 production various models continued 1993 sgi bought mips technologies sgi cancelled mips magnum line promote workstations including entry-level sgi indy early r3000-based magnum series ran risc/os variant bsd unix subsequent magnum workstations based jazz architecture ran risc/os windows nt addition proprietary operating systems linux netbsd ported jazz-based mips magnum machines models mips magnum rebadged sold groupe bull olivetti addition headless i.e. without framebuffer video card versions marketed servers name mips millennium model number information mips magnum 3000 25 33 mhz mips r3000a microprocessor mips magnum r4000 pc-50 mips r4000pc processor 16 kb l1 cache l2 cache running external clock rate 50 mhz internally doubled microprocessor 100 mhz mips magnum r4000 sc-50 identical magnum r4000pc includes one megabyte secondary cache addition primary cache main memory mips magnum 3000 accepted 30-pin true-parity 80ns simms maximum 128 mb mips magnum r4000 accepted eight 72-pin true-parity simms maximum 256 mb mips magnum r4000 r4000 pc-50 r4000 sc-50 includes single on-board scsi bus using on-board ncr 53c94 fast-narrow scsi chipset internal cable four 50-pin connections links internal scsi devices also interfaces external scsi devices via endlink mounted rear case mips magnum r4000 includes on-board sonic ethernet chipset aui ethernet connector mounted case video output magnum r4000 consists proprietary framebuffer available custom full-length option card — g364 framebuffer g364 includes sun 13w3-style output converted common vga pin-out capable pixel screen resolutions 640x480 800x600 1024x768 1280x1024 simple framebuffer g364 include accelerated graphics functions mips magnum r4000 also includes two standard rs232-capable serial ports ibm at-compatible parallel port also mips magnum r4000 ibm at-compatible floppy disk controller single floppy drive bay mips magnum 3000 used mips r3000 processor custom proprietary motherboard incorporated turbochannel bus noted dec also manufactured decstation line workstations running ultrix also used mips processors turbochannel bus magnum 3000 ran risc/os mips computer systems inc. proprietary port bsd unix including system v features later magnums mips magnum r4000pc mips magnum r4000sc also used mips microprocessor — mips r4000 full 64-bit microprocessor available either low-cost version r4000pc 16 kb l1 cache l2 cache higher-performance version r4000sc 1 mb secondary cache addition 16 kb primary cache mips computer systems inc. co-founded advanced computing environment consortium silicon graphics microsoft motorola others mips magnum r4000 intended mips entry windows nt workstation market however mips computer systems inc. in-house effort design mips-based windows nt system met delays mips technologies abandoned in-house efforts instead licensed jazz design microsoft developed early 1990s facilitate porting development windows nt noted windows nt first developed mips architecture later ported intel 386 alpha powerpc architectures mips magnum r4000 indeed jazz-based systems acer pica nec riscstation olivetti m700 etc incorporated many features common intel-based pc commercial unix workstations era — example magnum r4000 included eisa bus used ibm ps/2-compatible keyboards mice used commodity chipset components whose control registers mapped memory locations set forth ibm standard mips magnum r4000 ran either windows nt beginning version 3.1 equipped little-endian arc firmware risc/os mips computer systems inc. proprietary big-endian firmware mips monitor installed firmware could switched arc mips monitor loading either one magnum flash memory/nvram floppy disk thus magnum r4000 could dual-boot windows unix mips magnum r4000 supported windows nt version 3.1 released 1993 version 4.0 released 1996 however support microsoft mips systems ended release windows nt version 4.0 useful software windows/mips — either microsoft third-party vendors — scarce even mips supported example microsoft never ported microsoft office suite mips mips magnum 3000 unlike mips magnum r4000 able run windows nt magnums could run risc/os mips computer system inc. proprietary port unix running risc/os mips magnum r4000 requires use big-endian mips monitor firmware mips magnum run netbsd also ran openbsd one point lack developer interest proper resources lead termination arch support prior december 1 1998 2.4 release earlier risc/os-only mips magnum 3000 machines correct port netbsd/mipsco later windows nt-capable mips magnum r4000 correct port netbsd/arc mips magnum r4000 among earliest supported machines effort port linux kernel mips initial support begun april 1995 support magnum r4000 became stable 2.1 development tree around 1999 however support magnum linux atrophied since qemu pc emulator version 0.9.1 emulate mips magnum acer pica 61 using -m parameter -m magnum -m pica61 qemu run mips compiled version debian gnu/linux x86 platform along windows nt 3.5,3.51 4.0 binaries
[ 6256, 1727, 1452, 4859, 5301, 2118, 3970, 578, 5055, 7010, 2226, 6922, 4816, 2699, 4368, 4370, 7499, 4099, 7697 ]
Validation
4,800
7
Utility_computing:utility computing utility computing computer utility service provisioning model service provider makes computing resources infrastructure management available customer needed charges specific usage rather flat rate like types on-demand computing grid computing utility model seeks maximize efficient use resources and/or minimize associated costs utility packaging system resources computation storage services metered service model advantage low initial cost acquire computer resources instead resources essentially rented repackaging computing services became foundation shift demand computing software service cloud computing models propagated idea computing application network service initial skepticism significant shift however new model computing caught eventually became mainstream ibm hp microsoft early leaders new field utility computing business units researchers working architecture payment development challenges new computing model google amazon others started take lead 2008 established utility services computing storage applications utility computing support grid computing characteristic large computations sudden peaks demand supported via large number computers utility computing usually envisioned form virtualization amount storage computing power available considerably larger single time-sharing computer multiple servers used back end make possible might dedicated computer cluster specifically built purpose rented even under-utilized supercomputer technique running single calculation multiple computers known distributed computing term grid computing often used describe particular form distributed computing supporting nodes geographically distributed cross administrative domains provide utility computing services company bundle resources members public sale might paid portion revenue clients one model common among volunteer computing applications central server dispense tasks participating nodes behest approved end-users commercial case paying customers another model sometimes called virtual organization vo decentralized organizations buying selling computing resources needed go idle definition utility computing sometimes extended specialized tasks web services utility computing merely means pay use regards computing power utility computing new concept rather quite long history among earliest references ibm mainframe providers conducted kind business following two decades often referred time-sharing offering computing power database storage banks large organizations worldwide data centers facilitate business model mainframe operating systems evolved include process control facilities security user metering advent mini computers changed business model making computers affordable almost companies intel amd increased power pc architecture servers new generation processor data centers became filled thousands servers late 90 utility computing re-surfaced insynq inc. launched on-demand applications desktop hosting services 1997 using hp equipment 1998 hp set utility computing division mountain view ca assigning former bell labs computer scientists begin work computing power plant incorporating multiple utilities form software stack services ip billing-on-tap marketed hp introduced utility data center 2001 sun announced sun cloud service consumers 2000 december 2005 alexa launched alexa web search platform web search building tool underlying power utility computing alexa charges users storage utilization etc space market specific industries applications well niche applications powered utility computing example polyserve inc. offers clustered file system based commodity server storage hardware creates highly available utility computing environments mission-critical applications including oracle microsoft sql server databases well workload optimized solutions specifically tuned bulk storage high-performance computing vertical industries financial services seismic processing content serving database utility file serving utility enable organizations independently add servers storage needed retask workloads different hardware maintain environment without disruption spring 2006 3tera announced applogic service later summer amazon launched amazon ec2 elastic compute cloud services allow operation general purpose computing applications based xen virtualization software commonly used operating system virtual computers linux though windows solaris supported common uses include web application saas image rendering processing also general-purpose business applications decision support business intelligence 8th edition page 680
[ 1624, 370, 2185, 374, 4484, 1923, 108, 6986, 4159, 1023, 2414, 330, 6130, 7114, 518, 2961 ]
Test
4,801
5
Shared_medium:shared medium telecommunication shared medium medium channel information transfer serves one user time channels function correctly one user transmitting channel access method always effect circuit switching user typically gets fixed share channel capacity multiplexing scheme divides capacity medium common multiplexing schemes include time-division multiplexing frequency-division multiplexing channel access methods circuit switching include time-division multiple access frequency-division multiple access etc packet switching sharing dynamic — user takes little none capacity idle utilize entire capacity transmitting users idle channel access methods packet switching include carrier sense multiple access token passing etc
[ 1974, 1976, 3892, 7824, 2117, 1988 ]
Test
4,802
3
Silicon_Graphics_International:silicon graphics international silicon graphics international corp. sgi formerly rackable systems inc. american manufacturer computer hardware software including high-performance computing solutions x86-based servers datacenter deployment visualization products founded rackable systems 1999 adopted sgi name 2009 acquiring silicon graphics inc.. november 1 2016 hewlett packard enterprise completed acquisition sgi 275 million rackable systems inc. went public june 2005 6.25 million shares offered 12 per share 2006 rackable announced signed agreement acquire terrascale technologies inc. april 1 2009 rackable announced agreement acquire silicon graphics inc. 25 million purchase ultimately 42.5 million finalized may 11 2009 time rackable announced adoption sgi global name brand following week company changed nasdaq stock ticker symbol rack sgi new sgi began two main product lines servers storage continuing original rackable systems servers storage visualization professional services acquired silicon graphics inc. time acquisition completion sgi said anticipated survival majority two companies product lines although consolidation likely areas high overlap products 2010 sgi announced purchase assets assumed limited amount liabilities copan systems copan provider storage archive products real-time access long-term persistent data copan products offered part sgi storage line 2011 sgi acquired outstanding shares sgi japan ltd year company announced acquisition opencfd ltd december company announced mark j. barrenechea resignation president chief executive officer member board directors mark reported join open text corporation shortly thereafter announced barrenechea agreed continue serve sgi board february 2012 announced jorge luis titinger would become sgi president chief executive officer 2013 sgi acquired filetek inc. august 11 2016 announced hewlett packard enterprise would acquire sgi 7.75 per share cash transaction valued approximately 275 million net cash debt deal completed november 1 2016
[ 6332, 4121, 5104, 3849, 3692, 7990, 5055, 7010, 1023, 6922, 3567, 156, 2961, 4362, 5695, 689, 1134, 3155, 352, 970, 787 ]
Validation
4,803
3
ET-188:et-188 et-188 ibm pc xt compatible computer made yugoslav company novkabel novosadska fabrika kabela novi sad cable factory novi sad serbia 1980s novkabel already experience developing computer systems era 20 era 60 others used make et-188 original design compatible ibm pc xt save space lower cost et-188 used 8mhz intel 80188 cpu integrated timer dma interrupt controller also made faster original xt et-188 offered public 1985 advertised yugoslav computer press improved et-188a model may 1986 presented public belgrade technical fair beogradski sajam tehnike ram new redesigned case among things et-188a used education classrooms throughout vojvodina province
[ 6693, 1052, 7423, 6380, 5347, 7225 ]
Train
4,804
5
JREAP:jreap joint range extension applications protocol jreap enables tactical data messages transmitted long-distance networks e.g satellite links thereby extending range tactical data links tdls jreap documented u.s. military standard mil-std 3011 nato standardization agreement stanag 5518 interoperability standard joint range extension applications protocol jreap jreap developed due need communicate data long distances without degradation message format content jreap takes message format originally formatted changes protocol message transmitted beyond line-of sight media jreap protocol message structure transmission reception pre-formatted messages communications media messages designed jreap provides foundation joint range extension jre link 16 tactical data links overcome line-of-sight limitations radio terminals joint tactical information distribution system jtids multifunctional information distribution system mids extends coverage data links use long-haul media
[ 3821, 7637, 5166, 6786, 2981 ]
Validation
4,805
4
Slide_attack:slide attack slide attack form cryptanalysis designed deal prevailing idea even weak ciphers become strong increasing number rounds ward differential attack slide attack works way make number rounds cipher irrelevant rather looking data-randomizing aspects block cipher slide attack works analyzing key schedule exploiting weaknesses break cipher common one keys repeating cyclic manner attack first described david wagner alex biryukov bruce schneier first suggested term slide attack used 1999 paper describing attack requirements slide attack work cipher broken multiple rounds identical f function probably means cyclic key schedule f function must vulnerable known-plaintext attack slide attack closely related related-key attack idea slide attack roots paper published edna grossman bryant tuckerman ibm technical report 1977 grossman tuckerman demonstrated attack weak block cipher named new data seal nds attack relied fact cipher identical subkeys round cipher cyclic key schedule cycle one key makes early version slide attack summary report including description nds block cipher attack given cipher systems beker piper 1982 first introduce notation section assume cipher takes n bit blocks key-schedule using formula_1 keys length slide attack works breaking cipher identical permutation functions f f function may consist one round cipher defined key-schedule example cipher uses alternating key schedule switches formula_2 formula_3 round f function would consist two rounds formula_4 appear least f next step collect formula_5 plaintext-ciphertext pairs depending characteristics cipher fewer may suffice birthday paradox formula_5 needed pairs denoted formula_7 used find slid pair denoted formula_8 slid pair property formula_9 formula_10 slid pair identified cipher broken vulnerability known-plaintext attacks key easily extracted pairing slid pair thought happens message one application function f ’ slid ’ one encryption round attack gets name process finding slid pair somewhat different cipher follows basic scheme one uses fact relatively easy extract key one iteration f choose pair plaintext-ciphertext pairs formula_8 check see keys corresponding formula_9 formula_10 keys match slid pair otherwise move next pair formula_5 plaintext-ciphertext pairs one slid pair expected along small number false-positives depending structure cipher false positives eliminated using keys different message-ciphertext pair see encryption correct probability wrong key correctly encipher two messages low good cipher sometimes structure cipher greatly reduces number plaintext-ciphertext pairs needed thus also large amount work clearest examples feistel cipher using cyclic key schedule reason given formula_15 search formula_16 reduces possible paired messages formula_17 formula_5 since half message fixed formula_19 plaintext-ciphertext pairs needed order find slid pair
[ 1811, 4930, 464, 807, 1353, 2918, 907, 3100, 119, 6015, 6016, 7548, 1283, 6637, 1480, 6372, 6647, 7200, 5765, 5327, 6657, 7928, 1587, 762, 5333, 6763, 6049, 161, 433, 1320, 613, 1146, 4917 ]
Test
4,806
2
Highly_Available_STorage:highly available storage highly available storage hast protocol tool set freebsd written pawel jakub dawidek core freebsd developer hast provides block device synchronized two servers use filesystem two machines comprise cluster machine cluster node hast uses primary-secondary master-slave configuration one cluster node active time hast-provided devices appear like disk devices /dev/hast/ directory freebsd used like standard block devices hast similar raid1 mirror raid component provided across network one cluster node
[ 1341, 191, 6711, 1356, 1547, 7355, 5571, 8194, 8096, 1193, 7267, 3636, 4059, 8001, 5760, 5065, 594, 4441, 6477, 4534, 5250, 1315, 689, 6402, 2161, 4910, 6860, 1703, 875, 1435, 6505 ]
Test
4,807
3
Slipstream_(computer_science):slipstream computer science slipstream processor architecture designed reduce length running program removing non-essential instructions form speculative computing non-essential instructions include things results written memory compare operations always return true also statistically branch instructions taken makes sense assume always case speculation involved slipstream processors generally described two parallel executing streams one optimized faster a-stream executing reduced code slower r-stream runs behind a-stream executes full code r-stream runs faster single stream due data prefetched a-stream effectively hiding memory latency due a-stream assistance branch prediction two streams complete faster single stream would 2005 theoretical studies shown configuration lead speedup around 20 main problem approach accuracy a-stream becomes accurate less speculative overall system runs slower furthermore large enough distance needed a-stream r-stream cache misses generated a-stream slow r-stream
[ 6148 ]
Test
4,808
4
Pod_slurping:pod slurping pod slurping act using portable data storage device ipod digital audio player illicitly download large quantities confidential data directly plugging computer data held may inside firewall work development fixes problem including number third-party security products allow companies set security policies related usb device use features within operating systems allow administrators users disable usb port altogether unix-based unix-like systems easily prevent users mounting storage devices microsoft released instructions preventing users installing usb mass storage devices operating systems additional measures include physical obstruction usb ports measures ranging simple filling ports epoxy resin commercial solutions deposit lockable plug port following external links act indirect mechanism learning topic e.g. detailed descriptions examples implementations
[ 3260, 5571, 8092 ]
Test
4,809
3
Sokoban_(video_game):sokoban video game version game includes 50 levels 1988 sokoban published us spectrum holobyte commodore 64 ibm-pc apple ii series soko-ban sokoban hit japan sold 400,000 units country time spectrum holobyte imported united states 1988 review computer gaming world praised spectrum holobyte soko-ban pure simple playable mentally challenging citing addictive qualities also reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 4½ 5 stars
[ 4023, 6380 ]
Test
4,810
2
X86_memory_segmentation:x86 memory segmentation x86 memory segmentation refers implementation memory segmentation intel x86 computer instruction set architecture segmentation introduced intel 8086 1978 way allow programs address 64 kb 65,536 bytes memory intel 80286 introduced second version segmentation 1982 added support virtual memory memory protection point original model renamed real mode new version named protected mode x86-64 architecture introduced 2003 largely dropped support segmentation 64-bit mode real protected modes system uses 16-bit segment registers derive actual memory address real mode registers cs ds ss es point currently used program code segment cs current data segment ds current stack segment ss one extra segment determined programmer es intel 80386 introduced 1985 adds two additional segment registers fs gs specific uses defined hardware way segment registers used differs two modes choice segment normally defaulted processor according function executed instructions always fetched code segment stack push pop data reference referring stack uses stack segment references data use data segment extra segment default destination string operations example movs cmps fs gs hardware-assigned uses instruction format allows optional segment prefix byte used override default segment selected instructions desired real mode v86 mode size segment range 1 byte 65,536 bytes using 16-bit offsets 16-bit segment selector segment register interpreted significant 16 bits linear 20-bit address called segment address remaining four least significant bits zeros segment address always added 16-bit offset instruction yield linear address physical address mode instance segmented address 06efh:1234h suffix h means hexadecimal segment selector 06efh representing segment address 06ef0h offset added yielding linear address 06ef0h 1234h 08124h way segment address offset added single linear address mapped 2 4096 distinct segment offset pairs example linear address 08124h segmented addresses 06efh:1234h 0812h:0004h 0000h:8124h etc could confusing programmers accustomed unique addressing schemes also used advantage example addressing multiple nested data structures real mode segments always 64 kb long practical effect segment longer 64 kb rather every segment must 64 kb long protection privilege limitation real mode even segment could defined smaller 64 kb would still entirely programs coordinate keep within bounds segments program always access memory since arbitrarily set segment selectors change segment addresses absolutely supervision therefore real mode well imagined variable length segment range 1 65,536 bytes enforced cpu effective 20-bit address space real mode limits addressable memory 2 bytes 1,048,576 bytes 1 mb derived directly hardware design intel 8086 subsequently closely related 8088 exactly 20 address pins packaged 40-pin dip packages even 20 address lines address data buses multiplexed fit address data lines within limited pin count segment begins multiple 16 bytes called paragraph beginning linear flat address space 16 byte intervals since segments 64 kb long explains overlap occur segments location linear memory address space accessed many segment offset pairs actual location beginning segment linear address space calculated segment×16 segment value 0ch 12 would give linear address c0h 192 linear address space address offset added number 0ch:0fh 12:15 would c0h+0fh=cfh 192+15=207 cfh 207 linear address address translations carried segmentation unit cpu last segment ffffh 65535 begins linear address ffff0h 1048560 16 bytes end 20 bit address space thus access offset 65,536 bytes 65,520 65536−16 bytes past end 20 bit 8088 address space 8088 address accesses wrapped around beginning address space 65535:16 would access address 0 65533:1000 would access address 952 linear address space programmers using feature led gate a20 compatibility issues later cpu generations linear address space expanded past 20 bits 16-bit real mode enabling applications make use multiple memory segments order access memory available one 64k-segment quite complex viewed necessary evil smallest tools could less memory root problem appropriate address-arithmetic instructions suitable flat addressing entire memory range available flat addressing possible applying multiple instructions however leads slower programs memory model concept derives setup segment registers example tiny model cs=ds=ss program code data stack contained within single 64 kb segment small memory model ds=ss data stack reside segment cs points different code segment 64 kb 80286 protected mode extends processor address space 2 bytes 16 megabytes adjusting shift value instead 16-bit segment registers contain index table segment descriptors containing 24-bit base addresses offset added support old software processor starts real mode mode uses segmented addressing model 8086 small difference though resulting physical address longer truncated 20 bits real mode pointers 8086 pointers refer addresses 100000 10ffef roughly 64-kilobyte region memory known high memory area hma later versions ms-dos could use increase available conventional memory i.e within first mb addition hma total address space approximately 1.06 mb though 80286 truncate real-mode addresses 20 bits system containing 80286 hardware external processor gating 21st address line a20 line ibm pc provided hardware full backward compatibility software original ibm pc pc/xt models subsequent at-class pc clones well 286 protected mode seldom used would excluded large body users 8086/88 machines moreover still necessitated dividing memory 64k segments like done real mode limitation worked around 32-bit cpus permit use memory pointers greater 64k size however segment limit field 24-bit long maximum segment size created 16mb although paging used allocate memory individual segment may exceed 16mb method commonly used windows 3.x applications produce flat memory space although os still 16-bit api calls could made 32-bit instructions thus still necessary place code performs api calls 64k segments 286 protected mode invoked could exited except performing hardware reset machines following rising ibm pc/at standard could feign reset cpu via standardised keyboard controller significantly sluggish windows 3.x worked around problems intentionally triggering triple fault interrupt-handling mechanisms cpu would cause cpu drop back real mode nearly instantly logical address consists 16-bit segment selector supplying 13+1 address bits 16-bit offset segment selector must located one segment registers selector consists 2-bit requested privilege level rpl 1-bit table indicator ti 13-bit index attempting address translation given logical address processor reads 64-bit segment descriptor structure either global descriptor table ti=0 local descriptor table ti=1 performs privilege check cpl current privilege level found lower 2 bits cs register rpl requested privilege level segment selector dpl descriptor privilege level segment found descriptor privilege levels integers range 0–3 lowest number corresponds highest privilege inequality false processor generates general protection gp fault otherwise address translation continues processor takes 32-bit 16-bit offset compares segment limit specified segment descriptor larger gp fault generated otherwise processor adds 24-bit segment base specified descriptor offset creating linear physical address privilege check done segment register loaded segment descriptors cached hidden parts segment registers intel 80386 later protected mode retains segmentation mechanism 80286 protected mode paging unit added second layer address translation segmentation unit physical bus also importantly address offsets 32-bit instead 16-bit segment base segment descriptor also 32-bit instead 24-bit general operation segmentation unit otherwise unchanged paging unit may enabled disabled disabled operation 80286 paging unit enabled addresses segment virtual addresses rather physical addresses 80286 segment starting address offset final 32-bit address segmentation unit derived adding two virtual logical addresses paging unit enabled segmentation unit generates validates 32-bit virtual addresses enabled paging unit finally translates virtual addresses physical addresses physical addresses 32-bit 386 larger newer processors support physical address extension 80386 also introduced two new general-purpose data segment registers fs gs original set four segment registers cs ds es ss 386 cpu put back real mode clearing bit cr0 control register however privileged operation order enforce security robustness way comparison 286 could returned real mode forcing processor reset e.g triple fault using external hardware x86-64 architecture use segmentation long mode 64-bit mode four segment registers cs ss ds es forced 0 limit 2 segment registers fs gs still nonzero base address allows operating systems use segments special purposes unlike global descriptor table mechanism used legacy modes base address segments stored model-specific register x86-64 architecture provides special swapgs instruction allows swapping kernel mode user mode base addresses instance microsoft windows x86-64 uses gs segment point thread environment block small data structure thread contains information exception handling thread-local variables per-thread state similarly linux kernel uses gs segment store per-cpu data x64 cpu powers real mode indistinguishable 32-bit pentium 4 64-bit instructions used unless long mode set long mode operating 16-bit instructions virtual x86 mode disabled protected mode disappears gs/fs also used gcc thread-local storage canary-based stack protector logical addresses explicitly specified x86 assembly language e.g syntax intel syntax mov dword fs eax 42 however segment registers usually used implicitly segmentation turned x86-32 processors true 64-bit mode well beyond scope discussion many 32-bit operating systems simulate flat memory model setting segments bases 0 order make segmentation neutral programs instance linux kernel sets 4 general purpose segments since base set 0 cases limit 4 gib segmentation unit affect addresses program issues arrive paging unit course refers 80386 later processors earlier x86 processors paging unit current linux also uses gs point thread-local storage segments defined either code data system segments additional permission bits present make segments read read/write execute etc protected mode code may always modify segment registers except cs code segment selector current privilege level cpl processor stored lower 2 bits cs register ways raise processor privilege level reload cs lcall far call int interrupt instructions similarly ways lower privilege level reload cs lret far return iret interrupt return instructions real mode code may also modify cs register making far jump using undocumented codice_1 instruction 8086 8088 course real mode privilege levels programs absolute unchecked access memory cpu instructions information segmentation see ia-32 manuals freely available amd intel websites
[ 1616, 1339, 4843, 6969, 4759, 3515, 8066, 3442, 2827, 4397, 379, 2736, 1363, 4597, 4779, 572, 310, 1855, 1019, 1857, 4611, 1208, 4347, 6380, 3565, 3566, 5413, 5245, 56, 3905, 858, 4729, 5962, 5784, 3747, 1325, 352, 2617, 1992, 4651, 492...
Test
4,811
2
Windows_Activation_Services:windows activation services windows process activation service also known process activation mechanism introduced within internet information services v7.0 windows activation service builds existing internet information services v6.0 powerful provides support protocols besides http tcp named pipes windows activation service extends asp.net http hosting concept asmx web services standalone windows component windows activation service completely separated iis hosting environment provides protocol-agnostic activation mechanism limited http windows activation service allows developers choose appropriate protocol needs http data transfer relies asp.net http protocols tcp named pipes windows activation service leverages extensibility points asp.net transferring data capabilities implemented form protocol handlers manage communication worker process windows service two types protocol handlers loaded activates worker process instance process protocol handler pph app domain protocol handler adph
[ 1571, 7637, 4759, 5571, 3135, 3383, 5475 ]
Test
4,812
9
Circular_dependency:circular dependency software engineering circular dependency relation two modules either directly indirectly depend function properly modules also known mutually recursive circular dependencies natural many domain models certain objects domain depend however software design circular dependencies larger software modules considered anti-pattern negative effects however circular cyclic dependencies found widespread among source files real-world software mutually recursive modules however somewhat common functional programming inductive recursive definitions often encouraged circular dependencies cause many unwanted effects software programs problematic software design point view tight coupling mutually dependent modules reduces makes impossible separate re-use single module circular dependencies cause domino effect small local change one module spreads modules unwanted global effects program errors compile errors circular dependencies also result infinite recursions unexpected failures circular dependencies may also cause memory leaks preventing certain primitive automatic garbage collectors use reference counting deallocating unused objects large software designs software engineers may lose context inadvertently introduce circular dependencies tools analyze software find unwanted circular dependencies circular dependencies often introduced inexperienced programmers need implement kind callback functionality experienced programmers avoid unnecessary circular dependencies applying design patterns like observer pattern implementation circular dependencies c/c++ bit tricky structure class definition must placed usage file circular dependency classes b thus require definition placed b definition b placed course impossible forward declaration therefore needed accomplish following example illustrates done note although name e.g codice_1 declared multiple times forward declarations defined one definition rule following another example forward declaration might useful application needs self-sustaining array objects able add remove objects run-time static variables first last defined declaration reserve memory space note static variables change object object stay given class also initialized 0 null know start
[ 1616, 5983, 2043, 1699, 1408 ]
Test
4,813
3
Alcazar:_The_Forgotten_Fortress:alcazar forgotten fortress alcazar forgotten fortress dungeon action-adventure game similar dungeon master legend zelda released 1985 coleco adam computer accessory also port colecovision created tom loughry activision graphics keri janssen longaway game also ported commodore 64 later plot alcazar get main castle alcazar going multiple enemy castles retrieve stolen crown game starts world map contains 22 castles player main goal move character various castles ultimately arrive main castle fortress right side map castle multiple rooms traps floors map routes change every time new game started game four difficulty levels beginner intermediate advanced expert various items may also obtained game pistol used attacking hook used cross gaps also map bottom left corner help prevent lost castle dungeons also many traps enemies present player either fight evade player incurs much damage lose life losing lives ends game though extra lives may also obtained well game continues adam version game supports saving game one earliest adventure games demo mode shows demonstration game play wait title screen 30 seconds game go mode ahoy praised alcazar beautifully written theme song stated graphics insufficiently detailed magazine concluded game enticing blend mental physical stimulation ... electronic passport hours entertainment
[]
Validation
4,814
4
Port_knocking:port knocking computer networking port knocking method externally opening ports firewall generating connection attempt set prespecified closed ports correct sequence connection attempts received firewall rules dynamically modified allow host sent connection attempts connect specific port variant called single packet authorization exists single knock needed consisting encrypted packet primary purpose port knocking prevent attacker scanning system potentially exploitable services port scan unless attacker sends correct knock sequence protected ports appear closed port knocking usually implemented configuring daemon watch firewall log file connection attempts certain points modify firewall configuration accordingly also performed kernel level using kernel-level packet filter iptables userspace process examining packets higher level using packet capture interfaces pcap allowing use already open tcp ports used within knock sequence port knock similar secret handshake consist number tcp udp even sometimes icmp protocol packets numbered ports destination machine complexity knock anything simple ordered list e.g tcp port 1000 tcp port 2000 udp port 3000 complex time-dependent source-ip-based other-factor-based encrypted hash portknock daemon firewall machine listens packets certain ports either via firewall log packet capture client user would carry extra utility could simple netcat modified ping program complicated full hash-generator use attempted connect machine usual way portknocks stateful systems first part knock received successfully incorrect second part would allow remote user continue indeed would give remote user clue far sequence failed usually indication failure end knock sequence port expected open opened packets sent remote user time technique securing access remote network daemons widely adopted security community actively used many rootkits even year 2000 defeating port knocking protection requires large-scale brute force attacks order discover even simple sequences anonymous brute force attack three-knock tcp sequence e.g port 1000 2000 3000 would require attacker test every three port combination 1–65535 range scan port attacks uncover changes port access target system since port knocking definition stateful requested port would open correct three-port number sequence received correct order without receiving intervening packets source average case scenario requires approximately 141 trillion 65535 2 packets determine correct three-port number technique combination knock attempt-limiting longer complex sequences cryptographic hashes makes successful port access attempts extremely difficult successful port knock sequence supplied open port firewall rules generally open port ip address supplied correct knock adding dynamic functionality firewall behaviour instead using preconfigured static ip whitelist firewall authorised user situated anywhere world would able open necessary port without assistance server administrator system could also configured allow authenticated user manually close port session close automatically using timeout mechanism establish new session remote user would required reauthenticate using correct sequence stateful behaviour port knocking allows several users different source ip addresses varying levels port knock authentication simultaneously allowing legitimate user correct knock sequence firewall firewall middle port attack multiple ip addresses assuming bandwidth firewall completely consumed attacking ip address ports firewall still appear closed using cryptographic hashes inside port knock sequence defends packet sniffing source target machines preventing discovery port knock sequence using information create traffic replay attacks repeat prior port knock sequences port knocking used part defense depth strategy even attacker successfully gain port access port security mechanisms still place along assigned service authentication mechanisms opened ports implementation technique straightforward using bare minimum shell script server windows batch file command line utility client overhead server client terms traffic cpu memory consumption minimal port knock daemons complex code type vulnerability within code obvious auditable port knock system implemented ports ssh sidesteps issue brute force password attacks logins case ssh ssh daemon activated without correct port knock attack filtered tcp/ip stack rather using ssh authentication resources attacker daemon inaccessible correct port knock supplied port knocking flexible customisable system add-in administrator chooses link knock sequence activity running shell script changes implementing additional firewall rules open ports specific ip addresses easily incorporated script simultaneous sessions easily accommodated addition mitigating brute force password attacks inevitable growth logs associated process daemon port knocking also protects protocol vulnerability exploits exploit discovered could compromise daemon default configuration using port knocking listening port reduces possibility compromise software process updated authorized users would continue served provide correct knock sequence random access attempts would ignored port knocking viewed part overall network defense strategy providing protection random targeted attacks complete standalone solution network security professionals largely ignored port knocking solution past since early implementations relied solely providing correct port combinations achieve access modern port knock systems incorporate features secure cryptographic hashes blacklists whitelists dynamic attack responses increase system capability port knocking effective means maximizing server resources internet facing networks properly implemented port knocking lower overall security system effective measure provides additional layer security minimal server resource overhead worst systems port knocking introduce new security issues poor implementation expose ambivalent administration attitudes situations risk compensation port knocking totally dependent robustness port knocking daemon failure daemon deny port access users usability security perspective undesirable single point failure modern port knocking implementations mitigate issue providing process-monitoring daemon restart failed stalled port knocking daemon process systems use cryptographic hashes vulnerable ip address spoofing attacks attacks form denial service use port knocking functionality lock known ip addresses e.g administrator management stations sending packets spoofed ip address random ports servers using static addressing especially vulnerable types denials service addresses well known port knocking problematic networks exhibiting high latency port knocking depends packets arriving correct sequence access designed functionality tcp/ip hand designed function assembling order packets coherent message situations solution client continue resending correct sequence packets periodic basis sequence acknowledged server port knocking used sole authentication mechanism server security perspective simple port knocking relies security obscurity unintended publication knock sequence infers compromise devices supporting sequence furthermore unencrypted port knocking vulnerable packet sniffing network trace suitable length detect correct knock sequence single ip address thus provide mechanism unauthorised access server extension attached network compromised log files device source valid knock sequences revealing another point failure solutions treating knock sequence one-time password defeat aim simplified administration practice port knocking must combined forms authentication vulnerable replay man-in-the-middle attacks whole system effective
[ 8, 3085, 7246, 3775, 651, 7637, 2566, 6823, 5847, 6461, 7282, 2774, 7214, 1691, 1237, 3426 ]
Test
4,815
3
Broadway_(microprocessor):broadway microprocessor broadway codename 32-bit central processing unit cpu used nintendo wii video game console designed ibm initially produced using 90nm soi process later produced 65nm soi process according ibm processor consumes 20 less power predecessor 180 nm gekko used nintendo gamecube video game console broadway produced ibm 300 mm semiconductor development manufacturing facility east fishkill new york bond assembly test operation broadway module performed ibm facility bromont quebec official details released public nintendo ibm unofficial reports claim derived 486 mhz gekko architecture used gamecube runs 50 faster 729 mhz powerpc 750cl released 2006 stock cpu offered ibm virtually identical broadway difference 750cl came variants ranging 400 mhz 1000 mhz
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 4847, 2458, 3440, 463, 1083, 7531, 4408, 2925, 912, 5652, 728, 3286, 7361, 2845, 3708, 5665, 4702, 1199, 1386, 1388, 7099, 1864, 234, 2501, 239, 6474, 8125, 1131, 6226, 608, 7499, 1237, 2257, 31...
Train
4,816
3
NEC_RISCstation:nec riscstation nec riscstation line computer workstations made nec mid-1990s based mips risc microprocessors designed run microsoft windows nt series nearly identical machines also sold nec headless i.e. video card framebuffer configuration riscserver series intended use windows nt workgroup servers riscstations based modified jazz architecture licensed mips computer systems inc. originally designed microsoft although architecturally similar contemporaneous intel 80386-based personal computers including example pci bus riscstations faster pentium-based workstations time although based jazz design riscstations use g364 framebuffer instead using s3 968-based video card 3dlabs glint-based adapter pci slot riscstations used standard ibm at-style tower minitower case motherboard also met form factor standard pci peripherals video card peripheral expansion several operating systems supported riscstations like jazz-based mips computers mips magnum riscstations ran arc console firmware boot windows nt little-endian mode mips iii architecture capable either little-endian big-endian operation however microsoft stopped supporting mips architecture windows nt version 4.0 riscstations ceased production 1996 addition windows nt nec ported version unix system v riscstation although support lacking linux/mips riscstation series supported netbsd netbsd/arc supported openbsd prior termination port 1998 riscstation line included march 1995 dual-cpu configuration riscstation 2000 priced 14,000 came equipped two 150 mhz mips r4400 cpus 64 mb ram 1 gb scsi hard drive 3x cd-rom drive 17-inch nec-brand crt monitor
[ 5055, 4799, 2699, 4370, 6256, 2118, 1727, 3970, 578, 6170, 4859 ]
Test
4,817
5
Diameter_Credit-Control_Application:diameter credit-control application diameter credit-control application networking protocol diameter application used implement real-time credit-control variety end user services ietf standard first defined rfc 4006 updated rfc 8506 purpose diameter credit control application provide framework real-time charging primarily meant communication gateways/control-points back-end account/balance systems typically online charging system application specifies methods diameter credit control application specify type units bought/used items charged left service context specified separately semantics examples units used/bought examples items charged diameter credit control also specifies handle fairly complex issue multiple unit types used/charged single user balance instance user may pay online time download bytes single account balance session-based credit control process uses several interrogations may include first intermediate last interrogation interrogation money reserved user account session-based charging typically used scenarios charged units continuously consumed e.g charging bytes upload/download event-based credit control process uses events charging mechanism event-based charging typically used units continuously consumed e.g user sending mms order support credit control via diameter two diameter messages ccr credit control request cca credit control answer command code ccr/cca 272 defined rfc 4006 quota management client sends ccr server requesting units reporting consumption server grants units charges user simple debit/credit client sends ccr asking server credit/debit user account price inquiries client ask server price unit server responds price message flows general driven control-point asking units server granting message may also generated diameter applications nasreq rfc4005 sessions time/usage-limited following diagram shows simplified message flow session using quota grants client starts requesting 10 units server server verifies user/subscriber enough balance example server grants client units requested subscriber insufficient balance could granted less units rejected completely subscriber session used granted units client sends update server telling many units used many would like granted time client allowed request units previous grant completely used order avoid suspending subscriber session talking server example client sends request 7 units 10 previously granted units used ask 10 units server grants server use used-units count debiting subscriber balance granting units indicate used used-units avp contains actual usage also possible server tell client long grant valid case client expected send update grant timer expires many update messages session finally subscriber ended session client sends termination message server containing last used-units server use termination message clear related reservations made back-end balance management system subscriber terminate session instead depleted balance server would responded earlier reject update message possibly telling client/control-point redirect traffic normally makes sense http/wap traffic new command codes cca ccr may require avps indicated bold avps new dcca table uses following symbols
[ 4101, 6045 ]
Validation
4,818
4
FADO:fado fado stands false authentic documents online european image-archiving system set help combat illegal immigration organised crime established joint action council european union enacted 1998 proliferation genuine false documents means frequent updating essential ever sophisticated techniques used produce genuine documents forgeries computerised system restricted access therefore built enables fast secure information exchange general secretariat council european union document experts european union member states iceland norway switzerland database established fado joint acts includes following data fado currently available document experts 31 fado partner states member states european union eu iceland norway switzerland part information shared document experts classified restricted system fado made publicly available via public register authentic documents online prado website managed council european union document descriptions fado available 24 official languages european union documents introduced document experts languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated later specialised linguists general secretariat council
[]
Validation
4,819
2
The_Settlers_IV:settlers iv settlers iv released settlers fourth edition north america real-time strategy video game city-building elements developed blue byte published ubi soft released germany microsoft windows february 2001 united kingdom march north america august fourth game settlers series following settlers 1993 settlers ii 1996 settlers iii 1998 august blue byte released expansion settlers iv mission cd featuring new single-player campaign missions new maps single-player multiplayer modes random map generator map editor gameplay improvements bug fixes december released second expansion settlers iv trojans elixir power containing new single-player campaigns additional single multiplayer maps improved graphics additional gameplay tweaks march 2002 settlers iv gold edition released containing original game expansions plus fan-made maps multiplayer mode two minigames november 2009 gameloft ported original game ios title settlers although featuring updated graphics utilising touch controls gameplay game mechanics storyline identical original april 2010 settlers released webos specifically optimised palm pre gameloft later released hd versions ipad bada symbian android 2013 gold edition released gog.com 2018 game re-released settlers iv history edition game single-player campaign player controls three races romans vikings mayans initially fight one another joining forces combat much greater threat posed exiled god morbus banished earth instigating failed rebellion great god unable bear touching foliage morbus leads mysterious dark tribe sets attempting erase natural greenery planet surface trojans elixir power takes place many centuries later war dark tribe faded memory three victorious civilisations returned fighting one another however morbus proves threat attempting permanently cure allergy greenery creating powerful elixir falls trojans unite others stand dark tribe acting feedback fans felt settlers iii focused combat designers aimed return core supply demand-based gameplay first two titles series result game designed strike balance economic planning military conquest although basic gameplay remains relatively unchanged settlers iii game mechanics altered example first time series offensive strength player military tied economic value settlement player access rank soldier beginning mission ability select rank every soldier prior recruitment game single-player campaign focuses race defeated solely military means specialty units squad leaders added enhance tactical aspects combat warships also made available allowing combat sea settlers iv received mixed reviews critics feeling similar settlers iii many opining blue byte failed steer gameplay away over-reliance combat although graphics animations generally praised ai mission variety limited combat strategy criticised reviews comparing game unfavourably titles age empires ii handheld version received positive reviews lauded replicating original game portable device successfully adapting controls touchscreen common criticism concerned lack free play multiplayer modes settlers iv real-time strategy game city-building elements controlled via point click interface general gameplay game mechanics similar settlers iii primary goal maps build settlement functioning economy producing sufficient military and/or specialist units conquer rival territories achieve end player must engage economic micromanagement construct buildings generate resources game played one two modes single-player multiplayer single-player mode player play either campaign missions individual non-campaign games free maps campaign mode player must complete series missions goal defeat computer controlled opponent opponents gaining possession territory case dark tribe destroying temple using gardeners original release game three separate campaigns three missions one campaign romans vikings mayans fourth campaign twelve missions player controls three races fight dark tribe mission cd expansion added three additional campaigns five missions race plus three settlement missions three conflict missions trojans elixir power expansion added three campaigns four missions original three races four settlement missions new campaign twelve missions player controls trojans dark tribe free maps multiplayer mode played via lan online player chooses map play refines game various ways adjusting number computer controlled opponents amount raw materials available start game and/or victory conditions player also select type game played choosing conflict mode player/race competes one another ranking list players receive points end game ranking blue byte online league table cooperation mode players combine forces achieve predetermined objective computer controlled races economic mode winner player produce goods least four seven categories within time limit settlefest players compete separate identical single-player maps first reach given objective free settle mode one player/race whether playing single-player multiplayer mode game begins way player small settlement set amount raw materials tools predetermined number settlers basic gameplay revolves around serfs titular settlers transport materials tools produce populate perform requisite task building settlers iii new settlers acquired construction residences point player directly control normal settler instead general orders issued ordering construction building ai handling delegation orders specific settlers however player control specialist settlers four types pioneers extend player territory digging border thieves scout enemy territory steal resources geologists test mountainous ground raw materials gardeners reclaim terrain corrupted dark tribe playing multiplayer game player also access fifth specialist unit saboteur attack destroy enemy buildings military installations settlers iii players construct road network instead settlers walk freely around player territory ai handling pathfinding like previous games series settlers iv adjustable goods priority system determines order items transported players also build marketplaces allow establishment trade routes areas geographical region shipyards allow manufacture warships ferries transport specialist settlers soldiers war machines trade ships transport items landing dock different geographical region original game player controlled three races romans vikings mayans trojans elixir power added trojans fourth race settlers iii race slightly different economic model example romans trojans construction industries require roughly equal amounts wood stone vikings wood stone mayans stone wood race also specific skills example romans produce manna using two buildings vikings build war machines warships use manna rather physical ammunition mayans utilise desert terrain grow agave plants necessary production tequila economy player control throughout game adjustable multiple ways example player control distribution goods selecting percentage given resource transported given building similar manner player select tools made tool production important insofar buildings require raw materials worker right tool example player built mine building still empty despite presence idle settlers pickaxe need manufactured toolsmith game also uses notification system alerts player building occupied either due lack right tool absence available settlers settlers iii game features magic whereby race call upon deities economic and/or military assistance player manna priests finite access number spells nature depends race spells include limited tuning fish stone turning enemy soldiers allies romans turning stone iron temporarily freezing enemies vikings turning wood gold turning enemy bowmen butterflies mayans turning sulphur iron turning enemy soldiers normal settlers trojans player territory expanded using pioneers building military complex near territory border complex must least one soldier garrisoned territory expand recruit soldiers player must build barracks individual soldier requiring requisite weapon transition settler soldier player also build lookout towers manned regular settlers see great distances n't grant new territory three classes soldier common races swordsmen bowmen squad leaders level swordsmen bowmen set player prior recruitment types soldier three ranks determined amount gold necessary recruitment gold level 1 one gold bar level 2 two gold bars level 3 squad leaders available one rank require sword suit armour three gold bars recruit well stronger health level 3 swordsman also affect troops around improving formations increasing combat strategy enhancing abilities additionally player assigns squad leader group soldiers orders need issued squad leader squad automatically follow destination ordered player race also produce warships war machines catapults romans magical lightning generators vikings canons mayans ballistae trojans special military units medics romans axe warriors vikings blowgun warriors mayans backpack catapultists trojans swordmen bowmen special military units three levels recruitment order player attack enemy building must click near building soldiers selected player units defeat soldiers stationed building occupy player territory increasing according building radius defense player military buildings automatic enemies attack soldiers stationed building defend nearby soldiers also defend building unless ordered soldiers fighting within territory strength always 100 fighting outside strength tied economic value settlement especial importance improving strength one army eyecatchers decorative monuments worth double construction value relation player military strength game begins shortly failure rebellion instigated dark god morbus great god treachery banishes morbus earth morbus hated place universe due vast amounts greenery unable bear touching foliage morbus determines destroy earth plant life dark gardener eventually develops substance known shadow-weed sucks energy land killing nearby foliage transforming terrain blackened wasteland dark lands meanwhile unaware presence morbus war raging three races recently come contact one another romans vikings mayans first encounter dark lands romans whose scouts return word effects shadow-weed initially believe new mayan weapon result romans attack destroy nearby mayan colony quickly realise dark lands mayans mayans also encountered dark lands suggest temporary alliance romans reluctantly agree however begin investigate dark lands mayans turn elsewhere vikings also encounter effects shadow-weed discover one sacred burial grounds surrounded dark lands setting reclaim territory attacked army mindless soldiers nearby romans learn secret dark army created human settlers converted shamans servants morbus thus forming dark tribe put work mushroom farms converting mushroom spores manna transported nearest dark temple used create dark army clearer understanding dark tribe romans ally vikings determine destroy farms however mayans see alliance romans vikings direct threat attacking colonies belonging realise alliance focused attacking combating dark tribe time however find surrounded dark lands despite previous animosity romans vikings save mayans three unite going offensive effort wipe dark tribe eventually vikings locate believe final dark temple destroy remnants dark tribe survive rally final battle secure knowledge one victory required mayans launch attack prove victorious dark tribe temples farms eradicated way breeding new troops morbus retreats lair begging mercy morbus horrified see vines infesting building quickly wrapping around turning stone trojans elixir power begins many centuries events main game morbus remains petrified state territory controlled trojans unaware races morbus identity war dark tribe story begins morbus assistant q'nqüra spreads shadow-weed around statue releasing trojans discover statue gone effects shadow-weed spreading elect abandon area landing new island encounter friendly romans hostile mayans allying romans trojans tell disappearance morbus statue romans tell history war call meeting four races shocked however learn dark tribe using aerial vehicles dubbed manacopters easily infiltrate lines inflict huge losses romans vikings mayans attacked trojans tasked destroying dark tribe research lab manacopter blueprints raid lab however discover morbus plan dark gardeners attempting create elixir cure inability touch greenery using complex combination herbs one herb final breakthrough four races divide land sectors search final herb shortly thereafter vikings locate priests begin harvest dark tribe soon arrive trojans develop poison use herb vikings unable harvest time viking priest ambushed killed dark tribe acquire herb however remains unclear priest able use poison death meanwhile morbus temple located trojans lead assault succeed destroying morbus able create drink elixir emerging ruins temple see greenery surrounding laughs declares nothing stop game cuts time later site temple stands small cottage garden full blooming flowers morbus emerges cottage happily attends garden fully cured hatred foliage settlers iv announced blue byte ects august 1999 however volker wertich created settlers series designed programmed original settlers settlers iii would involved development later explained blue byte wanted ready release christmas 2000 opinion sufficient time create worthy title game first shown e3 event may 2000 blue byte stated gameplay would emphasise economic planning military conquest citing negative feedback fans felt settlers iii combat-orientated designers intended new game return core supply demand-based gameplay settlers settlers ii also revealed game would feature three playable races romans vikings mayans new non-playable race dark tribe speaking importance dark tribe economic-based gameplay project manager co-designer hans-jürgen brändle explained interview gameszone brändle stated made sure balance settling combat virtually every rule change new feature addressing game would feature nearly identical economic processes settlers iii despite refocused gameplay explained majority feedback gave us clear understanding economy settlers simply great game artificially inflated new goods people fun ease playing overwhelmed unnecessarily complex contexts speaking ign later year brändle reiterated designers hopes game would fully integrate economic-based settling combat previous title three races game brändle explained developers chose romans traditional settlers race vikings fan-requested race mayans needed race used stone wood construction industry developers felt mayans somewhat historically mysterious culture gameszone interview brändle also addressed issue similarity graphics new game settlers iii explaining deliberately programmed engine much like previous one wanted make fans feel like back familiar world settlers settlers iii buildings game created using 3d studio max adobe photoshop used create textures race assigned specific artist worked nothing except buildings particular race according lead artist/co-designer/co-writer torsten hess done style buildings within people uniform however certain overriding rules individual artists adhere one important technique hess employed settlers iii textures applied dirtied create lived-in real-world sense hess explains rigid straight edges avoided beautiful curves moving lines instead used suggest life settlers world textures means stronger colours slightly higher contrast figures well lot detail use many different colour families definitely want avoid sterile look also draw textures hand settlers designers also used basic techniques developed settlers iii figures could n't graphically complex since small details would lost given size 32 pixels height however time designs detailed enough seem least somewhat realistic even small size solve problem settlers proportions exaggerated weapons tools designed proportionally big correctly sized implements would far small seen process animating settlers character animator/co-writer thorsten wallner explains place skeleton behind settler controls movement sequences skeleton dictates standard movements bending running standing additional animations added individual characters technology need animate every settler anew add additional animations july 2000 blue byte advertised 5,000 participants online closed beta however beta postponed early august due technical issues related lobby software causing disruption battle isle andosia war late august blue byte revealed would least mid-september beta began october blue byte released smack thief minigame designed promote main game variation whac-a-mole smack thief player must click viking thieves raid roman stores escape available free download blue byte website game allowed players upload high scores global high score table early november online beta cancelled blue byte stating decided take step concentrate completing game conducting large public beta test requires lot additional resources want invest specifically development quality assurance instead ensured internal testing department interview planet games brändle explained resources filter sort anticipated feedback beta test currently concentrating exclusively completion product following week blue byte announced slated december release pushed back january 2001 thomas hertzler blue byte ceo series producer explaining know many gamers particularly looking forward settlers iv year course understand settlers fans disappointed end however made decision players mind settlers iv shelves christmas fans receive game corresponds blue byte high quality standard january german release date pushed back february 15 february 6 ubi soft announced acquisition blue byte revealing plans publish game internationally president ceo yves guillemot stating february 15 game released germany planned however suffered numerous bugs leading negative reaction fans criticism game blue byte german gaming press although blue byte issued patch day game released introduced additional problems leading negative press second patch released four days later correct problems introduced first patch according german magazine pc games 76 players experienced technical difficulties release version game co-designer thorsten mutschall later admitted ready release february held back additional playtesting programming march 19 ubi soft announced game would released throughout europe end month explaining reasons behind unfortunate delay product essentially quality assurance issues november 2009 working conjunction blue byte license ubisoft gameloft ported game ios released title settlers april 2010 game ported webos specifically optimised use palm pre september gameloft released hd versions ipad bada optimised wave s8500 settlers hd later released symbian january 2011 android may although handheld versions game feature updated graphics gameplay game mechanics identical original storyline including full twenty-one single-player missions original release three roman missions three viking missions three mayan missions twelve mission dark tribe campaign main change game involves hud redesigned accommodate touchscreen controls example rather building menu always present onscreen accessed pressing icon opens build menu within menu player access various submenus basic buildings food buildings military buildings similarly access menu control specialist settlers player touches another icon available player settlers available pressing icon two seconds brings brief help screen icon pausing game allows player access full help menu replacing extended tool tips appeared on-screen original settlers iv received mixed average reviews aggregate score 74 100 metacritic based five reviews 71 gamerankings based seventeen reviews ios version received positively aggregate score 79 gamerankings based six reviews pc player damian knaus scored original game 85 100 giving gold player award although impressed dark tribe criticised integration gardeners gameplay calling unnecessary extravagance also critical lack real innovations absence female settlers however despite reservations felt game best settlers title thus far especially impressed graphics pc games rüdiger steidle scored 77 lowest score magazine ever given settlers title issue review appeared editorial justifying score text box within review titled 77 magazine stated review steidle criticised game similarity settlers iii writing blue byte altered concept although praised graphics tutorials variety mission objectives critical bugs writing typical blue byte fashion game appeared time first patch concluded anyone like fan series disappointed pc gamer jim preston scored 72 although praised economic system game built criticised lack variety within writing 're forced create entire supporting infrastructure settlement way every time also referred gameplay complication masquerading depth ign dan adams scored 7 10 comparing unfavourably biggest criticism concerned lack differentiation settlers iii writing aside improved graphics small additions hard tell really new game also critical ai pathfinding repetitive missions felt designers failed steer gameplay away over-reliance combat although praised graphics animations game great personality concluded blue byte n't managed find new ideas might keep series becoming serious pool stagnant gaming quickly becoming gamespy bernard dy scored 67 100 comparing unfavourably age empires ii like adams felt similar settlers iii although praised appealing graphics fascinating animations felt blue byte failed return gameplay economic focus writing nearly every scenario race build military also criticised ai lack combat strategy mission variety however praise free settle multiplayer modes concluded settlers fourth edition charming moments long surpassed games better character superior combat gamespot ron dulin scored 6.4 10 finding similar problems adams dy comparing unfavourably impressions games city building series finding similar settlers iii felt blue byte failed move away reliance combat also criticised mission variety lack combat strategy writing never complex moving units slowly enemy territory hoping 'll left opponent n't although praised basic supply demand-based gameplay graphics concluded settlers fourth edition really old game old problems computer gaming world mark asher scored 3 5 criticising scenarios differ minor ways arguing best part game free settler mode although praised graphics called game pleasant enough experience noted offered major differences previous settlers titles would interest existing fanbase opined may getting bored formula game commercial success 2001 highest selling german-developed game february 2002 awarded platinum award verband der unterhaltungssoftware deutschland e.v vud award given titles costing dm55 sell 200,000 units nationally within first twelve months release august 2002 game sold 300,000 units germany appspy andrew nesvadba scored ios version 5 5 praising graphics touchscreen controls writing settlers everything great strategy games easy enough jump muck around progressing ultimately complex amazingly detailed set interactions players learn arron hirst 148apps scored 4 5 although critical lack free play multiplayer modes praised controls replication original game mechanics concluding game immersive addicting toucharcade also scored 4 5 criticising lack free play praising graphics sound effects calling game solid experience pocket gamer tracy erickson scored 8 10 giving silver award calling surprisingly good largely positive although critical lack free play multiplayer modes felt playing area oftentimes cluttered icons menus concluded praising deep economic strategy gameplay pocket gamer wayne turton scored bada version settlers hd 7 10 giving bronze award praising tutorials controls graphics however critical absence non-campaign missions multiplayer mode combat system writing victory usually comes side field units concluded magical quality settlers hd draws depth keep playing symbian ewan spence scored symbian version 76 although critical ai feeling screen becomes cluttered especially combat concluded hits required marks game like pocket gamer brendan caldwell scored android version 8 10 giving silver award calling almost resounding victory although critical tutorials felt n't adequately explain intricacies game controls argued n't quite accuracy speed truly emulate traditional mouse keyboard setup concluded depth often enjoyed android titles settlers hd enthralling game game first expansion settlers iv mission cd released germany august 2001 featuring three five-mission single-player campaigns three settlement missions focusing building player settlement achieving economic goals opposed military conquest three conflict missions focusing combat sixteen new maps single-player mode eighteen new maps multiplayer mode terms gameplay mission cd features improved ai varied mission objectives sophisticated scripting within missions higher difficulty single-player games expansion also features random map generator map editor numerous bug fixes stabilisations blue byte released second expansion settlers iv trojans elixir power december featuring thirteen new maps single-player mode thirteen new maps multiplayer mode three new four-mission single-player campaigns original three races four settlement missions new twelve-mission campaign player controls new race trojans expansion also features improved graphics adjustable difficulty random map generator map editor included mission cd terms gameplay importance eyecatchers modified whereas original game player could increase offensive strength beyond 100 building enough eyectachers building large numbers single eyectacher trojans elixir power maximum offensive strength achievable 100 reached player builds least one every eyecatcher released march 2002 settlers iv gold edition contains original game mission cd trojans elixir power also features fan-made maps multiplayer mode smack thief minigame new minigame dark side microsoft windows wallpapers settlers -themed skins winamp icq 2013 gold edition released gog.com blue byte later released two german-language expansions november 2002 released die siedler iv die neue welt set shortly vikings discover america game begins mayans organising feast vikings travelling europe aim taking possession wonders world beginning colossus rhodes vikings meanwhile discover map amongst mayans possessions leading mythological island inhabited women promptly set find trojans expelled troy romans searching new homeland head west time romans attempting reconquer world beginning newly discovered continent expansion features four five-mission single-player campaigns one three original races one trojans multiple objectives many optional economic-based rather military-based also two new single-player maps three new multiplayer maps enhanced graphics textures november 2003 released die siedler iv community pack expansion features four fan-created single-player campaigns based real historical conflicts roman attack carthage third punic war viking invasion england huaxtec resistance spanish conquistadors battle troad wars diadochi november 2018 ubisoft re-released game standalone history edition part settlers history collection optimised windows 10 re-release contains original game mission cd trojans elixir power die neue welt community pack expansions features autosave 4k monitor support dual monitor support adjustable resolutions texture quality vsync online multiplayer available uplay history collection also includes re-releases settlers settlers ii settlers iii
[ 7030, 4575, 4759 ]
Test
4,820
2
IPhone_5S:iphone 5s iphone 5s stylized marketed iphone 5s smartphone designed marketed apple inc seventh generation iphone succeeding iphone 5 device unveiled september 10 2013 apple cupertino headquarters released september 20 2013 along lower-cost counterpart iphone 5c iphone 5s maintains almost external design predecessor iphone 5 although 5s received new white/gold color scheme addition white/silver space gray/black 5s vastly upgraded internal hardware however introduced a7 64-bit dual-core system-on-chip first 64-bit processor used smartphone accompanied m7 motion co-processor redesigned home button touch id fingerprint recognition system used unlock phone authenticate app store itunes store purchases also introduced camera also updated larger aperture dual-led flash optimized different color temperatures iphone 5s originally shipped ios 7 introduced revamped visual appearance among new features designed jony ive ios 7 departed skeuomorphic elements used previous versions ios favor flat colorful design among new software features introduced iphone 5s airdrop ad-hoc wi-fi sharing platform control center control panel containing number commonly used functions itunes radio internet radio service earphones known earpods included 5s apple released accessories including case dock reception towards device generally positive outlets considering best smartphone available market due upgraded hardware touch id changes introduced ios 7 criticized iphone 5s keeping design small display iphone 5 others expressed security concerns touch id system nine million units iphone 5s iphone 5c sold weekend release breaking apple sales record iphones iphone 5s best selling phone major u.s. carriers september 2013 iphone 5s succeeded apple flagship smartphone larger iphone 6 september 2014 march 21 2016 5s received direct replacement announcement iphone se incorporated internal hardware similar iphone 6s retaining smaller form factor design 5s iphone 5s iphone supported six major versions ios second ios device support six major updates first ipad 2 supported ios 4 9 official unveiling media speculation primarily centered reports next iphone would include fingerprint scanner including apple july 2012 acquisition authentec developer mobile security products references fingerprint sensor home button beta release ios 7 leaked packaging iphone 5s showing traditional home button metallic ring around similar ring-based imagery seen official invitation apple iphone press event september 2013 new device unveiled shortly official unveiling wall street journal also reported rumor apple announced iphone 5c iphone 5s media event cupertino headquarters september 10 2013 iphone 5c became available preorder september 13 2013 iphone 5s available preorder devices released september 20 2013 promotion focused touch id 64-bit apple a7 processor also highlight event schiller showed demos infinity blade iii demonstrate a7 processing power device camera using untouched photographs release ios 7 september 18 2013 also announced keynote iphone 5s released september 20 2013 united states united kingdom canada china france germany australia japan hong kong singapore released 25 additional countries october 25 2013 12 countries november 1 2013 indonesia last country receive iphone 5s january 26 2014 september 19 2014 iphone 5s succeeded apple flagship smartphone iphone 6 iphone 6 plus older model remained available purchase reduced price 64gb version discontinued gold edition iphone 5s discontinued september 9 2015 apple revealed iphone 6s iphone 6s plus iphone 5s discontinued march 21 2016 succeeded iphone se continues form factor features vastly upgraded internals similar flagship iphone 6s break apple product positioning trend north america western europe starting iphone 4s released october 2011 gave newly released model one year flagship phone moving midrange second year production third final year entry-level offering discontinuation iphone 5s expected continue sale september 2016 replacing a7 processor early meant apple reduced long-term chip support window year ios addition new iphone launch meant stimulate demand sales iphone 6s 6s plus met expectations since september 2015 release iphone family expected suffer first ever negative growth quarter 2016 iphone 5s maintains similar design iphone 5 lcd multi-touch retina display screen resolution 640×1136 326 ppi home button updated new flat design using laser-cut sapphire cover surrounded metallic ring button longer concave contain familiar squircle icon seen previous models phone thick weighs phone uses aluminum composite frame device available three color finishes space gray replacing black slate trim iphone 5 white silver trim white gold trim iphone 5s first iphone available gold color decision influenced fact gold seen popular sign luxury product among chinese customers iphone 5s powered apple a7 system-on-chip first 64-bit processor ever used smartphone device operating system pre-loaded software optimized run 64-bit mode promising increased performance although third-party app developers would need optimize apps take advantage enhanced capabilities a7 processor designed apple manufactured samsung a7 processor accompanied m7 motion co-processor dedicated processor processing motion data iphone accelerometer gyroscopes without requiring attention main processor integrates ios 7 new coremotion apis a7 soc m7 motion co-processor also found ipad air ipad mini 2 released quarter iphone 5s phone includes 1560 mah battery provides 10 hours talk time 250 hours standby time camera still 8 megapixels resolution image capture size 3264 × 2448 4:3 lens larger aperture 2.2 larger sized pixels image sensor previous iphone models flashlight dual true tone flashes consisting amber led white led variably used based color temperature photo improve color balancing camera also includes automatic image stabilization dynamic tone mapping 10 fps burst mode best shot mode slow motion video 120 fps home button iphone 5s incorporates fingerprint recognition system known touch id based technology authentec company apple acquired 2012 sensor uses capacitive cmos-based sensor detect sub-epidermal layers fingers 500 pixels per inch uses 360-degree design read print angle sensor activated touch-sensitive metallic ring surrounding button touch id used various authentication activities within operating system unlocking device authenticating app store itunes purchases instead apple id password sensor trained recognize fingerprints multiple fingers multiple users fingerprint data stored encrypted format within secure enclave a7 chip accessible apps servers including icloud iphone 5s camera paired double led flash allowing higher quality nighttime photos included ios 7 new camera app allowing iphone 5s capture fast continuous shots record slow-motion videos earphones known apple earpods included iphone 5s according technology commentators design earphones aimed improve sound quality allowing air travel freely apple states design earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although earphones sounded better predecessor reviewers felt quality sound produced poor techradar opined earpods inferior earphones similar price iphone 5s initially supplied ios 7 released september 20 2013 jonathan ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x yosemite version 10.10 noticeably departs skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colorful design ios 7 adds airdrop ad-hoc wi-fi sharing platform users share files iphone 5 onwards ipod touch 5th generation ipad 4th generation onwards ipad mini 1st generation onwards operating system also adds control center control panel accessed swiping bottom screen control center contains number commonly used functions volume brightness controls along toggles enabling wi-fi bluetooth airplane mode using rear camera flash led flashlight itunes radio internet radio service also included iphone 5s free ad-supported service available itunes users featuring siri integration ios users able skip tracks customize stations purchase station songs itunes store users could also search history previous songs apple announced june 2018 iphone 5s support ios 12 update made iphone 5s longest supported ios device supported six major versions ios operating system par ipad 2 supported ios 4 ios 9 iphone 5s also receive major speed boosts 70 according apple includes camera keyboard functions supported 6 versions ios ios 7 ios 12 iphone revealed iphone 5s receiving ios 13 update debuted june 3 2019 wwdc come later 2019 autumn keynote apple announced case iphone 5s made soft microfiber inside leather outside case announced along iphone 5c case first cases apple announced since iphone 4 bumpers docks iphone 5s 5c found apple online store announcement casing difference iphone 5s 5c separate docks made specifically respective phone iphone 5s received mostly positive reception reviewers commentators walt mossberg things digital gave phone favorable review saying touch id sounds like gimmick ’ real advance biggest step ever biometric authentication everyday devices labeled best smartphone market david pogue new york times praised touch id said innovation smartphone market saturated maybe age annual mega-leaps focused much review ios 7 believed biggest change device previous generations praising new siri features control center airdrop editorial pogue stated ios 7 biggest change iphone series citing utilitarian interface changes main contributor scott stein cnet criticized lack design change iphone 5 said although iphone 5s required upgrade easily fastest advanced apple smartphone date although praised camera 64-bit a7 chip m7 motion-chip fingerprint scanning capabilities investors thought iphone 5s although notable improvement iphone 5 still relatively unchanged predecessor worried iphone line become stagnant dull product apple share price fell 5.4 launch close month low 467.71 nasdaq darrell etherington techcrunch praised iphone 5s best smartphone available said looks may different iphone 5 internal components dramatic impact day-to-day activities normal smartphone user went detail explaining impact improved camera specifications phone etherington suggested 64-bit a7 processor reach full potential developers create applications supporting myriam joire engadget found iphone 5s could benefit significantly a7 developers created applications optimized 64-bit processor anand lal shimpi anandtech praised phone a7 processor describing seriously impressive stated futureproof iphone ever launched much pains use word futureproof one people likes hold onto device iphone 5s good starting point scott lowe ign also spoke highly 64-bit processor substantial lead processing power htc one samsung galaxy s4 accounting graphics boost 32 38 cpu benchmarks debut apple 64-bit a7 processor took rival android smartphone makers surprise particularly qualcomm whose 64-bit system-on-chip released 2015 reviewers recommended iphone 5s iphone 5c released time 5c retained almost hardware discontinued iphone 5 iphone 5s featured substantially improved performance/features thanks new 64-bit a7 processor well extra storage space relatively small additional upfront cost iphone 5c us 650 versus us 550 march 2014 especially case ios 8 released iphone 5s iphone 5c moved mid low end iphone range respectively iphone 5s still 16 32 gb storage available iphone 5c make 8 gb storage 4.9gb available user installing ios 8 furthermore 5c polycarbonate exterior received mixed reception seen cost-cutting downgrade compared iphone 5 aluminum/glass case 5s retained latter design looked even premium due additional gold finish 2015–16 still significant number customers preferred 4-inch screen size iphone 5s remained second-most popular iphone iphone 6 ahead iphone 6s apple stated event sold 30 million 4-inch iphones 2015 even form factor succeeded flagship iphone redesigned larger display 4.7/5.5-inch iphone 6 6 plus back september 2014 furthermore 5/5s design regarded long golden child apple phone design benchmark phones general 5s gold finish adding premium touch 5 already well-regarded look succeeding 6 6s design less critically acclaimed felt little bit wrong though holding slick 650 bar soap iphone 5 described elegance rooted way aluminum glass work together felt streamlined yet substantial different iphone 6 feels substantial size alone plus unlike ubiquitous rounded corners 6 iphone 5 ’ really look like anything else market time however iphone 5/5s design suited scaling contrast iphone 6/6s could better accommodate growing consumer trend towards larger screen sizes indeed spawned 6/6s plus phablet models apple discontinued iphone 5s replaced iphone se outwardly appears almost identical 5s even se internal hardware upgraded significantly iphone 5s 5c sold nine million units first three days setting record first weekend smartphone sales 5s selling three times units 5c first day release 1 iphones us iphone 5ss 0.3 iphone 5cs. ref name= cnet ip5s/c sales 1 /ref gene munster piper jaffray reported line fifth avenue apple store contained 1,417 people release day compared 1,300 iphone 4 2010 549 iphone 3g 2008 respective release days first time apple launched two models simultaneously first-day release china also contributed record sales result launch day major in-stock shortages reported stores across countries iphone 5s initially went sale great many customers line outside apple stores worldwide left disappointed due severe shortages across 5s models gold model particular highly limited supply situation eased us days following launch countries reported receiving restocks commentators questioned apple handled initial release online pre-orders offered iphone 5s meaning large numbers people queuing outside physical stores line receiving unit us apple offered online reservation system customers could keep checking units available local apple stores order pickup online orders also short supply launch day shipping date across model sizes colors changing 7-10 working days october countries within hours online orders taken iphone 5s best selling phone sprint verizon t-mobile september 2013 united states outselling iphone 5c samsung galaxy s4 according consumer intelligence research partners iphone 5s outsold 5c two-to-one margin september release confirming apple ceo tim cook view high-end smartphone market reaching point market saturation commentators viewed 5c flop supply chain cuts signifying decline demand 5s viewed massive success apple admitted failed anticipate sales ratio leading overstocking 5c shortages 5s six months release iphone 5s march 25 2014 apple announced sales iphone brand exceeded 500 million units may 2014 despite market eight months iphone 5s reportedly outsold newly released samsung galaxy s5 40 7 million iphone 5s units versus 5 million galaxy s5 units galaxy s5 failure oust iphone 5s top selling spot major setback samsung mobile preceding samsung galaxy siii samsung galaxy s4 first quarter releases outsold iphone 4s iphone 5 respectively number technology writers including adrian kingsley-hughes zdnet kevin roose new york believed fingerprint scanning functionality iphone 5s could help spur adoption technology alternative passwords mainstream users especially bring device scenarios fingerprint-based authentication systems enjoyed wider usage enterprise environments however citing research biometrics engineer geppy parziale roose suggested cmos-based sensor could become inaccurate wear time unless apple designed sensor prevent occurring brent kennedy researcher united states computer emergency readiness team recommended users immediately rely technology citing uncertainty whether system could properly reject spoofed fingerprint following release iphone 5s german chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image make latex model thumb pressed sensor gain access spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token however 2013 39 american smartphone users used security measures protect smartphone others also tried chaos computer club method concluded easy process either time effort given user use high resolution photocopy complete fingerprint special chemicals expensive equipment spoofing process takes time achieve several problems experienced iphone 5s hardware release widely reported issue angle reported phone level sensor drifted several degrees caused gyroscope compass accelerometer become inaccurate reports suggested hardware-induced problem encountered problems crashing blue screen restarting power button making rattling noise phone shaken overheating microphone working touch id working itunes purchases issues since fixed software updates
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 740, 5752, 6125, 2954, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 2978, 5091, 4749, 7601, 3346, 6874, 6165, 4389, 6515, 5463, 102, 5469, 4768, 2284, 3008, 5477, ...
Test
4,821
4
Automatic_number-plate_recognition:automatic number-plate recognition automatic number-plate recognition anpr see also names technology uses optical character recognition images read vehicle registration plates create vehicle location data use existing closed-circuit television road-rule enforcement cameras cameras specifically designed task anpr used police forces around world law enforcement purposes including check vehicle registered licensed also used electronic toll collection pay-per-use roads method cataloguing movements traffic example highways agencies automatic number-plate recognition used store images captured cameras well text license plate configurable store photograph driver systems commonly use infrared lighting allow camera take picture time day night anpr technology must take account plate variations place place concerns systems centered privacy issues government tracking citizens movements misidentification high error rates increased government spending critics described form mass surveillance anpr sometimes known various terms anpr invented 1976 police scientific development branch britain prototype systems working 1979 contracts awarded produce industrial systems first emi electronics computer recognition systems crs wokingham uk early trial systems deployed a1 road dartford tunnel first arrest detection stolen car made 1981 however anpr become widely used new developments cheaper easier use software pioneered 1990s collection anpr data future use i.e solving then-unidentified crimes documented early 2000s first documented case anpr used help solve murder occurred november 2005 bradford uk anpr played vital role locating subsequently convicting killers sharon beshenivsky software aspect system runs standard home computer hardware linked applications databases first uses series image manipulation techniques detect normalize enhance image number plate optical character recognition ocr extract alphanumerics license plate anpr systems generally deployed one two basic approaches one allows entire process performed lane location real-time transmits images many lanes remote computer location performs ocr process later point time done lane site information captured plate alphanumeric date-time lane identification information required completed approximately 250 milliseconds information easily transmitted remote computer processing necessary stored lane later retrieval arrangement typically large numbers pcs used server farm handle high workloads found london congestion charge project often systems requirement forward images remote server require larger bandwidth transmission media anpr uses optical character recognition ocr images taken cameras dutch vehicle registration plates switched different style 2002 one changes made font introducing small gaps letters p r make distinct therefore legible systems license plate arrangements use variations font sizes positioning—anpr systems must able cope differences order truly effective complicated systems cope international variants though many programs individually tailored country cameras used existing road-rule enforcement closed-circuit television cameras well mobile units usually attached vehicles systems use infrared cameras take clearer image plates 1990s significant advances technology took automatic number-plate recognition anpr systems limited expensive hard set fixed based applications simple point shoot mobile ones made possible creation software ran cheaper pc based non-specialist hardware also longer needed given pre-defined angles direction size speed plates would passing camera field view scaled-down components cost-effective price points led record number deployments law enforcement agencies around world smaller cameras ability read license plates higher speeds along smaller durable processors fit trunks police vehicles allowed law enforcement officers patrol daily benefit license plate reading real time interdict immediately despite effectiveness noteworthy challenges related mobile anprs one biggest processor cameras must work fast enough accommodate relative speeds 100 mph 160 km/h likely scenario case oncoming traffic equipment must also efficient since power source vehicle battery equipment must small minimize space requires relative speed one issue affects camera ability actually read license plate algorithms must able compensate variables affect anpr ability produce accurate read time day weather angles cameras license plates system illumination wavelengths also direct impact resolution accuracy read conditions installing anpr cameras law enforcement vehicles requires careful consideration juxtaposition cameras license plates read using right number cameras positioning accurately optimal results prove challenging given various missions environments hand highway patrol requires forward-looking cameras span multiple lanes able read license plates high speeds city patrol needs shorter range lower focal length cameras capturing plates parked cars parking lots perpendicularly parked cars often require specialized camera short focal length technically advanced systems flexible configured number cameras ranging one four easily repositioned needed states rear-only license plates additional challenge since forward-looking camera ineffective oncoming traffic case one camera may turned backwards seven primary algorithms software requires identifying license plate complexity subsections program determines accuracy system third phase normalization systems use edge detection techniques increase picture difference letters plate backing median filter may also used reduce visual noise image number possible difficulties software must able cope include problems corrected within software primarily left hardware side system work solutions difficulties increasing height camera may avoid problems objects vehicles obscuring plate introduces increases problems adjusting increased skew plate cars tow bars may obscure one two characters license plate bikes bike racks also obscure number plate though countries jurisdictions victoria australia bike plates supposed fitted small-scale systems allow errors license plate used giving specific vehicles access barricaded area decision may made acceptable error rate one character likelihood unauthorized car similar license plate seen quite small however level inaccuracy would acceptable applications anpr system front end anpr system imaging hardware captures image license plates initial image capture forms critically important part anpr system accordance garbage garbage principle computing often determine overall performance license plate capture typically performed specialized cameras designed specifically task although new software techniques implemented support ip-based surveillance camera increase utility anpr perimeter security applications factors pose difficulty license plate imaging cameras include speed vehicles recorded varying level ambient light headlight glare harsh environmental conditions dedicated license plate capture cameras incorporate infrared illumination order solve problems lighting plate reflectivity many countries use license plates retroreflective returns light back source thus improves contrast image countries characters plate reflective giving high level contrast reflective background lighting conditions camera makes use active infrared imaging normal colour filter lens infrared illuminator next benefits greatly infrared waves reflected back plate possible dedicated anpr cameras however cameras used purposes must rely heavily software capabilities full-colour image required well use anpr-retrieved details necessary one infrared-enabled camera one normal colour camera working together avoid blurring ideal shutter speed dedicated camera set 1/1000 second also important camera uses global shutter opposed rolling shutter assure taken images distortion-free car moving slower shutter speeds could result image blurred read using ocr software especially camera much higher vehicle slow-moving traffic camera lower level vehicle angle approaching camera shutter speed need fast shutter speeds 1/500 second cope traffic moving 40 mph 64 km/h 1/250 second 5 mph 8 km/h license plate capture cameras produce usable images vehicles traveling maximize chances effective license plate capture installers carefully consider positioning camera relative target capture area exceeding threshold angles incidence camera lens license plate greatly reduce probability obtaining usable images due distortion manufacturers developed tools help eliminate errors physical installation license plate capture cameras several state police forces department justice victoria use fixed mobile anpr systems new south wales police force highway patrol first trial use fixed anpr camera system australia 2005 2009 began roll-out mobile anpr system known officially manpr three infrared cameras fitted highway patrol fleet system identifies unregistered stolen vehicles well disqualified suspended drivers well 'persons interest persons outstanding warrants city mechelen uses anpr system since september 2011 scan cars crossing city limits inbound outbound cars listed 'black lists insurance stolen etc generate alarm dispatching room intercepted patrol early 2012 1 million cars per week automatically checked way police service ontario uses automatic licence-plate recognition software nab drivers behind wheels vehicles ontario number plates technique tested danish police permanent use since mid 2016 180 gantries major roads built throughout country together 250 fixed cameras enable levy eco tax lorries 3.5 tonnes system currently opposed whilst may collecting data vehicles passing cameras eco tax charged 11 march 2008 federal constitutional court germany ruled areas laws permitting use automated number plate recognition systems germany violated right privacy specifically court found retention sort information i.e. number plate data pre-destined use e.g. use tracking suspected terrorists enforcement speeding laws violation german law systems provided jenoptik robot gmbh called trafficapture 2012 state consortium formed among hungarian ministry interior national police headquarters central commission public administration electronic services aim install operate unified intelligent transportation system nationwide coverage end 2015 within system 160 portable traffic enforcement data-gathering units 365 permanent gantry installations brought online anpr speed detection imaging statistical capabilities since data points connected centrally located member consortium able separately utilize range administrative enforcement activities remote vehicle registration insurance verification speed lane traffic light enforcement wanted stolen vehicle interception among others several hungarian auxiliary police units also use system called matrix police cooperation police consists portable computer equipped web camera scans stolen car database using automatic number-plate recognition system installed dashboard selected patrol vehicles pda-based hand-held versions also exist mainly used control license plate parking cars auxiliary police authority order moving vehicles stop stolen car found formal police informed vehicle registration plates saudi arabia use white background several vehicle types may different background united states diplomatic plates letters 'usd arabic reads 'dsu read right left direction arabic script 17 arabic letters used registration plates challenge plates recognition saudi arabia size digits plates use eastern arabic numerals 'western arabic equivalents research source code available apnr arabic digits technique tested swedish police authority nine different locations sweden several cities tested—and put service—the kgys kent guvenlik yonetim sistemi city security administration system i.e. capital ankara debuted kgys- consists registration plate number recognition system main arteries city exits system used two cameras per lane one plate recognition one speed detection system widened network registration number cameras together enforcing average speed preset distances arteries limit photo evidence date-time details posted registration address speed violation detected 2012 fine exceeding speed limit 30 approximately us 175 project system integration « olli technology » ministry internal affairs ukraine department state traffic inspection sti experiments introduction modern technical complex capable locate stolen cars drivers deprived driving licenses problem cars real time ukrainian complex video control working principle video fixing car recognition license plates check data base home office states purpose automatic number-plate recognition united kingdom help detect deter disrupt criminality including tackling organised crime groups terrorists vehicle movements recorded network nearly 8000 cameras capturing 25 30 million anpr ‘ read ’ records daily records stored two years national anpr data center accessed analysed used evidence part investigations uk law enforcement agencies 2012 uk parliament enacted protection freedoms act includes several provisions related controlling restricting collection storage retention use information individuals act home office published code practice 2013 use surveillance cameras including anpr government law enforcement agencies aim code help ensure use characterised surveillance consent consent part community must informed consent assumed system operator surveillance consent regarded analogous policing consent addition set standards introduced 2014 data infrastructure data access management united states anpr systems commonly referred alpr automatic license plate reader/recognition technology due differences language i.e. number plates referred license plates american english mobile anpr use widespread among us law enforcement agencies city county state federal level according 2012 report police executive research forum approximately 71 us police departments use form anpr mobile anpr becoming significant component municipal predictive policing strategies intelligence gathering well recovery stolen vehicles identification wanted felons revenue collection individuals delinquent city state taxes fines monitoring amber alerts widespread implementation technology many u.s. states issue misdemeanor citations 500 license plate identified expired incorrect vehicle successfully recognized plates may matched databases including wanted person protection order missing person gang member known suspected terrorist supervised release immigration violator national sex offender lists addition real-time processing license plate numbers anpr systems us collect indefinitely store data license plate capture images dates times gps coordinates stockpiled help place suspect scene aid witness identification pattern recognition tracking individuals department homeland security proposed federal database combine monitoring systems cancelled privacy complaints 1998 washington d.c. police lieutenant pleaded guilty extortion blackmailing owners vehicles parked near gay bar 2015 los angeles police department proposed sending letters home addresses vehicles enter areas high prostitution early private sector mobile anpr applications vehicle repossession recovery although application anpr private companies collect information privately owned vehicles collected private property example driveways become issue sensitivity public debate anpr uses include parking enforcement revenue collection individuals delinquent city state taxes fines technology often featured reality tv show parking wars featured e network show tow truck drivers booting teams use anpr find delinquent vehicles high amounts unpaid parking fines laws vary among states regarding collection retention license plate information 14 states limits long data may retained lowest new hampshire 3 minutes colorado 3 years supreme court virginia ruled 2018 data collected alprs constitute personal information anpr used speed limit enforcement australia austria belgium dubai uae france italy netherlands spain south africa uk kuwait works tracking vehicles travel time two fixed points calculating average speed cameras claimed advantage traditional speed cameras maintaining steady legal speeds extended distances rather encouraging heavy braking approach specific camera locations subsequent acceleration back illegal speeds developed monitoring system named covering 2500 km 2012 tutor system also able intercept cars changing lanes average speed cameras trajectcontrole place netherlands since 2002 july 2009 12 cameras operational mostly west country along a12 divided several “ sections ” allow cars leaving entering motorway first experimental system tested short stretch a2 1997 deemed big success police reducing overspeeding 0.66 compared 5 6 regular speed cameras used location first permanent average speed cameras installed a13 2002 shortly speed limit reduced 80 km/h limit noise air pollution area 2007 average speed cameras resulted 1.7 million fines overspeeding total 9.7 millions according dutch attorney general average number violation speed limits motorway sections equipped average speed cameras 1 2 compared 10 15 elsewhere one notable stretches average speed cameras uk found a77 road scotland monitored kilmarnock girvan 2006 confirmed speeding tickets could potentially avoided 'specs cameras changing lanes rac foundation feared people may play russian roulette changing one lane another lessen odds caught however 2007 system upgraded multi-lane use 2008 manufacturer described myth “ categorically untrue ” exists evidence implementation systems specs considerable effect volume drivers travelling excessive speeds stretch road mentioned a77 glasgow ayr noted huge drop speeding violations since introduction specs system recent innovations contributed adoption anpr perimeter security access control applications government facilities within us homeland security efforts protect alleged acts terrorism resulted adoption anpr sensitive facilities embassies schools airports maritime ports military federal buildings law enforcement government facilities transportation centers anpr marketed able implemented networks ip based surveillance cameras perform double duty alongside facial recognition object tracking recording systems purpose monitoring suspicious anomalous behavior improving access control matching watch lists anpr systems commonly installed points significant sensitivity ingress egress major us agencies department homeland security department justice department transportation department defense purchased anpr perimeter security applications large networks anpr systems installed cities boston london new york city provide citywide protection acts terrorism provide support public gatherings public spaces center evidence-based crime policy george mason university identifies following randomized controlled trials automatic number-plate recognition technology rigorous addition government facilities many private sector industries facility security concerns beginning implement anpr solutions examples include casinos hospitals museums parking facilities resorts us private facilities typically access government police watch lists may develop match databases customers vips critical personnel banned person lists addition providing perimeter security private anpr service applications valet recognized customer vip recognition logistics key personnel tracking sales advertising parking management logistics vendor support vehicle tracking many cities districts developed traffic control systems help monitor movement flow vehicles around road network typically involved looking historical data estimates observations statistics cctv cameras used help traffic control centres giving live data allowing traffic management decisions made real-time using anpr footage possible monitor travel individual vehicles automatically providing information speed flow various routes details highlight problem areas occur help centre make informed incident management decisions counties united kingdom worked siemens traffic develop traffic monitoring systems control centres public projects hampshire county council romanse provide interactive real-time website showing details traffic city site shows information car parks ongoing road works special events footage taken cctv cameras anpr systems used provide average point-to-point journey times along particular routes displayed variable-message sign vms giving drivers ability plan route romanse also allows travellers see current situation using mobile device internet connection wap gprs 3g allowing view mobile device cctv images within hampshire road network uk company trafficmaster used anpr since 1998 estimate average traffic speeds non-motorway roads without results skewed local fluctuations caused traffic lights similar company operates network 4000 anpr cameras claims four central digits identified numberplate data retained ieee intelligent transportation systems society published papers plate number recognition technologies applications ontario 407 etr highway uses combination anpr radio transponders toll vehicles entering exiting road radio antennas located junction detect transponders logging unique identity vehicle much way anpr system without anpr second system would possible monitor traffic drivers opt rent transponder c 2.55 per month charged video toll charge c 3.60 using road heavy vehicles gross weight 5,000 kg required use one using either system users highway notified usage charges post numerous electronic toll collection networks use combination radio frequency identification anpr include portuguese roads old highways toll stations drivers pay cards also lanes electronic collection systems however new highways option electronic toll collection system electronic toll collection system comprises three different structures smart tag installed vehicle car quickly identified owner bank account automatically deducted process realized speed 250 km per hour car smart tag driver required go pay station pay tolls 3rd 5th day surplus charge fails owner sent letter home heavy fine paid increases five-fold car inserted police database vehicle impounding system also used limited access areas main cities allow entry pre-registered residents planned implemented roads city entrance toll collection/access restriction efficacy system considered high almost impossible driver complain london congestion charge example system charges motorists entering payment area transport london tfl uses anpr systems charges motorists daily fee £11.50 enter leave move around within congestion charge zone 7 a.m. 6:00 p.m. monday friday reduced fee £10.50 paid vehicle owners sign automatic deduction scheme fines traveling within zone without paying charge £65 per infraction paid deadline doubling £130 per infraction thereafter currently 1,500 cameras use automatic number plate recognition anpr technology also number mobile camera units may deployed anywhere zone estimated around 98 vehicles moving within zone caught camera video streams transmitted data centre located central london anpr software deduces registration plate vehicle second data centre provides backup location image data front back number plates captured vehicles going – gives four chances capture number plates vehicle entering exiting zone list compared list cars whose owners/operators paid enter zone – paid fined registered owner vehicle looked database provided dvla johannesburg south africa anpr used etoll fee collection owners cars driving inner city must pay charge.the number tolls passed depends distance travelled particular freeway freeways anpr n12 n3 n1 etc stockholm sweden anpr used stockholm congestion tax owners cars driving inner city must pay charge depending time day 2013 also gothenburg congestion tax also includes vehicles passing city main highways several uk companies agencies use anpr systems include vehicle operator services agency vosa driver vehicle licensing agency dvla transport london anpr systems may also used for/by vehicle owners used variety techniques attempt evade anpr systems road-rule enforcement cameras general one method increases reflective properties lettering makes likely system unable locate plate produce high enough level contrast able read typically done using plate cover spray though claims regarding effectiveness latter disputed jurisdictions covers illegal covered existing laws countries law disallow use sprays users attempted smear license plate dirt utilize covers mask plate novelty frames around texas license plates made illegal texas 1 september 2003 texas senate bill 439 caused problems anpr devices law made class c misdemeanor punishable fine us 200 class b punishable fine us 2,000 180 days jail proven owner deliberately obscure plates law later clarified 2007 allow novelty frames anpr system read plate flag image attention human operators looking see able identify alphanumerics order avoid surveillance penalty charges upsurge car cloning usually achieved copying registration plates another car similar model age difficult detect especially cloners may change registration plates travel behavior hinder investigations 2013 researchers sunflex zone ltd created privacy license plate frame uses near infrared light make license plate unreadable license plate recognition systems introduction anpr systems led fears misidentification furthering 1984 -style surveillance united states gregg easterbrook oppose call machines issue speeding tickets red-light tickets beginning slippery slope towards automated justice system similar criticisms raised countries easterbrook also argues technology employed maximize revenue state rather promote safety electronic surveillance system produces tickets us often excess 100 virtually impossible citizen contest court without help attorney revenues generated machines shared generously private corporation builds operates creating strong incentive tweak system generate many tickets possible older systems notably unreliable uk known lead charges made incorrectly vehicle owner pay £10 order issued proof offense improvements technology drastically decreased error rates false accusations still frequent enough problem perhaps best known incident involving abuse anpr database north america case edmonton sun reporter kerry diotte 2004 diotte wrote article critical edmonton police use traffic cameras revenue enhancement retaliation added anpr database high-risk drivers attempt monitor habits create opportunity arrest police chief several officers fired result office privacy commissioner canada expressed public concern growing police use technology spy motorists concerns include storage information could used identify people store details driving habits daily life contravening data protection act along similar legislation see personally identifiable information laws uk strict system uses cctv footage identify individuals also concern safety data mined following discovery police surveillance records lost gutter also case uk saying use anpr cameras unlawful regulation investigatory powers act 2000 breach exists say fact anpr used monitor activities law-abiding citizens treats everyone like suspected criminals intended surveyed act police known refer system anpr 24/7 traffic movement database diversion intended purpose identifying vehicles involved criminal activities opposing viewpoint plates cloned 'read innocent motorist vehicle allow elimination vehicle investigation visual examination images stored likewise stolen vehicles read anpr systems time theft report police assisting investigation associated press reported august 2011 new york police department cars license plate tracking equipment purchased federal hidta high intensity drug trafficking area funds used spy muslims mosques track license plate numbers worshipers police unmarked cars outfitted electronic license plate readers would drive street automatically catalog plates everyone parked near mosque amassing covert database would distributed among officers used profile muslims public 2013 american civil liberties union aclu released 26,000 pages data anpr systems obtained local state federal agencies freedom information laws documents paint startling picture technology deployed rules becoming tool mass routine location tracking surveillance wrote aclu aclu reported many locations devices used store location information vehicles suspected particular offense private companies also using license plate readers sharing information collect police little oversight privacy protections lack regulation means policies governing long location data kept vary widely aclu said 2012 aclu filed suit department homeland security funds many local state anpr programs grants agency failed provide access records aclu requested freedom information act programs mid-august 2015 boston discovered license plate records million people online unprotected many anpr systems claim accuracy trained match plates single jurisdiction region fail trying recognize plates jurisdictions due variations format font color layout plate features jurisdictions offer vanity affinity plates particularly us create many variations within single jurisdiction time time us states make significant changes license plate protocol affect ocr accuracy may add character add new license plate design alpr systems must adapt changes quickly order effective another challenge alpr systems states license plate protocol example one state uses standard three letters followed four numbers time alpr systems alarms user ’ responsibility make sure plate caused alarm matches state associated license plate listed in-car computer maximum effectiveness anpr system able recognize plates jurisdiction jurisdiction associated many variables make tasks difficult currently least one us anpr provider platesmart claims system independently reviewed able accurately recognize us state jurisdiction license plates one european anpr provider claims system differentiate eu plate jurisdictions anpr software vendors publish accuracy results based image benchmarks results may vary depending images vendor chosen include test 2017 sighthound reported 93.6 accuracy private image benchmark 2017 openalpr reported accuracy rates commercial software range 95-98 public image benchmark april 2018 research brazil ’ federal university paraná federal university minas gerais compared systems reported median recognition rate 93.53 stated significant improvement 81.8 rate obtained previous works
[ 4089, 3609, 803, 4101, 2054 ]
Test
4,822
9
Font_Bomb:font bomb font bomb javascript bookmarklet blow web pages script loaded clicking web page starts countdown countdown reaches zero uses cascading style sheets scatter nearby text across page script wraps affected letters tag moved individually
[ 6221, 3922, 2451, 84 ]
Test
4,823
2
Android_Tactical_Assault_Kit:android tactical assault kit android tactical assault kit atak android smartphone geospatial infrastructure military situational awareness app built using nasa worldwind initially created 2010 air force research laboratory based nasa worldwind mobile codebase development deployment grew slowly rapidly since 2016 2013 officials draper laboratory said system would compatible android mobile operating systems could used navigation spatial awareness controlling drones atak plugin architecture allows developers add functionality atak polaris integrated ground guidance software atak plugin allow off-road routing mounted dismounted soldiers accounting terrain weather enemy activity equipment load connections programs atak began august 2010 originally based nasa worldwind mobile goal demonstrate robust information sharing mobile format oct 14 2014 u.s. army geospatial center recommended afrl android tactical assault kit atak world-leader esri commercial joint mapping tool kit cjmtk nasa world wind army globe engine age map engine driving nett warrior end user device atak selected due similar capabilities cjmtk similar risk less one-third total cost read full public released report nett warrior map engine trade study september 2015 darpa reported atak used successful demonstration persistent close air support program use thousands users according january 2016 article national defense magazine atak already fielded afsoc units atak excellent suitability coordinating people geography atak made available federal government users contractors need coordination atak also made available government researchers wish experiment geospatial collaboration without building systems versions addition android version also windows version wintak iphone version development itak wintak application developed microsoft windows operating system uses maps allow precise targeting intelligence surrounding land formations navigation generalized situational awareness developed conjunction atak provide similar functionality windows platform commercial licensing january 2015 afrl began licensing atak techlink u. s. companies commercial use support state/local government uses well civilian uses november 2015 twenty-five companies licensed atak commercial uses techlink licensing site
[ 1582, 4823 ]
Validation
4,824
2
LXLE_Linux:lxle linux lxle linux distribution based upon recent ubuntu/lubuntu lts release using lxde desktop environment lxle lightweight distro focus visual aesthetics works well old new hardware january 2014 review full circle magazine gabriele tettamanzi noted lxle minor localization issues otherwise described nice light fast desktop rich software stable jesse smith reviewed lxle 12.04.3 distrowatch weekly jesse smith also reviewed lxde 14.04
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2585, 2228, 753, 1487, 58, 3996, 7581, 6489, 7587, 4008, 1893, 7954, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 6211, 2680, ...
Test
4,825
7
Clio_(software_company):clio software company clio legal technology company headquartered burnaby british columbia clio offers law firms cloud-based software handles various law practice management tasks including client intake contact management calendaring document management timekeeping billing trust accounting clio established 2007 jack newton rian gauvreau felt software commonly use law firms time expensive difficult use company launched software 2008 first cloud-based practice management software developed law firms 2012 clio series b raised 6 million time investment second-largest ever made british columbia-based internet company company also made first version application programming interface available 2012 september 2013 clio released mobile application provides access company software ios devices release occurred company first annual cloud conference event gained prominence legal technology industry 2014 clio received 20 million series c funding also announced android version mobile application major product update october 2016 clio published first legal trends report annual publication references aggregated metrics company user base analyze trends benchmarks law firm operations october 5 2018 clio announced acquired client intake software provider lexicata lexicata product would converted new product called clio grow time clio also supported 120 integrations legal software applications
[ 2961 ]
Validation
4,826
1
GuideStar:guidestar guidestar usa inc. information service specializing reporting u.s. nonprofit companies 2016 database provided information 2.5 million organizations guidestar one first central sources information u.s. nonprofits world largest source information nonprofit organizations guidestar founded williamsburg virginia september 1994 received tax-exempt status 1996 year company began posting nonprofit organizations financial reports world wide web guidestar also serves verify recipient organization established donated funds go donor intended individuals looking give wake disasters 2013 guidestar announced major changes guidestar exchange program allows nonprofits supplement public information available irs guidestar nonprofit profiles implemented three seals based information nonprofit provides profile bronze silver gold 2016 new seal allowed nonprofits share progress results mission guidestar platinum introduced 2019 guidestar merged foundation center form new organization candid charity watch investigator compared charity navigator charity watch better business bureau combined federal campaign great nonprofits investigator praised guidestar offering information rather making judgments guidestar placed notice pages charities listed southern poverty law center splc hate list one groups sued guidestar defamation charities echoed criticism guidestar use splc list
[]
Test
4,827
3
LOADHIGH:loadhigh computing abbreviated internal dos command command.com used load program upper memory area uma instead conventional memory command introduced ms-dos 5.0 pc dos 5.0 1991 copying built-in command earlier introduced dr dos 5.0 1990 dr dos 6.0 added support naming variant well 1991 due design ibm pc dos suffered known 640 kib barrier size memory area known conventional memory fixed independent amount system memory actually installed various schemes developed support extra memory see also ems xms dos extenders conventional memory still issue due compatibility issues scarce resource many applications demanded large part basic memory fragment runtime therefore often necessary move high tsr programs like mouse driver disk caching driver like smartdrv prior running memory-hungry application achieved using called program name parameter load tsrs high within config.sys installhigh directive must used instead command equivalent device drivers devicehigh usable within config.sys also supported since dr dos 6.0 dr dos 5.0 higher also support hiinstall hidevice respectively modern operating systems run protected mode support unsegmented flat memory model 640 kb constraint methods freeing conventional memory largely become obsolete
[ 4291, 5480, 4759, 5571, 126, 852, 6634, 858 ]
Test
4,828
5
Internet_Cache_Protocol:internet cache protocol internet cache protocol icp udp-based protocol used coordinating web caches purpose find appropriate location retrieve requested object situation multiple caches use single site icp use caches efficiently possible minimize number remote requests originating server hierarchically queried cache either parent sibling parents usually sit closer internet connection child child cache find object query usually sent parent cache fetch cache pass request siblings caches equal hierarchical status whose purpose distribute load amongst siblings request comes one cache cluster siblings icp used query siblings object requested sibling object usually transferred instead queried original server often called near miss — object found cache “ miss ” loaded nearby cache instead remote server icp protocol designed lightweight order minimize round-trip time caches intended unreliable quick connections approach reduce numbers server retrievals also prevent storage multiple copies instance data leads potential drawback increased intercache communication slow system icp protocol described rfc 2186 application hierarchical web caching rfc 2187 web proxies support icp include htcp designed successor icp attempts handle various problems found icp deployments icp message consists two sections header header length fixed 20 octets five 32-bit words data data variable length limited maximum icp message size including header 16,384 octets icp header consists 8 fields 2 optional fields fifth sixth field optional pink background table appropriately named “ options ” “ option data ”
[ 2488, 6031, 4596, 6703, 4284 ]
Validation
4,829
3
MacCharlie:maccharlie maccharlie hardware add-on apple macintosh made dayna communications name refers ibm pc advertising campaign time featuring charlie chaplin little tramp character allowed users run dos software ibm pc clipping unit onto chassis 128k macintosh well keyboard extender provide function keys numeric keypad absent apple original keyboard clip-on unit sat side mac like contemporary amiga sidecar contained essentially complete ibm pc compatible 8088 processor 256k ram expandable 640k single 5.25 floppy drive stored 360k second floppy drive could added running dos software users could still access macintosh menu bar desk accessories maccharlie used mac terminal performing dos processing sending video data relatively slow serial link mac display slowness coupled declining prices real ibm pc compatibles contributed short market life maccharlie
[ 4277 ]
Test
4,830
3
Outbound_laptop:outbound laptop outbound laptop apple macintosh-compatible laptop computer powered 15-mhz motorola 68000 processor later versions increased clock speed 20 mhz outbound systems inc. located boulder colorado due kangaroo logo many believed australian company outbound laptop introduced 1989 significantly lighter 4 kg easier carry apple macintosh portable released around time due apple refusal license macintosh toolbox read-only memory rom outbound users install mac rom make computer work rom typically removed older mac process would render donor mac unusable even additional cost typical price us 4,000 compared favorably mac portable outbound featured built-in pointing device located keyboard named trackbar earlier models referring trademark isopoint cylinder scrolled slid left right ran standard camcorder batteries rather expensive custom batteries commonly found portable computers around time outbound laptop succeeded outbound notebook 1991 notebook ran style lead-acid camcorder batteries earlier laptop 9.7 passive-matrix monochrome lcd display used 2.5 ide hard drive unusual time apple n't start using ide drives powerbooks powerbook 150 1994 notebook internal microphone speaker headphone jack two serial ports adb port scsi port notebook scsi port unique supported outbound outrigger full-page external monochrome monitor attached via scsi port notebook cpu ram mac rom optional 68882 fpu mounted removable daughtercard permitted easy ram installation optional upgrades daughtercard could simply swapped another one faster cpu fpu inserted available socket daughtercard four 30-pin simm sockets due notebook design 4mb ram could addressed mac system software even system 7 additional ram would appear silicon disk outbound specific ram disk apple introduction powerbook 1991 led demise mac-compatible laptop aftermarket probably significant increased competition fact outbound using roms licensing agreement apple apple refused license use subsequent proprietary roms outbound company ability manufacture laptops ended 68000 processors required roms access became difficult obtain short time outbound went business small group former employees set company perfit handle service warranty issues perfit ceased operations 1994
[ 1237, 8153, 5079 ]
Validation
4,831
7
Axway_Software:axway software axway software publicly held information technology company provides software tools enterprise software enterprise application integration business activity monitoring business analytics mobile application development web api management listed compartment b companies market capitalizations €150 million €1 billion paris euronext since june 2011 axway software incorporated 28 december 2000 software infrastructure division french services company sopra spun-out subsidiary sopra subsequently merged another french services company steria form sopra steria 2014 sopra used axway vehicle expansion enterprise application integration market subsequently number acquisitions made axway swedish company viewlocity acquired early 2002 christophe fabre became ceo axway 2005 remained position 2015 axway acquired us company cyclone commerce january 2006 much executive management axway relocated phoenix arizona february 2007 axway acquired atos b2b software business germany us company tumbleweed communications acquired june 2008 june 2011 axway spun sopra group listed paris euronext november 2012 irish company vordel api management vendor acquired brazilian company sci soluções acquired september 2013 january 2014 axway acquired assets information gateway australia axway acquired french company systar developer business activity monitoring software june 2014 january 2016 axway acquired us company appcelerator creator appcelerator titanium open-source framework multiplatform native mobile app development axway acquired us company syncplicity developer file share synchronization service february 2017 2017 sopra steria holds 33.52 axway sopra gmt holding company sopra steria axway holds 21.65 may 2016 sopra steria acquired 8.62 stake axway formerly held société générale axway component cac small 2016 axway 11,000 customers 100 countries since going public 2011 annual revenues grown €217.2 million 2011 €301.1 million 2016 profits grown €35.3 million 2011 €50.8 million 2016 axway headquartered phoenix arizona puteaux paris company development centers france annecy also site axway registered office lyon paris romania bucharest bulgaria sofia united states scottsdale arizona santa clara california also various support centers including one noida india acquisition sci 2013 lead establishment axway south america regional headquarters são paulo brazil 2017 axway main product amplify platform amplify acts data integration platform number formerly independent legacy products including appcelerator titanium provides uniform user interface various components amplify allows creation api-based services supports embedded real-time predictive analytics provides dashboards summarize data information provided different components sources axway also provides marketplace third party products services related apis titanium-built mobile apps
[ 6105 ]
Test
4,832
3
Ututo:ututo ututo linux distribution consisting entirely free software distribution named variety gecko found northern argentina ututo first fully free linux-based system recognized gnu project founder gnu project richard stallman formerly endorsed distribution nearly exclusively used personal computer switched gnewsense later trisquel ututo first released 2000 diego saravia national university salta argentina one first live cd distributions world first linux distribution argentina ututo carried simusol system simulate solar energy projects ututo simple install need configuration automatically detected hardware machine asked move mouse time distribution worked way 2002 ututo-r created offered possibility operating like software router version created marcos zapata used buenos aires public schools 2004 ututo-e project born swiftly becoming important derivative ututo project started daniel olivera 2006 ututo declared national interest argentine chamber deputies ututo xs current stable version ututo ututo xs compiled using gentoo linux ebuilds emerge software documentation spanish emergence xs series many new features added including faster system installer ututo used different hardware projects ifreetablet pablo manuel rizzo designed package management system ututo-get modelled debian apt however gentoo-based distros ututo compatible portage ututo different binaries optimized different intel amd processors releases since 2012 distribution considered dormant ututo ul ubuntu-libre current developed version ututo ututo ul utilize ubuntu distro base nonfree software removed usual ututo project linux-libre kernel 2017 original idea distributing simusol system simulate solar energy projects returned heart project tux machines reviewed utoto 2006
[ 5200, 3174, 1629, 7161, 3444, 7251, 6984, 474, 2559, 7075, 3366, 213, 2026, 1941, 578, 314, 5232, 2758, 1663, 2864, 3559, 6209, 6761, 2063, 343, 4824, 5523, 5259, 1893, 5530, 5704, 6317, 3751, 7587, 7954, 6244, 788 ]
Test
4,833
7
Nvidia_GameWorks:nvidia gameworks nvidia gameworks middleware software suite developed nvidia visual fx physx optix sdks provide wide range enhancements pre-optimised nvidia gpus gameworks distributed form compiled dlls rather traditional source code competing solution development amd gpuopen announced free open-source software mit license march 2016 nvidia made source code gameworks available github nvidia gameworks consists several main components addition suite contains sample code directx opengl developers well tools debugging profiling optimization android development gameworks criticized proprietary closed nature competing gpu manufacturers amd intel unable properly optimize nvidia libraries hardware due developers allowed see code necessary properly optimize products amd chief gaming scientist richard huddy claimed developers use gameworks contractually forbidden work amd also claims gameworks adds specific performance-crippling effects older nvidia cards unnecessary tessellation marginally affects recent cards 2014 amd considering making open source gameworks competitor released gpuopen december 2015
[ 2538, 2270, 5897, 2002, 2275, 6610, 4130, 7898, 4954, 5571, 5666, 5939, 1864, 7848, 3571, 5709, 1595, 8141, 1237, 1606, 2080, 2085 ]
Test
4,834
4
Need_to_know:need know term need know used government organizations particularly related military espionage describes restriction data considered sensitive need-to-know restrictions even one necessary official approvals security clearance access certain information one would given access information read clandestine operation unless one specific need know access information must necessary one conduct one official duties term also includes anyone people knowledge deemed necessary share security mechanisms aim make difficult unauthorized access occur without inconveniencing legitimate access need-to-know also aims discourage browsing sensitive material limiting access smallest possible number people battle normandy 1944 example need-to-know restriction though thousands military personnel involved planning invasion small number knew entire scope operation rest informed data needed complete small part plan true trinity project first test nuclear weapon 1945 like security measures need know misused persons wish refuse others access information hold attempt increase personal power prevent unwelcome review work prevent embarrassment resulting actions thoughts need know also invoked hide extra-legal activities may considered necessary use detrimental abuse policy considered different perspectives need know detrimental workers efficiency speed computations ibm mechanical calculators los alamos dramatically increased calculators operators told numbers meant discretionary access control mechanisms operating systems used enforce need know case owner file determines whether another person access need know often concurrently applied mandatory access control schemes lack official approval clearance may absolutely prohibit person accessing information need know subjective assessment mandatory access control schemes also audit accesses order determine need know violated term also used concept graphical user interface design computers controlling complex equipment airplanes usage many different pieces data dynamically competing finite user interface space safety-related messages given priority
[ 7282, 1531, 5571, 7570, 3112, 2462, 7090, 1972, 2486 ]
Test
4,835
4
Tactical_Network_Solutions:tactical network solutions tactical network solutions maryland-based information security company specializing 802.11 wi-fi protected setup wps wps exploitation tool released open source community vulnerability wps publicly disclosed stefan viehbock december 27 2011
[]
Train
4,836
4
IEEE_802.1X:ieee 802.1x ieee 802.1x ieee standard port-based network access control pnac part ieee 802.1 group networking protocols provides authentication mechanism devices wishing attach lan wlan ieee 802.1x defines encapsulation extensible authentication protocol eap ieee 802 known eap lan eapol eapol originally designed ieee 802.3 ethernet 802.1x-2001 clarified suit ieee 802 lan technologies ieee 802.11 wireless fiber distributed data interface iso 9314-2 802.1x-2004 eapol protocol also modified use ieee 802.1ae macsec ieee 802.1ar secure device identity devid 802.1x-2010 support service identification optional point point encryption local lan segment 802.1x authentication involves three parties supplicant authenticator authentication server supplicant client device laptop wishes attach lan/wlan term 'supplicant also used interchangeably refer software running client provides credentials authenticator authenticator network device provides data link client network allow block network traffic two ethernet switch wireless access point authentication server typically trusted server receive respond requests network access tell authenticator connection allowed various settings apply client connection setting authentication servers typically run software supporting radius eap protocols cases authentication server software may running authenticator hardware authenticator acts like security guard protected network supplicant i.e. client device allowed access authenticator protected side network supplicant identity validated authorized 802.1x port-based authentication supplicant must initially provide required credentials authenticator specified advance network administrator could include user name/password permitted digital certificate authenticator forwards credentials authentication server decide whether access granted authentication server determines credentials valid informs authenticator turn allows supplicant client device access resources located protected side network eapol operates data link layer ethernet ii framing protocol ethertype value 0x888e 802.1x-2001 defines two logical port entities authenticated port—the controlled port uncontrolled port controlled port manipulated 802.1x pae port access entity allow authorized state prevent unauthorized state network traffic ingress egress to/from controlled port uncontrolled port used 802.1x pae transmit receive eapol frames 802.1x-2004 defines equivalent port entities supplicant supplicant implementing 802.1x-2004 may prevent higher level protocols used content authentication successfully completed particularly useful eap method providing mutual authentication used supplicant prevent data leakage connected unauthorized network typical authentication procedure consists windows xp windows vista windows 7 support 802.1x network connections default windows 2000 support latest service pack sp4 wired connections windows mobile 2003 later operating systems also come native 802.1x client open source project known open1x produces client xsupplicant client currently available linux windows main drawbacks open1x client provide comprehensible extensive user documentation fact linux vendors provide package general wpa_supplicant used 802.11 wireless networks wired networks support wide range eap types iphone ipod touch support 802.1x release ios 2.0 android support 802.1x since release 1.6 donut chrome os supported 802.1x since mid-2011 mac os x offered native support since 10.3 avenda systems provides supplicant windows linux mac os x also plugin microsoft nap framework avenda also offers health checking agents windows defaults responding 802.1x authentication requests 20 minutes failed authentication cause significant disruption clients block period configured using hkey_local_machine\software\microsoft\dot3svc\blocktime dword value hkey_local_machine\software\microsoft\wlansvc\blocktime wireless networks registry entered minutes hotfix required windows xp sp3 windows vista sp2 make period configurable wildcard server certificates supported eaphost windows component provides eap support operating system implication using commercial certification authority individual certificates must purchased windows xp major issues handling ip address changes result user-based 802.1x authentication changes vlan thus subnet clients microsoft stated back port sso feature vista resolves issues users logging roaming profiles hotfix must downloaded installed authenticating via peap peap-mschapv2 windows vista based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 respond 802.1x authentication requests initial 802.1x authentication fails cause significant disruption clients hotfix available correct enterprises deploying rolling operating systems remotely worth noting windows pe native support 802.1x however support added winpe 2.1 winpe 3.0 hotfixes available microsoft although full documentation yet available preliminary documentation use hotfixes available via microsoft blog linux distributions support 802.1x via wpa_supplicant desktop integration like networkmanager eduroam international roaming service mandates use 802.1x authentication providing network access guests visiting eduroam enabled institutions bt british telecom plc employs identity federation authentication services delivered wide variety industries governments devices support 802.1x authentication examples include network printers ethernet-based electronics like environmental sensors cameras wireless phones devices used protected network environment alternative mechanisms must provided authenticate one option would disable 802.1x port leaves port unprotected open abuse another slightly reliable option use mab option mab configured port port first try check connected device 802.1x compliant reaction received connected device try authenticate aaa server using connected device mac address username password network administrator must make provisions radius server authenticate mac-addresses either adding regular users implementing additional logic resolve network inventory database many managed ethernet switches offer options summer 2005 microsoft steve riley posted article detailing serious vulnerability 802.1x protocol involving man middle attack summary flaw stems fact 802.1x authenticates beginning connection authentication possible attacker use authenticated port ability physically insert perhaps using workgroup hub authenticated computer port riley suggests wired networks use ipsec combination ipsec 802.1x would secure eapol-logoff frames transmitted 802.1x supplicant sent clear contain data derived credential exchange initially authenticated client therefore trivially easy spoof shared media used part targeted dos wired wireless lans eapol-logoff attack malicious third party access medium authenticator attached repeatedly sends forged eapol-logoff frames target device mac address authenticator believing targeted device wishes end authentication session closes target authentication session blocking traffic ingressing target denying access network 802.1x-2010 specification began 802.1af addresses vulnerabilities previous 802.1x specifications using macsec ieee 802.1ae encrypt data logical ports running top physical port ieee 802.1ar secure device identity devid authenticated devices stopgap enhancements widely implemented vendors extended 802.1x-2001 802.1x-2004 protocol allowing multiple concurrent authentication sessions occur single port prevents traffic devices unauthenticated mac addresses ingressing 802.1x authenticated port stop malicious device snooping traffic authenticated device provides protection mac spoofing eapol-logoff attacks ietf-backed alternative protocol carrying authentication network access pana also carries eap although works layer 3 using udp thus tied 802 infrastructure
[ 4116, 6071, 6788, 4926, 3172, 5637, 6795, 7623, 2644, 4321, 121, 3105, 7637, 4237, 309, 2659, 2119, 578, 3794, 5492, 3799, 2672, 5850, 5760, 2057, 7209, 5513, 6045, 3821, 6575, 3230, 4093, 1418, 7589, 1239, 5181, 7777, 2714, 3426 ]
Test
4,837
9
Wally_Feurzeig:wally feurzeig wallace wally feurzeig june 10 1927 – january 4 2013 co-inventor seymour papert cynthia solomon programming language logo well-known researcher artificial intelligence ai wallace feurzeig born chicago parents mandel pauline feurzeig earned bachelor philosophy bachelor science degrees university chicago master science degree illinois institute technology worked argonne national laboratory university chicago joining bolt beranek newman bbn early 1960s bolt beranek newman become major center computer science research innovative applications 1962 wally feurzeig joined firm work newly available facilities artificial intelligence department one earliest ai organizations colleagues actively engaged pioneering ai work computer pattern recognition natural-language understanding automated theorem proving lisp language development robot problem solving much work done collaboration distinguished researchers massachusetts institute technology mit marvin minsky john mccarthy regular bbn consultants early 1960s groups bbn original work cognitive science instructional research man-computer communication first work knowledge representation reasoning semantic networks question answering interactive computer graphics computer-aided instruction cai actively underway j. c. r. licklider spiritual scientific leader much work championing cause on-line interaction era almost computing done via batch processing wally initial focus expanding intellectual abilities extant teaching systems led first intelligent cai system mentor employed production rules support problem-solving interactions medical diagnosis decision-making domains 1965 wally organized bbn educational technology department development computer methods improve learning teaching focus work shifted investigating programming languages educational environments shift partly due two recent technological advances invention computer time-sharing development first high-level conversational programming language idea sharing computer cycles among autonomous users working simultaneously stirred imagination cambridge 1963 1964 bbn mit teams raced first realize concept bbn winning days holding first successful demonstration computer time-sharing 1964 bbn initial system designed sheldon boilen supported five simultaneous users dec pdp-1 sharing one cathode-ray tube crt screen output seeing dynamic displays several distinct programs simultaneously asynchronously time tune breathtaking experience time sharing made feasible economic use remote distributed terminals opened possibilities interactive computer use schools bbn recently implemented telcomp one new breed high-level interactive programming languages telcomp dialect joss first conversational interpreted language developed 1962–63 cliff shaw rand corporation syntax similar language basic yet appeared like basic telcomp fortran-derived language originally designed numerical computational applications shortly telcomp created wally decided introduce children tool teach mathematics 1965–66 u.s. office education support explored use auxiliary resource eight elementary secondary schools served bbn time-sharing system students introduced telcomp worked standard arithmetic algebra trigonometry problems writing telcomp programs project strongly confirmed expectations use interactive computation high-level interpretive language would highly motivating students wally collaborators research daniel bobrow richard grant cynthia solomon bbn consultant seymour papert recently arrived mit jean piaget institute geneva idea programming language expressly designed children arose directly project group realized extant languages designed computation generally lacked facilities nonnumeric symbolic manipulation current languages inappropriate education respects also often employed extensive data type declarations got way students expressive impetus serious deficiencies control structures programs lacked procedural constructs facilities dynamic definition execution well-developed articulate debugging diagnostic editing facilities essential educational uses
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 45, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 795, 6876, 6888, 7255, 1557, 5494, 5501, 6210, 144, 4074, 154, 4085, 7298, 5515, 8025, 3749, 6949, 5883, 6955, 1...
Test
4,838
4
Kenneth_P._Weiss:kenneth p. weiss kenneth p. weiss american entrepreneur human factors engineer inventor invented securid card trademark rsa security weiss holds bachelor degree university bridgeport continued graduate studies research university new hampshire temple university received doctorate neotarian fellowship founded security dynamics 1984 served ceo 1986 chairman board cto 1996 initiated purchase 1993 rsa security small encryption company working internet commerce 1994 security dynamics went public nasdaq stock exchange weiss company largest individual shareholder.. company developed sold securid card rsa encryption technologies computer security electronic commerce identity authentication resigned 1996 citing policy disagreements directors company operations policies company achieved market capitalization 4 billion 2006 company purchased emc corporation 1994 published article enumerating regarded seven significant flaws clipper chip initiative weiss ’ position article contributed abandonment multibillion-dollar u.s. government program weiss asserted would allowed electronic eavesdropping us citizen surveillance chip embedded private electronic communication equipment weiss taught penn state university bridgeport nasson college king college chairman psychology department seven years professor textbook author editorial board journal information systems security chairman identification authentication division american defense preparedness association committee computer security also member technology ethics committee information systems security association issa currently weiss founder ceo universal secure registry usr company based newton massachusetts develops technologies identification authentication mobile phone applications holds 22 u.s. patents well foreign patents weiss member american association advancement science honor societies sigma xi psi chi weiss also involved philanthropic work cape ann symphony rockport chamber music society gloucester stage co. gloucester schooner festival historical meeting house restoration cape ann historical association perfect storm foundation addison gilbert beverly hospitals lahey clinic political action groups
[ 3794, 1505, 1805, 7818 ]
Test
4,839
3
PlayStation_3_cluster:playstation 3 cluster considerable computing capability playstation 3 cell microprocessors raised interest using multiple networked ps3s various tasks require affordable high-performance computing national center supercomputing applications already built cluster based playstation 2 terra soft solutions version yellow dog linux playstation 3 sells ps3s linux pre-installed single units 8 32 node clusters addition rapidmind pushing stream programming package ps3 january 3 2007 dr. frank mueller associate professor computer science north carolina state university clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v2.5 gnu compiler collection cellsdk 1.1 summer 2007 gaurav khanna professor physics department university massachusetts dartmouth independently built message-passing based cluster using 8 ps3s running fedora linux cluster built support sony computer entertainment first cluster generated published scientific results dubbed ps3 gravity grid ps3 cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 khanna also created diy website build clusters accessible general public november 2010 air force research laboratory created powerful supercomputer nicknamed condor cluster connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyse high definition satellite imagery even single ps3 used significantly accelerate computations marc stevens arjen k. lenstra benne de weger demonstrated using single ps3 perform md5 bruteforce hours say essentially single playstation 3 performs like cluster 30 pcs price one november 2007 march 22 2007 sce stanford university expanded folding home project ps3 along thousands pcs already joined internet ps3 owners able lend computing power game systems study improper protein folding associated diseases alzheimer parkinson huntington cystic fibrosis several forms cancer software included part 1.6 firmware update march 22 2007 set run manually automatically ps3 idle cross media bar processed information sent back project central servers internet processing power ps3 users greatly contributing folding home project ps3s third nvidia amd gpus terms teraflops contributed march 2011 million ps3 owners allowed folding home software run systems 27,000 currently active total 8.1 petaflops comparison world powerful supercomputer november 2010 tianhe-ia peak performance 2.56 petaflops 2,566 teraflops latest report stated folding home passed 5 native petaflop mark 767 teraflops supplied playstation 3 clients computational biochemistry biophysics lab barcelona launched distributed computing project called ps3grid project expected run sixteen times faster equivalent project standard pc like distributed computing projects designed run computer idle ehits lightning first virtual screening molecular docking software ps3 released simbiosys reported bio-it world july 2008 application runs 30x faster single ps3 regular single cpu pc also runs ps3 clusters achieving screening huge chemical compound libraries matter hours days rather weeks used standard expectation march 28 2010 sony announced would disabling ability run operating systems v3.21 update due security concerns otheros update would affect existing supercomputing clusters due fact connected psn would forced update however would make replacing individual consoles compose clusters difficult impossible since newer models v3.21 higher would support linux installation directly caused end ps3 common use clustered computing though projects like condor still created older ps3 units come online april 1 2010 update released possible workaround might replace damaged tsop older ie ps3 fat consoles non-fatal hardware failures defective shaders ylod combined x-ray bga rework affected memory chips would acceptable applications principle would custom hardware dmca classed reverse engineering additional modifications would include upgrading thermal profile ie larger fan/more voltage replacing tsop completely socket surplus 256mb xd card installed place hackers already done development purposes
[ 6597, 450, 553, 5371, 5559, 7528, 6621, 4049, 4408, 4318, 481, 3458, 5042, 578, 4242, 5665, 7051, 4154, 1388, 1481, 5939, 4159, 4748, 1023, 1295, 5947, 2139, 4718, 3041, 239, 240, 1586, 602, 763, 515, 2601, 2873, 8024, 2961, 3578, 4993,...
Test
4,840
2
Dynamic_video_memory_technology:dynamic video memory technology dynamic video memory technology dvmt allows dynamic allocation system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance amount video memory dependent upon amount pre-allocated memory set system plus something called dvmt dvmt name implies dynamically allocates system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance technology used intel fulfill needs graphically demanding games
[ 496, 6945, 3262, 352, 1377, 6133, 4879, 742, 2332 ]
Test
4,841
4
Browser_isolation:browser isolation browser isolation cybersecurity model aims physically isolate internet user browsing activity associated cyber risks away local networks infrastructure browser isolation technologies approach model different ways seek achieve goal effective isolation web browser user browsing activity method securing web browsers browser-based security exploits well web-borne threats ransomware malware browser isolation technology delivered customers cloud hosted service known remote browser isolation rbi model enables organizations deploy browser isolation solution users without managing associated server infrastructure also client side approaches browser isolation based client-side hypervisors depend servers order isolate users browsing activity associated risks instead activity virtually isolated local host machine client-side solutions break security physical isolation model allow avoid server overhead costs associated remote browser isolation solutions browser isolation white paper includes high level overview browser isolation cybersecurity concept explains differences client server side browser isolation models architectures browser isolation typically leverages virtualization containerization technology isolate users web browsing activity away endpoint device significantly reducing attack surface rogue links files browser isolation way isolate web browsing hosts high-risk behaviors away mission-critical data infrastructure browser isolation process physically isolate users browsing activity away local networks infrastructure isolating malware browser based cyber-attacks process 2017 american research group gartner identified remote browser browser isolation one top technologies security gartner report also forecast 50 enterprises would actively begin isolate internet browsing reduce impact cyber attacks coming three years similar research conducted transparency market research shows remote browser isolation market projected reach us 5079.8 end 2025 expanding exceptional cagr 19.6 according market research media remote browser isolation rbi market forecast reach 10 billion 2024 growing cagr 30 period 2019-2024 unlike traditional web security approaches antivirus software secure web gateways browser isolation zero trust approach rely filtering content based known threat patterns signatures traditional approaches ca n't handle 0-day attacks since threat patterns unknown rather browser isolation approach treats websites web content explicitly whitelisted untrusted isolates local device virtual environment container virtual machine web-based files rendered remotely end users access within browser without downloading alternatively files sanitized within virtual environment using file cleansing technologies content disarm reconstruction cdr allowing secure file downloads user device typically browser isolation solutions provide users 'disposable non-persistent browser environments browsing session closed times entire browser environment reset known good state simply discarded malicious code encountered session thus prevented reaching endpoint persisting within network regardless whether threat detected way browser isolation proactively combats known unknown zero-day threats effectively complementing security measures contributing defense-in-depth layered approach web security browser isolation began evolution 'security physical isolation cybersecurity model also known air-gap model security professionals physically isolating critical networks users infrastructures cybersecurity purposes decades although techniques breach 'air-gapped systems exist typically require physical access close proximity air-gapped system order effective use air-gap makes infiltration systems public internet extremely difficult impossible without physical access system first commercial browser isolation platforms leveraged national nuclear security administration lawrence livermore national laboratory los alamos national laboratory sandia national laboratories 2009 browser isolation platforms based virtualization used deliver non-persistent virtual desktops thousands federal government users june 2018 defense information systems agency disa announced request information cloud-based internet isolation solution part endpoint security portfolio rfi puts “ service would redirect act internet browsing end user ’ desktop remote server external department defense information network. ” time rfi largest known project browser isolation seeking cloud based service leveraging concurrent simultaneous use licenses ~60 total user base 3.1 million users
[ 2961, 2791, 1376, 1494, 2577 ]
Test
4,842
2
Virtuozzo_(company):virtuozzo company virtuozzo privately held software company specializing virtualization software divested parallels company 2016 virtuozzo developed first commercially available operating system-level virtualization container technology 2000 open-sourced 2005 form openvz company founded 1997 name swsoft maintained headquarters herndon virginia additional offices throughout north america europe asia research development offices located moscow russia sales offices germany singapore january 2002 virtuozzo 2.0 containers virtualization solution released 2003 swsoft acquired makers plesk web hosting products expanded presence germany novosibirsk russia december 2007 acquisition parallels inc. swsoft company announced plans change name parallels distribute products parallels brand name december 2015 virtuozzo spun became standalone company lead entrepreneur former parallels exec rob lovell may 2016 virtuozzo announced intention join open container initiative plans develop dedicated cloud-based servers well specialized linux distribution month virtuozzo launched virtuozzo application catalog developed partnership bitnami virtuozzo announced strategic partnership jelastic august 2016 produce virtuozzo devops application orchestration platform aimed mid large size companies company named george karidis ceo november 2016 karidis previously headed cloud business unit compucom april 2017 virtuozzo partnered packet.net distribute virtuozzo software packet virtuozzo operating system-level server virtualization solution designed centralize server management consolidate workloads reducing number physical servers required organizations use virtuozzo server consolidation disaster recovery server workload agility virtuozzo generate virtual machine host os like traditional vm software instead creates isolated virtual private servers vpss single physical server instance software run multiple linux vpss linux windows time server vps performs exactly like stand-alone server rebooted independently virtuozzo linux became available 2001 version supports 32- 64-bit microprocessors became available 2005 2002 virtuozzo proved 2.5 version software could run 2,500 instances red hat linux eight-processor dell server result intel partnered virtuozzo 2002 develop partitioning technology ia-64 processors linux architectures support virtuozzo linux x86 ia64 amd64 em64t itanium virtuozzo linux enables multiple linux distributions exist simultaneously one server based openvz linux-based os-level virtualization technology allows physical server run multiple isolated operating system instances 2005 company updated virtuozzo support 64-bit x86 processors virtuozzo requires least pentium iii server least 1 gb memory 4 gb available hard drive virtuozzo ’ management tools compatible microsoft ’ viridian virtual server software virtuozzo container staging processed company container platform openvz virtuozzo 7 incorporated optimized kernel-based virtual machine released july 2016 2012 company released virtuozzo storage targeted container storage second version virtuozzo storage released 2017
[ 6262 ]
Test
4,843
2
COM_file:com file com file type simple executable file digital equipment operating systems 1970s codice_1 used filename extension text files containing commands issued operating system similar batch file introduction cp/m microcomputer operating system type files commonly associated com extension changed executable files convention later carried dos even complemented general exe file format executables compact com files remained viable frequently used dos codice_1 file name extension relation .com commercial top-level internet domain name however similarity name exploited malicious computer virus writers com format original binary executable format used cp/m including scp msx-dos well dos simple header exception cp/m 3 files contains standard metadata code data simplicity exacts price binary maximum size 65,280 ff00h bytes 256 bytes short 64 kb stores code data one segment since lacks relocation information loaded operating system pre-set address offset 0100h immediately following psp executed hence limitation executable size entry point fixed 0100h issue 8-bit machines since address 64k memory max 16-bit machines much larger address space format fell use intel 8080 cpu architecture 65,536 bytes memory could addressed address range 0000h ffffh cp/m first 256 bytes memory 0000h 00ffh reserved system use zero page user program loaded exactly 0100h executed com files fit model perfectly introduction mp/m concurrent cp/m possibility running one program command time program loaded 0100h run although file format dos cp/m .com files two operating systems compatible dos com files contain x86 instructions possibly dos system calls cp/m com files contain 8080 instructions cp/m system calls programs restricted certain machines could also contain additional instructions 8085 z80 .com files dos set x86 segment registers value sp stack pointer register fffeh thus stack begins top memory segment works original dos 1.x api derivative cp/m api program termination .com file would performed calling int 20h terminate program function else int 21h function 0 served purpose programmer also ensure code data segment registers contained value program termination avoid potential system crash although could used dos version microsoft recommended use int 21h function 4ch program termination dos 2.x onward require data code segment set value possible make .com file run operating systems form fat binary true compatibility instruction level instructions entry point chosen equal functionality different operating systems make program execution jump section operating system use basically two different programs functionality single file preceded code selecting one use cp/m 3 first byte com file c9h 256-byte header since c9h corresponds 8080 instruction codice_3 means com file immediately terminate run earlier version cp/m support extension instruction sets 8085 z80 supersets 8080 instruction set works three processors c9h invalid opcode 8088/8086 cause processor-generated interrupt 6 exception v86 mode 386 later x86 chips since c9h opcode leave since 80188/80186 therefore used first instruction valid program executable loader versions dos rejects com files start c9h avoiding crash files may names ending .com simple format described indicated magic number start file example command.com file dr dos 6.0 actually dos executable format indicated first two bytes mz 4dh 5ah initials mark zbikowski dos memory management provided com files loader execution environment memory simply available com file execution operating system command shell command.com reloaded leaves possibilities com file either simple using single segment arbitrarily complex providing memory management system example complex program command.com dos shell provided loader load com exe programs .com system larger programs available memory size loaded run system loader assumes code data first segment .com program provide organization programs larger available memory large data segments handled dynamic linking necessary code included .com program advantage using .com rather .exe format binary image usually smaller easier program using assembler compilers linkers sufficient power became available longer advantageous use .com format complex programs format still executable many modern windows nt-based platforms run ms-dos-emulating subsystem ntvdm present 64-bit variants com files executed also dos emulators dosbox platform supported emulators windows nt-based operating systems use .com extension small number commands carried ms-dos days although fact presently implemented .exe files operating system recognize .exe file header execute correctly despite technically incorrect .com extension fact .exe file renamed .com still execute correctly use original .com extensions commands ensures compatibility older dos batch files may refer full original filenames commands codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 dos directory contains com file exe file name extension specified com file preferentially selected execution example directory system path contains two files named codice_10 codice_11 following would execute codice_10 user wishing run codice_11 explicitly use complete filename taking advantage default behaviour virus writers malicious programmers used names like codice_14 creations hoping placed directory corresponding exe file command batch file may accidentally trigger program instead text editor codice_15 .com files may fact contain .exe format executable windows nt derivatives windows 2000 windows xp windows vista windows 7 pathext variable used override order preference acceptable extensions calling files without specifying extension command line default value still places codice_16 files codice_17 files closely resembles feature previously found jp software line extended command line processors 4dos 4os2 4nt computer virus writers hoped take advantage modern computer users likely lack knowledge .com file extension associated binary format along likely familiarity .com internet domain name e-mails sent attachment names similar www.example.com unwary microsoft windows users clicking attachment would expect begin browsing site named codice_18 instead would run attached binary command file named codice_19 giving full permission machine whatever author mind nothing malicious com file format exploitation coincidental name collision .com com mand files .com com mercial web sites
[ 1339, 3431, 6249, 4662, 6078, 6969, 4759, 2280, 6256, 1630, 5108, 2010, 5114, 1361, 21, 8087, 4779, 5571, 126, 5574, 3870, 6634, 2403, 5401, 3303, 1857, 3210, 5942, 3557, 6380, 2418, 7020, 4810, 336, 7032, 3664, 861, 5606, 5784, 1894, 2...
Test
4,844
8
MnoGoSearch:mnogosearch mnogosearch open-source search engine unix-like computer systems written c. distributed gnu general public license designed organize search within website group websites intranet local system mnogosearch index text/plain text/html text/xml data natively many others datatypes using external parsers engine ready index multilingual websites wide range character sets languages supported detected automatically uses content negotiation technology fetch versions page different languages perform diacritic-insensitive search segment phrases chinese japanese thai possible use synonyms ispell-based fuzzing extend search results results sorted relevance last modified time title windows version mnogosearch features graphical user interface sold commercial license march 2019 software longer maintained available
[ 80, 3915, 1435, 5571 ]
Test
4,845
3
CPUID:cpuid codice_1 instruction identified codice_1 opcode processor supplementary instruction name derived cpu identification x86 architecture allowing software discover details processor introduced intel 1993 introduced pentium sl-enhanced 486 processors program use codice_1 determine processor type whether features mmx/sse implemented prior general availability codice_1 instruction programmers would write esoteric machine code exploited minor differences cpu behavior order determine processor make model outside x86 family developers mostly still required use esoteric processes involving instruction timing cpu fault triggers determine variations cpu design present motorola 680x0 family -- never cpuid instruction kind -- certain specific instructions required elevated privileges could used tell various cpu family members apart 68000 offered unprivileged move sr 2 different cpus could told apart cpu error condition triggered codice_1 instruction specific x86 architecture architectures like arm often provide on-chip registers read prescribed ways obtain sorts information provided x86 cpuid instruction codice_1 opcode 0fh a2h two bytes a20fh single word assembly language codice_1 instruction takes parameters codice_1 implicitly uses eax register determine main category information returned intel recent terminology called cpuid leaf codice_1 called codice_10 first store eax register highest eax calling parameter leaf cpu implements obtain extended function information codice_1 called significant bit eax set determine highest extended function calling parameter call codice_1 codice_13 cpuid leaves greater 3 less 80000000 accessible model-specific registers ia32_misc_disable.boot_nt4 bit 22 0 default name suggests windows nt4 boot properly unless bit set later versions windows need basic leaves greater 4 assumed visible current windows systems basic valid leaves go 14h information returned leaves disclosed publicly available documentation i.e reserved recently added leaves also sub-leaves selected via ecx register calling cpuid returns cpu manufacturer id string twelve-character ascii string stored ebx edx ecx order highest basic calling parameter largest value eax set calling codice_1 returned eax list processors highest function implemented following known processor manufacturer id strings following known id strings virtual machines instance genuineintel processor values returned ebx 0x756e6547 edx 0x49656e69 ecx 0x6c65746e following code written gnu assembler x86-64 architecture displays vendor id string well highest calling parameter cpu implements returns cpu stepping model family information register eax also called signature cpu feature flags registers edx ecx additional feature info register ebx processor info feature flags manufacturer specific usually intel values used manufacturers sake compatibility reserved fields masked using processor identification purposes returns list descriptors indicating cache tlb capabilities eax ebx ecx edx registers returns processor serial number processor serial number introduced intel pentium iii due privacy concerns feature longer implemented later models psn feature bit always cleared transmeta efficeon crusoe processors also provide feature amd cpus however implement feature cpu models intel pentium iii cpus serial number returned edx ecx registers transmeta efficeon cpus returned ebx eax registers transmeta crusoe cpus returned ebx register note processor serial number feature must enabled bios setting order function two leaves used processor topology thread core package cache hierarchy enumeration intel multi-core hyperthreaded processors amd use leaves alternate ways core enumeration unlike cpuid leaves leaf bh return different values edx depending logical processor cpuid instruction runs value returned edx actually x2apic id logical processor x2apic id space continuously mapped logical processors however gaps mapping meaning intermediate x2apic ids n't necessarily correspond logical processor additional information mapping x2apic ids cores provided registers although leaf bh sub-leaves selected ecx described value returned edx affected logical processor instruction running subleaf processor topology exposed leaf bh hierarchical one strange caveat order logical levels hierarchy n't necessarily correspond order physical hierarchy smt/core/package however every logical level queried ecx subleaf bh leaf correspondence level type either smt core invalid level id space starts 0 continuous meaning level id invalid higher level ids also invalid level type returned bits 15:08 ecx number logical processors level queried returned ebx finally connection levels x2apic ids returned eax 4:0 number bits x2apic id must shifted order obtain unique id next level example dual-core westmere processor capable hyperthreading thus two cores four threads total could x2apic ids 0 1 4 5 four logical processors leaf bh =eax subleaf 0 =ecx cpuid could instance return 100h ecx meaning level 0 describes smt hyperthreading layer return 2 ebx two logical processors smt units per physical core value returned eax 0-subleaf 1 case shifting aforementioned x2apic ids right one bit gives unique core number next level level id hierarchy erases smt id bit inside core simpler way interpret information last bit bit number 0 x2apic id identifies smt/hyperthreading unit inside core example advancing subleaf 1 making another call cpuid eax=bh ecx=1 could instance return 201h ecx meaning core-type level 4 ebx 4 logical processors package eax returned could value greater 3 happens bit number 2 used identify core x2apic id note bit number 1 x2apic id used example however eax returned level could well 4 happens clarkdale core i3 5x0 also gives unique id package level =0 obviusly shifting x2apic id 4 bits finally may wonder eax=4 leaf tell us n't find already eax 31:26 returns apic mask bits reserved package would 111b example bits 0 2 used identifying logical processors inside package bit 1 also reserved although used part logical processor identification scheme words apic ids 0 7 reserved package even though half values n't map logical processor cache hierarchy processor explored looking sub-leaves leaf 4 apic ids also used hierarchy convey information different levels cache shared smt units cores continue example l2 cache shared smt units core physical cores westmere indicated eax 26:14 set 1 information l3 cache shared whole package indicated setting bits least 111b cache details including cache type size associativity communicated via registers leaf 4 beware older versions intel app note 485 contain misleading information particularly respect identifying counting cores multi-core processor errors misinterpreting information even incorporated microsoft sample code using cpuid even 2013 edition visual studio also sandpile.org page cpuid intel code sample identifying processor topology correct interpretation current intel software developer ’ manual clear language open source cross-platform production code wildfire games also implements correct interpretation intel documentation topology detection examples involving older pre-2010 intel processors lack x2apic thus n't implement eax=bh leaf given 2010 intel presentation beware using older detection method 2010 newer intel processors may overestimate number cores logical processors old detection method assumes gaps apic id space assumption violated newer processors starting core i3 5x0 series newer processors also come x2apic topology correctly determined using eax=bh leaf method returns extended feature flags ebx ecx edx highest calling parameter returned eax returns extended feature flags edx ecx amd feature flags follows return processor brand string eax ebx ecx edx codice_1 must issued parameter sequence get entire 48-byte null-terminated ascii processor brand string necessary check whether feature present cpu issuing codice_1 codice_13 first checking returned value greater equal 80000004h function contains processor ’ l1 cache tlb characteristics returns details l2 cache ecx including line size bytes type associativity encoded 4 bits cache size function provides advanced power management feature identifiers returns largest virtual physical address sizes eax bits 07-00 physical address bits bits 15-8 linear address bits bits 31-16 reserved 0 could used hypervisor virtual machine system report physical/virtual address sizes possible virtual cpu specific amd k7 k8 cpus returns string hammer time eax ebx ecx edx information easy access languages well instance c code gcc prints first five values returned cpuid generally useful c implementation works 32- 64-bit systems gcc also provides header called codice_18 systems cpuid codice_19 macro expanding inline assembly typical usage would one requested extended feature present cpu would notice might get random unexpected results safer version also provided codice_18 checks extended features safety checks output values passed using reference-like macro parameters conventional pointers notice ampersands codice_21 conditional statement codice_22 call receives correct request return non-zero value fails zero microsoft visual c compiler builtin function codice_23 cpuid instruction may embedded without using inline assembly handy since x86-64 version msvc allow inline assembly program msvc would borland/embarcadero c compilers bcc32 native asm function calls necessary asm implementation pseudo code many interpreted compiled scripting languages capable using cpuid via ffi library one implementation shows usage ruby ffi module execute assembly language includes cpuid opcode non-x86 cpu architectures also provide certain forms structured information processor abilities commonly set special registers dsp transputer-like chip families taken instruction noticeable way spite relative terms many variations design alternate ways silicon identification might present example dsps texas instruments contain memory-based register set functional unit starts identifiers determining unit type model asic design revision features selected design phase continues unit-specific control data registers access areas performed simply using existing load store instructions thus devices need extending register set device identification purposes according note former intel app note 485 specifically cpuid incorporated intel® 64 ia-32 architectures software developer ’ manual manual however still directs reader app note 485 information latest published version app note 485 dating may 2012 available via archive.org app note 485 contains information easily misinterpreted though particularly respect big intel manuals tend lag behind intel isa document available top page updated even processors yet publicly available thus usually contains cpuid bits example writing isa book revision 19 dated may 2014 documents clflushopt bit leaf 7 big manuals although apparently up-to-date revision 51 dated june 2014 n't mention
[ 5012, 4293, 4295, 6079, 3948, 1454, 14, 5737, 1465, 2567, 5042, 742, 5055, 2226, 6133, 1881, 5431, 780, 5799, 2989, 6523, 1547, 7990, 4077, 6563, 2332, 3747, 1237, 6236, 5884, 6956, 5190, 1248, 2000, 6616, 1638, 2014, 4137, 2744, 5934, ...
Test
4,846
3
UDOO:udoo udoo single-board computer integrated arduino due compatible microcontroller designed computer science education world makers internet things product launched kickstarter april 2013 reaching wide consensus product line involves three single board computers – udoo quad/dual 2013 udoo neo 2015 udoo x86 2016 – differ various aspects plus udoo blu set udoo bricks udoo development platform merges dual quad core arm freescale cortex-a9 i.mx 6 cpu run linux android operating systems arduino due compatible board dedicated arm atmel sam3x8e cpu udoo joint effort aidilab srl seco usa inc collaboration multidisciplinary team researchers expertise interaction design embedded systems sensor networks cognitive science udoo project launched kickstarter april 9 2013 aidilab — siena university startup — seco embedded computing firm reached goal 27,000 40 hours goal well exceeded 4,172 backers pledged 641,614 udoo board equipped two cpus freescale i.mx 6 arm cortex a9 processor based arm v7 instruction set next generation graphics high-definition video central i.mx 6 series i.mx 6 series supports 1080p60 video playback enabling exceptional high-quality videos low power consumption devices playing high-definition content 3d graphics engine top line i.mx 6 quad i.mx 6 dual processors capable providing 200 mt/s enables ultra-vivid realistic graphics critical multimedia applications combine power main cores until-now-untapped potential 3d engine perform computational tasks otherwise atmel sam3x implements real-time computing allows full compatibility arduino due prototyping board solution udoo used like arduino due microcontroller programmed way stand-alone different clocks shared memory process tasks asynchronously without kind emulation however share communication channels i.mx 6 dual/6 quad application processors latest additions freescale semiconductor growing family multimedia-focused products offering high performance processing optimized lowest power consumption i.mx 6 dual/6 quad processors feature freescale advanced implementation arm cortex-a9 core interfaced ddr3-1066 lv-ddr3-1066 lpddr2-1066 single dual channel dram memory devices i.mx 6 dual/6 quad processor based arm cortex a9 mpcore platform following features arm cortex a9 mpcore complex includes i.mx 6 quad processor makes use dedicated hardware accelerators order meet targeted multimedia performance use hw accelerators key factor inobtaining high performance low power consumption numbers keeping cpu core relatively free perform tasks i.mx 6 quad processor incorporates following hardware accelerators miscellaneous ips interfaces atmel ’ sam3x/a series member family flash microcontrollers based high performance 32-bit arm cortex-m3 risc processor operates maximum speed 84 mhz features 512 kbytes flash 100 kbytes sram peripheral set includes high speed usb host device port embedded transceiver ethernet mac 2x cans high speed mci sdio/sd/mmc external bus interface nand flash controller 5x uarts 2x twis 4x spis well 1 pwm timer 9x general-purpose 32- bit timers rtc 12-bit adc 12-bit dac sam3x/a series ready capacitive touch thanks qtouch library offering easyway implement buttons wheels sliders sam3x/a architecture specifically designed sustain high speed data transfers includes multi-layer bus matrix well multiple sram banks pdc dma channels enable run tasks parallel maximize data throughput operates 1.62v 3.6v available 100- 144-pin qfp lfbga packages sam3x/a devices particularly well suited networking applications industrial home/building automation gateways freescale i.mx 6 atmel sam3x connected uart serial port embedded board works exactly like arduino connected external computer usb cable sam3x linux communicate two way channel exchanging messages tested baudrate 115200 serial connection also accessible external pins 0 1 arduino compatible pinout sam3x programming port accessible way arduino due via usb-to-serial converter directly external pinout serial uart connected imx 6 pins keyrow0 keycol0 sam3x side connected pins urxd utxd shared serial also available micro-usb plug cn6 removing j18 jumper communicate channel becomes shared udoo uses 4 micron mt41j256m16re-15e ram modules 2gbit module total 1gbyte clock frequency 400mhz udoo dual 528mhz udoo quad memory system consists following levels mac-net core conjunction 10/100/1000 mac implements layer 3 network acceleration functions functions designed accelerate processing various common networking protocols ip tcp udp icmp providing wire speed services client applications udoo uses ksz9031rnx ethernet transceiver completely integrated triple-speed 10base-t/100base-tx/1000base-t ethernet physical layer transceiver transmission reception data standard cat-5 unshielded twisted pair utp cable ksz9031rnx provides reduced gigabit media independent interface rgmii direct connection rgmii macs gigabit ethernet processors switches data transfer 10/100/1000 mbit/s ksz9031rnx reduces board costs simplifies board layout using on-chip termination resistors four differential pairs integrating ldo controller drive low-cost mosfet supply 1.2v core gwf-3m08 wlan module supporting ieee 802 11 b/g/n standards 6-pin connector supporting usb 2.0 /1.1 interface small form factor low cost compact wlan module designed wireless connectivity products embedded system module operates 2.4 ghz ism frequency band applies highly integrated mac/bbp rf single chip rt5370 150mbit/s phy rate supporting module built-in embedded applications ip camera ip set top box gps internet radio apparatus directly soldered main pcb features front connectors ports up-side connectors ports summary features gpu3d includes udoo provides one two i.mx 6 lvds outputs external pinout input used communicate rgb data controls external lcd displays lvds interface lvds receivers lvds port may used one single-channel output boot android otg bus switched connect sam3x therefore connection two processors plug usb cable cn3 ’ work since disconnected setup i.mx 6 communicate sam3x using android adk protocol must program sam3x sketch includes specific libraries installs app android configured use adk protocol udoo based dual quad core arm cortex-a9 cpu delivering great performance android linux os dedicated arm processor gpio specifications available accessories udoo board comes two micro sd card optional android ubuntu linux installed
[ 2538, 7960, 7519, 804, 1167, 5208, 469, 1000, 3365, 6720, 5740, 7730, 5571, 1556, 7905, 578, 1284, 5750, 6910, 7990, 7654, 5055, 6919, 1864, 6378, 1772, 1779, 950, 1977, 5079, 2155, 352 ]
Test
4,847
3
Out-of-order_execution:out-of-order execution computer engineering out-of-order execution formally dynamic execution paradigm used high-performance central processing units make use instruction cycles would otherwise wasted paradigm processor executes instructions order governed availability input data execution units rather original order program processor avoid idle waiting preceding instruction complete meantime process next instructions able run immediately independently out-of-order execution restricted form data flow computation major research area computer architecture 1970s early 1980s important academic research subject led yale patt hpsm simulator paper james e. smith a. r. pleszkun published 1985 completed scheme describing precise behavior exceptions could maintained out-of-order machines arguably first machine use out-of-order execution cdc 6600 1964 uses scoreboard resolve conflicts although modern usage scoreboarding considered in-order execution out-of-order execution since machines stall first raw conflict – strictly speaking machines initiate execution in-order although may complete execution out-of-order three years later ibm system/360 model 91 1966 introduced tomasulo algorithm makes full out-of-order execution possible 1990 ibm introduced first out-of-order microprocessor power1 although out-of-order execution limited floating-point instructions also case model 91 1990s out-of-order execution became common featured ibm/motorola powerpc 601 1993 fujitsu/hal sparc64 1995 intel pentium pro 1995 mips r10000 1996 hp pa-8000 1996 amd k5 1996 dec alpha 21264 1996 notable exceptions trend include sun ultrasparc hp/intel itanium intel atom silvermont architecture ibm power6 high logical complexity out-of-order technique reason reach mainstream machines mid-1990s many low-end processors meant cost-sensitive markets still use paradigm due large silicon area required implementation low power usage another design goal harder achieve out-of-order execution oooe design vulnerability microprocessor manufacturers implementations out-of-order execution mechanism reported manufacturers june 1 2017 publicized january 2018 exploitable vulnerability led millions vulnerable systems vulnerability named spectre similar vulnerability meltdown disclosed time took advantage assumption manufacturers made loading data processor cache allowing data cached privileged security boundary resulted race condition could timed leak privileged information earlier processors processing instructions performed instruction cycle normally consisting following steps new paradigm breaks processing instructions steps key concept oooe processing allow processor avoid class stalls occur data needed perform operation unavailable outline oooe processor avoids stall occurs step 2 in-order processor instruction completely ready processed due missing data oooe processors fill slots time instructions ready re-order results end make appear instructions processed normal way instructions ordered original computer code known program order processor handled data order order data operands become available processor registers fairly complex circuitry needed convert one ordering maintain logical ordering output processor runs instructions seemingly random order benefit oooe processing grows instruction pipeline deepens speed difference main memory cache memory processor widens modern machines processor runs many times faster memory time in-order processor spends waiting data arrive could processed large number instructions one differences created new paradigm creation queues allows dispatch step decoupled issue step graduation stage decoupled execute stage early name paradigm decoupled architecture earlier in-order processors stages operated fairly lock-step pipelined fashion instructions program may run correct order long end result correct separates fetch decode stages execute stage pipelined processor using buffer buffer purpose partition memory access execute functions computer program achieve high-performance exploiting fine-grain parallelism two effectively hides memory latency processor perspective larger buffer theory increase throughput however processor branch misprediction entire buffer may need flushed wasting lot clock cycles reducing effectiveness furthermore larger buffers create heat use die space reason processor designers today favour multi-threaded design approach decoupled architectures generally thought useful general purpose computing handle control intensive code well control intensive code include things nested branches occur frequently operating system kernels decoupled architectures play important role scheduling long instruction word vliw architectures avoid false operand dependencies would decrease frequency instructions could issued order technique called register renaming used scheme physical registers defined architecture physical registers tagged multiple versions architectural register exist time queue results necessary resolve issues branch mispredictions exceptions/traps results queue allows programs restarted exception requires instructions completed program order queue allows results discarded due mispredictions older branch instructions exceptions taken older instructions ability issue instructions past branches yet resolve known speculative execution
[ 704, 2903, 5012, 1447, 5371, 3948, 1083, 7527, 7529, 722, 5737, 4318, 7541, 2567, 1473, 4694, 5042, 3294, 1481, 5055, 5405, 2226, 1867, 67, 2248, 4365, 6148, 4372, 780, 2257, 3674, 441, 6865, 2266, 446, 451, 4765, 5472, 4047, 3008, 5483...
Test
4,848
2
Media_Foundation:media foundation media foundation mf com-based multimedia framework pipeline infrastructure platform digital media windows vista windows 7 windows 8 windows 8.1 windows 10 intended replacement microsoft directshow windows media sdk directx media objects dmos so-called legacy multimedia apis audio compression manager acm video windows vfw existing directshow technology intended replaced media foundation step-by-step starting features time co-existence media foundation directshow media foundation available previous windows versions including windows xp first release present windows vista focuses audio video playback quality high-definition content i.e hdtv content protection unified approach digital data access control digital rights management drm interoperability integrates dxva 2.0 offloading video processing pipeline hardware better performance videos processed colorspace encoded handed hardware composes image native colorspace prevents intermediate colorspace conversions improve performance mf includes new video renderer called enhanced video renderer evr next iteration vmr 7 9 evr better support playback timing synchronization uses multimedia class scheduler service mmcss new service prioritizes real time multimedia processing reserve resources required playback without tearing glitches second release included windows 7 introduces expanded media format support dxva hd acceleration hd content wddm 1.1 drivers used mf architecture divided control layer core layer platform layer core layer encapsulates functionality media foundation consists media foundation pipeline three components media source media sink media foundation transforms mft media source object acts source multimedia data either compressed uncompressed encapsulate various data sources like file network server even camcorder source specific functionality abstracted common interface source object use source resolver object creates media source uri file bytestream support non-standard protocols added creating source resolver source object also use sequencer object use sequence sources playlist coalesce multiple sources single logical source media sink recipient processed multimedia data media sink either renderer sink renders content output device archive sink saves content onto persistent storage system file renderer sink takes uncompressed data input whereas archive sink take either compressed uncompressed data depending output type data media sources sinks acted upon mfts mfts certain functions transform data another form mfts include multiplexers demultiplexers codecs dsp effects like reverb core layer uses services like file access networking clock synchronization time multimedia rendering part platform layer provides services necessary accessing source sink byte streams presentation clocks object model lets core layer components function asynchronously generally implemented os services pausing stopping fast forward reverse time-compression achieved controlling presentation clock however media pipeline components connected rather presented discrete components application running control layer choose source types transforms sinks needed particular video processing task hand set connections components topology complete data flow pipeline example play back compressed audio/video file pipeline consist file source object demultiplexer specific file container format split audio video streams codecs decompress audio video streams dsp processors audio video effects finally evr renderer sequence video capture application camcorder act video audio sources codec mfts work compress data feed multiplexer coalesces streams container finally file sink network sink write file stream network application also co-ordinate flow data pipeline components control layer pull request samples one pipeline component pass onto next component order achieve data flow within pipeline contrast directshow push model pipeline component pushes data next component media foundation allows content protection hosting pipeline within protected execution environment called protected media path control layer components required propagate data pipeline rate rendering synchronizes presentation clock rate time rendering embedded part multimedia stream metadata source objects extract metadata pass metadata two types coded metadata information bit rate presentation timings descriptive metadata like title author names coded metadata handed object controls pipeline session descriptive metadata exposed application use chooses media foundation provides media session object used set topologies facilitate data flow without application explicitly exists control layer exposes topology loader object application specifies required pipeline topology loader creates necessary connections components media session object manages job synchronizing presentation clock creates presentation clock object passes reference sink uses timer events clock propagate data along pipeline also changes state clock handle pause stop resume requests application theoretically one media foundation architecture media session pipeline media source transform media sink model however architecture complex set considerable scope lightweight relatively easy configure mf components designed handle processing media data simple point solutions thus practical considerations necessitated implementation variations fundamental pipeline design components source reader sink writer operate outside pipeline model developed sources split media foundation architecture three general classes pipeline architecture distinguished use distinct media session object pipeline media data flows one media sources one media sinks optionally zero media transforms media session manages flow media data pipeline pipeline multiple forks branches mf application get access media data traverses media source media sink implementing custom media transform component inserting appropriate location pipeline reader-writer architecture uses component called source reader provide media data sink writer component consume source reader contain type internal pipeline accessible application source reader media source sink writer media sink neither directly included pipeline managed media session general media data flows source reader sink writer actions application application either take packets media data called media samples source reader give directly sink writer set callback function source reader performs operation effect manages data transport application performs similar role media session pipeline architecture application since mf application manages transmission media samples source reader sink writer always access raw media data source reader sink writer components limited ability automatically load media transforms assist conversion format media data however done internally application little control source reader sink writer provide ease use pipeline architecture offers extremely sophisticated control flow media data however many components available pipeline enhanced video renderer simply readily usable reader-writer architecture application since structure media sample produced source reader identical output media source possible set pipeline architecture media samples intercepted pass pipeline copy given media sink known hybrid architecture makes possible application takes advantage sophisticated processing abilities media session pipeline utilizing ease use sink writer sink writer part pipeline interact media session effect media data processed special media sink called sample grabber sink consumes media data hands copy sink writer also possible implement hybrid architecture custom media transform copies media samples passes sink writer pass pipeline cases special component pipeline effectively acts like simple reader-writer application feeds sink writer general hybrid architectures use pipeline sink writer theoretically possible implement mechanism source reader could somehow inject media samples pipeline unlike sample grabber sink standard component exists media foundation transforms mfts represent generic model processing media data used media foundation primarily implement decoders encoders mixers digital signal processors dsps – media sources media sinks media foundation transforms evolution transform model first introduced directx media objects dmos behaviors clearly specified hybrid dmo/mft objects also created applications use mfts inside media foundation pipeline use directly stand-alone objects mfts following type microsoft recommends developers write media foundation transform instead directshow filter windows vista windows 7 windows 8 video editing video capture microsoft recommends using directshow primary focus media foundation windows vista starting windows 7 mfts also support hardware-accelerated video processing encoding decoding avstream-based media devices media foundation uses enhanced video renderer evr rendering video content acts mixer well mix 16 simultaneous streams first stream reference stream reference stream per-pixel transparency information well specified z-order reference stream transparent pixels fixed z-order position back streams final image composited onto single surface coloring pixel according color transparency corresponding pixel streams internally evr uses mixer object mixing streams also deinterlace output apply color correction required composited frame handed presenter object schedules rendering onto direct3d device shares dwm applications using device frame rate output video synchronized frame rate reference stream streams called substreams different frame rate evr discards extra frames substream higher frame rate uses frame lower frame rate windows media audio windows media video default supported formats encoding media foundation windows vista decoding mp3 file source available windows vista read mp3 streams mp3 file sink output mp3 available windows 7 format support extensible however developers add support formats writing encoder/decoder mfts and/or custom media sources/media sinks windows 7 expands upon codec support available windows vista includes avi wav aac/adts file sources read respective formats mpeg-4 file source read mp4 m4a m4v mp4v mov 3gp container formats mpeg-4 file sink output mp4 format similar windows vista transcoding encoding support exposed built-in windows application several codecs included media foundation transforms mfts addition windows media audio windows media video encoders decoders asf file sink file source introduced windows vista windows 7 includes h.264 encoder baseline profile level 3 main profile support aac low complexity aac-lc profile encoder playback various media formats windows 7 also introduces h.264 decoder baseline main high-profile support level 5.1 aac-lc he-aac v1 sbr multichannel he-aac v2 ps stereo decoders mpeg-4 part 2 simple profile advanced simple profile decoders includes decoding popular codec implementations divx xvid nero digital well mjpeg dv mft decoders avi windows media player 12 uses built-in media foundation codecs play formats default midi playback also yet supported using media foundation applications support media foundation include application uses protected media path windows also uses media foundation
[ 7149, 6420, 714, 720, 1460, 7176, 2928, 7907, 5747, 2953, 6840, 422, 435, 4017, 6504, 4022, 4026, 7607, 1526, 458, 3687, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4129, 8073, 2018, 8085, 6989, 699...
Test
4,849
4
MIRACL_(security_firm):miracl security firm miracl formally known certivox london-based web 2.0 security firm develops information security infrastructure service iaas encryption based software service saas solutions enterprises individuals company provides on-demand encryption key management multi-factor authentication cloud specializes elliptical curve cryptography red herring selected miracl finalist 2012 europe top 100 brian spector founded certivox data security specialists 2008 help people protect business individual privacy company opened offices shoreditch 2011 company partnered low-power customer specific standard product cssp provider quicklogic february 2012 efforts jointly develop data security solutions across platforms also february company acquired shamus software creator miracl cryptographic library 2011 certivox received 1.46 million series funding led pentech ventures octopus investments 2012 launched service called privatesky allowing users encrypt messages large files 5gb design offered government businesses individuals one-click security microsoft outlook html5 web browsers however privatesky taken offline company following ripa warrant gchq national technical assistance centre ntac wanted decryption keys customer data certivox launched m-pin strong authentication system july 2013 january 2016 company changed name miracl name acronym multiprecision integer rational arithmetic cryptographic library created dublin city university school computing 1988 company acquired purchase shamus software 2012 ceo shamus software google scholar dr. michael scott also joined miracl chief cryptographer reason given name change reflect “ pivot mission business providing individual products offering complete solutions potential transform industry ”
[ 7865, 330, 84 ]
Test
4,850
5
Bias_tee:bias tee bias tee three-port network used setting dc bias point electronic components without disturbing components bias tee diplexer low-frequency port used set bias high-frequency port passes radio-frequency signals blocks biasing levels combined port connects device sees bias rf called tee 3 ports often arranged shape t. conceptually bias tee viewed ideal capacitor allows ac blocks dc bias ideal inductor blocks ac allows dc although bias tees made simple inductor capacitor wideband bias tees considerably complicated practical components parasitic elements bias tees designed transmission-line environments typically characteristic impedance z 50 ohms 75 ohms impedance capacitor x chosen much less z impedance inductor x chosen much greater z ω angular frequency radians per second f frequency hertz bias tees designed operate range signal frequencies reactances chosen minimal impact lowest frequency wide-range bias tees inductor must large lowest frequency large inductor stray capacitance creates self-resonant frequency high enough frequency stray capacitance presents low-impedance shunt path signal bias tee becomes ineffective practical wide-band bias tees must use circuit topologies avoid shunt path instead one inductor series string inductors addition additional resistors capacitors prevent resonances example picosecond pulse labs model 5580 bias tee works 10 khz 15 ghz consequently simple design would need inductance least 800 μh x j 50 ohms 10 khz inductor must still look like inductor 15 ghz however commercial 820 μh inductor self-resonant frequency 1.8 mhz – four orders magnitude low johnson gives example wideband microstrip bias tee covering 50 khz 1 ghz using four inductors 330 nh 910 nh 18 µh 470 µh series design cribbed commercial bias tee modeled parasitic element values simulated results optimized component selection show advantage additional components johnson provided simulation bias tee used inductors capacitors without q suppression johnson provides simulated actual performance details girardi duplicated improved johnson design points additional construction issues bias tee used insert dc power ac signal power remote antenna amplifiers devices usually positioned receiving end coaxial cable pass dc power external source coaxial cable running powered device bias “ ” consists feed inductor deliver dc connector device side blocking capacitor keep dc passing receiver rf signal connected directly one connector blocking capacitor series internal blocking diode prevents damage bias “ ” reverse supply voltage applied bias tees used variety applications generally used provide rf signal dc power remote device running two separate cables would advantageous biasing often used photodiodes vacuum solid state microchannel plate detectors transistors triodes high frequencies signal leak common power supply rail conversely noise power supply appear signal line examples include power ethernet active antennas low-noise amplifiers converters telephone line plain old telephone service early microphones use bias tee circuit—often gyrator replacing inductor—this enables thin cable 2 conductors send power system device send audio device back system modern microphones often use 3 conductors phantom power circuit similar bias tee circuit several bias tee designs construction horizontal bar based rigid coaxial cable air dielectric radius chosen large possible without allowing higher modes design bias based upon power going remote device seen base station receiver using capacitor rf output terminal effectively creating open circuit dc current incoming rf signal one antenna output dc power front-end bias typically consists bandpass filter low noise amplifier mixer coupled local oscillator one point small slice cut center conductor therefore capacitor formed low frequencies blocked kind capacitor advantage nearly invisible higher frequencies pass frequencies 1 mhz capacitance increased dielectric like npo multiplies capacitance factor 65 thickness capacitor minimal without leading electric breakdown dielectric means avoid peaks electric field means smooth electrodes rounded edges dielectric protruding electrodes doorknob design stack capacitors used every capacitor needs access surface inner conductor hidden behind another capacitor high frequencies wo n't see electric field needs lot time travel dielectric high dielectric constant small coil made fine wire air core mnfezn-core connects inner conductor one sides capacitor port outer conductor leading t. frequencies 1 ghz hit coil side apply equal electric field whole coil therefore higher modes excited within coil inductiveness coil almost current leaks center conductor port frequencies 1 mhz 1 ghz leak port second coil cone shaped core outside outer conductor inside housing avoid interference components cone acts like tapered transmission line transformer starts high impedance lot power reflected rest travel coil leakage low frequency port oscillations capacitor coil composed lc circuit damped dielectric core also small coil 10 ohm resistance damp oscillations avoid ripple transmitted spectrum
[]
Test
4,851
3
Tashiro_Masashi_no_Princess_ga_Ippai:tashiro masashi princess ga ippai story hero masashi tashiro rescue four princesses distress one happy ending four unhappy endings used game becoming one first video games multiple endings game successful started appearing frequently getting high prices online auction sites like yahoo 2000 masashi tashiro arrested convicted several times connection voyeurism drug abuse
[ 6092 ]
Test
4,852
7
MongoDB_Inc.:mongodb inc. mongodb inc. formerly 10gen american software company develops provides commercial support open source database mongodb nosql database stores data json-like documents flexible schemas company first established 2007 10gen based new york city 10gen founded former doubleclick founder cto dwight merriman former doubleclick ceo gilt groupe founder kevin p. ryan former doubleclick engineer shopwiki founder cto eliot horowitz received 81 million venture capital funding flybridge capital partners in-q-tel intel capital new enterprise associates nea red hat sequoia capital union square ventures 10gen originally aimed build platform service architecture based entirely open source components however company unable find existing database platform met principles cloud architecture result company began develop document-oriented database system called mongodb realizing potential software 10gen team decided scrap cloud platform focus maintaining mongodb instead february 2009 10gen released mongodb open source project 10gen opened first west coast office august 2010 offices palo alto reston london dublin barcelona sydney 2012 september 2012 10gen named top software company number 9 overall wall street journal next big thing 2012 april 2013 10gen moved old new york times building office located prince st. august 27 2013 10gen announced would change name mongodb inc. associating closely ultimately became flagship products august 5 2014 dev ittycheria appointed president chief executive officer mongodb inc primary technology product open source nosql database mongodb mongodb inc. employs developers mongodb july 2018 mongodb database downloaded 40 million times 2016 mongodb inc launched mongodb atlas fully managed database service offering atlas available 50 regions amazon web services microsoft azure google cloud platform contains features global clusters automated provisioning upgrades backup restore monitoring 2018 mongodb inc launched mongodb stitch serverless platform stitch provides four core services march 2010 mongodb announced would offer commercial support mongodb mongodb subscription offering includes access mongodb enterprise professional support commercial licensing mongodb 2.4 release mongodb introduced mongodb enterprise part subscription offering mongodb enterprise contains monitoring security features kerberos authentication role-based privileges mongodb 4.0 mongodb enterprise version contains following features ops manager on-premises solution managing mongodb ops manager available part mongodb enterprise advanced subscription features comprehensive support mongodb best sla cloud manager cloud based solution managing mongodb cloud manager automates provisioning aws automation agent installed user mongodb compass allows quickly visualize structure data database perform ad hoc queries – zero knowledge mongodb query language mongodb charts data visualization tool allowing users create graphs charts maps tables json data stored mongodb database mongodb connector bi allows use bi tool choice visualize discover report mongodb data using standard sql queries mongodb world annual developer conference hosted mongodb inc started 2014 mongodb world provides multi-day opportunity communities experts mongodb network learn peers research upcoming trends interesting use cases hear new releases developments mongodb inc. major participants include developers operators cios ctos september 2012 company announced partnership edx offer free mongodb training online 47,000 enrollments first mongodb online education courses 2012 june 2018 1,000,000 course registrations mongodb university addition online education mongodb university offers public training classes well on-site training mongodb inc. known 10gen received funding u.s. government cia-sponsored venture capital arm in-q-tel source concern india
[ 2961, 4924, 6586 ]
Validation
4,853
9
SuperCollider:supercollider supercollider environment programming language originally released 1996 james mccartney real-time audio synthesis algorithmic composition since evolving system used developed scientists artists working sound efficient expressive dynamic programming language providing framework acoustic research algorithmic music interactive programming live coding released terms gplv2 2002 supercollider free open-source software starting version 3 supercollider environment split two components server scsynth client sclang components communicate using osc open sound control sc language combines object-oriented structure smalltalk features functional programming languages c-family syntax sc server application supports simple c c++ plugin apis making easy write efficient sound algorithms unit generators combined graphs calculations external control server happens via osc possible use languages applications supercollider sound generation bundled optimised command-line executable named scsynth cases controlled within supercollider programming language used independently audio server following features supernova independent implementation server architecture adds multi-processor support explicit parallel grouping synthesis nodes supercollider programming language dynamically typed garbage-collected single-inheritance object-oriented functional language similar smalltalk syntax similar lisp c programming language architecture strikes balance needs realtime computation flexibility simplicity abstract language like many functional languages implements functions first-class objects may composed functions methods default argument values variable length argument lists called order keyword arguments closures lexical scope lexical dynamic features typical functional languages supported including creation closures via partial application explicit currying tail call optimization list comprehensions coroutines specifics include implicit expansion tuples stateless pattern system constant-time message lookup real-time garbage collection allows large systems efficient handle signal processing flexibly supporting methods reflective conversational literate programming supercollider makes relatively easy find new sound algorithms develop custom software well custom frameworks regards domain specific knowledge general e.g. allows represent properties time pitch variable degrees abstraction copious example implementations specific purposes supercollider language allows users construct cross-platform graphical user interfaces applications standard class library user interface components may extended number available frameworks interactive programming system supports programmatic access rich-text code files may used generate vector graphics algorithmically server controlled using open sound control osc variety applications used control server supercollider language environments see typically used osc-aware systems used pure data third-party clients supercollider server exist including rsc3 scheme client hsc3 based haskell scalacollider based scala overtone based clojure sonic pi distinct development environments mentioned provide interface supercollider programming language instead communicate directly audio server provide approaches facilitating user expression supercollider runs macos linux windows freebsd opensuse operating systems multiple language-editing environments clients used supercollider see also demonstrated supercollider run android ios supercollider code commonly edited used within cross-platform ide supports linux mac windows development environments supercollider support include versatile dynamic programming language supercollider used live coding i.e performances involve performer modifying executing code fly specific kinds proxies serve high level placeholders synthesis objects swapped modified runtime environments allow sharing modification objects process declarations networks various extension libraries support different abstraction access sound objects e.g dewdrop_lib allows live creation modification pseudo-classes -objects
[ 1616, 3172, 4759, 6245, 6882, 7333, 5282, 2740, 3534, 5571, 578, 1102, 6287, 2592, 4981, 5420, 7032, 4543, 1892, 5260, 2619, 6408, 1435, 5266 ]
Test
4,854
3
Cub_Linux:cub linux cub linux computer operating system designed mimic desktop appearance functionality chrome os based ubuntu linux lts 14.04 trusty tahr used openbox window manager tools taken lxde gnome xfce well number utilities cloud-centric operating system heavily focused chromium browser cub linux tagline cub chromium ubuntu cub linux originally called chromixium os developer richjack initially announced project ubuntu user forums september 19 2014 since project released first stable version chromixium 1.0 32 bit live iso april 26 2015 followed service pack address number issues screen tearing slow menu generation july 2015 number updates rolled new release version 1.5 initially 32 bit followed 64 bit release november 2015 point towards end 2015 google owns rights chrome os chromium trademarks requested richjack cease use chromixium mark related websites social media presences january 17 2016 richjack announced chromixium would changing name cub linux immediate effect chromixium name would completely dropped 31 march 2016 towards end 2016 cub linux website mysteriously disappeared github page still open user d4zzy involved cub linux development say sudden end cub killed due private life restrictions one time pick july 19 2017 developer feren os announced would bring ing back cub form phoenix linux page updated since release alpha 2 march 2018 jesse smith distrowatch weekly reviewed chromixium os 1.0
[ 6244, 5200, 1629, 3444, 7251, 6984, 474, 7075, 5571, 1941, 314, 5232, 2758, 2581, 1663, 2864, 3559, 6209, 6761, 2063, 2961, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 352, 3751, 7954, 1435, 788 ]
Test
4,855
6
SSHFS:sshfs computing sshfs ssh filesystem filesystem client mount interact directories files located remote server workstation normal ssh connection client interacts remote file system via ssh file transfer protocol sftp network protocol providing file access file transfer file management functionality reliable data stream designed extension secure shell protocol ssh version 2.0 current implementation sshfs using fuse rewrite earlier version rewrite done miklos szeredi also wrote fuse sftp provides secure file transfer secure remote file system sftp clients may transfer files directories related file system may mounted locally using sftp alone using sshfs remote file system may treated way volumes cds dvds usb flash drives shared disks using unix command ls sshfs sometimes list owner file correctly although possible map manually distributed remote file systems multiple users protocols apple filing protocol network file system server message block often used sshfs alternative protocols situations users confident files directories targeted writing another user time advantage sshfs compared network file system protocols given user already ssh access host require additional configuration work opening additional entry ports firewall
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 7214, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 59...
Test
4,856
3
Fast_interrupt_request:fast interrupt request fast interrupt requests fiqs specialized type interrupt request standard technique used computer cpus deal events need processed occur receiving data network card keyboard mouse actions fiqs specific arm cpu architecture supports two types interrupts fiqs fast low latency interrupt handling interrupt requests irqs general interrupts fiq takes priority irq arm system also one fiq source time supported helps reduce interrupt latency interrupt service routine executed directly without determining source interrupt context save required servicing fiq since set banked registers reduces overhead context switching
[ 2248 ]
Test
4,857
4
Eye_vein_verification:eye vein verification eye vein verification method biometric authentication applies pattern-recognition techniques video images veins user eyes complex random patterns unique modern hardware software detect differentiate patterns distance eyes veins sclera—the white part eyes—can imaged person glances either side providing four regions patterns one side eye verification employs digital templates patterns templates encoded mathematical statistical algorithms allow confirmation identity proper user rejection anyone else advocates eye vein verification note one technology strengths stability pattern eye blood vessels patterns change age alcohol consumption allergies redness eye veins clear enough reliably imaged cameras smartphones technology works contacts glasses though sunglasses least one version eye vein detection uses infrared illumination part imaging allowing imaging even low-light conditions dr. reza derakhshani university missouri kansas city developed concept using veins whites eyes identification holds several patents technology including 2008 patent concept using blood vessels seen whites eye unique identifier recent research explored using vein patterns iris sclera recognition eye vein verification like methods biometric authentication used range security situations including mobile banking government security healthcare environments eyeverify kansas city kansas company markets eye vein verification system called eyeprint 2012 eyeverify licensed technology developed patented derakhshani derakhshani serves chief science officer eyeverify
[ 7120 ]
Test
4,858
4
Browser_exploit:browser exploit browser exploit form malicious code takes advantage flaw vulnerability operating system piece software intent breach browser security alter user browser settings without knowledge malicious code may exploit activex html images java javascript web technologies cause browser run arbitrary code users whose web browsers fallen victim successful browser exploit may find homepage search page and/or favorites changed signs include internet settings options within browser altered access blocked specific functions redirection incorrectly typed url prefixes multiple ways users protect web browsers falling victim browser exploit things include installing firewall software keeping software updated cautious downloading files opening email attachments unknown sources jailbreakme series browser based exploits used jailbreak apple ios mobile operating system uses exploit browser pdf parser execute unauthorised code gain access underlying operating system
[ 321, 2451, 5721, 6991, 5231, 1582, 2577 ]
Test
4,859
3
Advanced_RISC_Computing:advanced risc computing advanced risc computing arc specification promulgated defunct consortium computer manufacturers advanced computing environment project setting forth standard mips risc-based computer hardware firmware environment although ace went defunct computer ever manufactured fully complied arc standard arc system widespread legacy windows nt family operating systems use arc conventions naming boot devices sgi uses modified version arc firmware calls arcs systems sgi computers run irix 6.1 later indy octane boot arcs console uses drive naming conventions windows accordingly addition various risc-based computers designed run windows nt used versions arc boot console boot nt include following predicted intel ia-32-based computers would adopt arc console although sgi ever marketed machines arc firmware namely sgi visual workstation series launched 1999 products complying degree arc standard include
[ 5104, 6256, 1727, 6784, 4959, 1992, 5055, 7010, 2226, 4799, 3567, 4816, 2792, 2699, 4099, 7697 ]
Test
4,860
7
Multisite_cloud:multisite cloud multisite cloud cloud composed several single sites data centers different providers explicitly accessible cloud users multisite cloud environment tasks program workflow scheduled order achieve efficient processing
[]
Test
4,861
4
Aloysius_Cheang:aloysius cheang aloysius cheang managing director apac cloud security alliance another role standards secretariat overseeing standardization efforts within csa cloud security alliance owning relationships sdos aloysius former member singapore government chief security officer roundtable founder sig^2 2001 also held senior executive positions various consulting companies telco worldwide remit sig^2 rose become de facto security community asia lead formalisation singapore government-backed association information security professionals aisp cheang pro tem chairman 2006–2007 also co-editor iso/iec 27032 guidelines cybersecurity represented singapore iso/iec/jtc 1 sc 27 wg4 previous contribution ss 507 “ business continuity/disaster recovery industry standard ” adopted iso/iec 24762 cheang sits singapore standards committee national infocomm competency framework security sub-committee cheang professional certifications include cisa cissp gcih first microsoft security mvp south asia member microsoft sea mvp hall fame views presented times asia cio asia zdnet computerworld new paper mypaper sin chew daily wen wei po straits times channelnewsasia independent source specialist opinion
[ 688 ]
Test
4,862
5
OFTP:oftp odette file transfer protocol oftp protocol created 1986 used edi electronic data interchange two communications business partners name comes odette organisation organization data exchange teletransmission europe odette file transfer protocol odette-ftp defined 1986 working group four organisation data exchange tele-transmission europe odette address electronic data interchange edi requirements european automotive industry designed spirit open system interconnection osi model utilising network service provided ccitt x.25 recommendation oftp 2 written 2007 data interchange specification secure transfer business documents internet isdn x.25 networks description oftp 1.3 found rfc 2204 whilst oftp 2 defined rfc 5024 oftp 2 work point-to-point indirectly via van value added network single oftp 2 entity make receive calls exchanging files directions means oftp 2 work push pull mode opposed as2 work push mode oftp 2 encrypt digitally sign message data request signed receipts also offers high levels data compression services available using oftp 2 tcp/ip x.25/isdn native x.25 used tcp/ip network internet additional session level security available using oftp 2 tls transport layer security
[ 1710 ]
Test
4,863
8
Information_and_Content_Exchange:information content exchange information content exchange ice xml-based protocol used content syndication via internet using xml sender receiver agreed-upon language communicate using client–server architecture ice defines syndicate/subscribe model comparable binary publish/subscribe protocol standards used corba dcom however ice messages delivered xml typically http connection rather lower-level binary protocol first standard specifically web syndication ice proposed firefly networks vignette january 1998 two companies ceded control specification ice consortium consisted authoring group advisory council ice authoring group included microsoft adobe sun cnet national semiconductor tribune media services ziff davis reuters amongst others limited thirteen companies ice advisory council included nearly hundred members ice submitted world wide web consortium standards body october 26 1998 showcased press event day standard failed benefit open-source implementation w3c xml specifications often received version 1.1 protocol published july 1 2000 version 2.0 featured improved web service support released august 1 2004 versions appeared since vignette demo version ice-capable server named site-to-site february 1998 aiming show protocol could facilitate content exchange websites site-to-site initially scheduled release summer 1998 launched name vignette syndication server february 22 1999 syndication server vignette became primary ice vendor june 1999 vignette invested 14 million leading web syndicator isyndicate adopt vignette storyserver development isyndicate website part deal isydicate committed making content available ice protocol comparable xml specifications include wddx nitf xmlnews newsml prism well cdf rss atom open content syndication ocs twice java implementation ice 2.0 rice ruby implementation ice 1.1 twice rice developed maintained jim menard icecubes original java reference implementation ice 1.1 although actively maintained since december 2000
[ 6986, 6989, 1554, 87 ]
Validation
4,864
3
Von_Neumann_architecture:von neumann architecture von neumann architecture—also known von neumann model princeton architecture—is computer architecture based 1945 description mathematician physicist john von neumann others first draft report edvac document describes design architecture electronic digital computer components term von neumann architecture evolved mean stored-program computer instruction fetch data operation occur time share common bus referred von neumann bottleneck often limits performance system design von neumann architecture machine simpler harvard architecture machine—which also stored-program system one dedicated set address data buses reading writing memory another set address data buses fetch instructions stored-program digital computer keeps program instructions data read-write random-access memory ram stored-program computers advancement program-controlled computers 1940s colossus eniac programmed setting switches inserting patch cables route data control signals various functional units vast majority modern computers use memory data program instructions von neumann vs. harvard distinction applies cache architecture main memory split cache architecture earliest computing machines fixed programs simple computers still use design either simplicity training purposes example desk calculator principle fixed program computer basic mathematics run word processor games changing program fixed-program machine requires rewiring restructuring redesigning machine earliest computers much programmed designed particular task reprogramming —when possible all—was laborious process started flowcharts paper notes followed detailed engineering designs often-arduous process physically rewiring rebuilding machine could take three weeks set debug program eniac proposal stored-program computer changed stored-program computer includes design instruction set store memory set instructions program details computation stored-program design also allows self-modifying code one early motivation facility need program increment otherwise modify address portion instructions operators manually early designs became less important index registers indirect addressing became usual features machine architecture another use embed frequently used data instruction stream using immediate addressing self-modifying code largely fallen favor since usually hard understand debug well inefficient modern processor pipelining caching schemes large scale ability treat instructions data makes assemblers compilers linkers loaders automated programming tools possible makes programs write programs possible made sophisticated self-hosting computing ecosystem flourish around von neumann architecture machines high level languages leverage von neumann architecture providing abstract machine-independent way manipulate executable code runtime e.g. lisp using runtime information tune just-in-time compilation e.g languages hosted java virtual machine languages embedded web browsers smaller scale repetitive operations bitblt pixel vertex shaders accelerated general purpose processors just-in-time compilation techniques one use self-modifying code remained popular mathematician alan turing alerted problem mathematical logic lectures max newman university cambridge wrote paper 1936 entitled computable numbers application entscheidungsproblem published proceedings london mathematical society described hypothetical machine called universal computing machine known universal turing machine hypothetical machine infinite store memory today terminology contained instructions data john von neumann became acquainted turing visiting professor cambridge 1935 also turing phd year institute advanced study princeton new jersey 1936 – 1937 whether knew turing paper 1936 time clear 1936 konrad zuse also anticipated two patent applications machine instructions could stored storage used data independently j. presper eckert john mauchly developing eniac moore school electrical engineering university pennsylvania wrote stored-program concept december 1943 von neumann involved manhattan project los alamos national laboratory required huge amounts calculation drew eniac project summer 1944 joined ongoing discussions design stored-program computer edvac part group wrote description titled first draft report edvac based work eckert mauchly unfinished colleague herman goldstine circulated von neumann name consternation eckert mauchly paper read dozens von neumann colleagues america europe influenced next round computer designs jack copeland considers historically inappropriate refer electronic stored-program digital computers 'von neumann machines los alamos colleague stan frankel said von neumann regard turing ideas time first draft report circulated turing producing report entitled proposed electronic calculator described engineering programming detail idea machine called automatic computing engine ace presented executive committee british national physical laboratory february 19 1946 although turing knew wartime experience bletchley park proposed feasible secrecy surrounding colossus subsequently maintained several decades prevented saying various successful implementations ace design produced von neumann turing papers described stored-program computers von neumann earlier paper achieved greater circulation computer architecture outlined became known von neumann architecture 1953 publication faster thought symposium digital computing machines edited b. v. bowden section chapter computers america reads follows machine institute advanced studies princeton 1945 professor j. von neumann working moore school engineering philadelphia e.n.i.a.c built issued behalf group co-workers report logical design digital computers report contained detailed proposal design machine since become known e.d.v.a.c electronic discrete variable automatic computer machine recently completed america von neumann report inspired construction e.d.s.a.c electronic delay-storage automatic calculator cambridge see page 130 1947 burks goldstine von neumann published another report outlined design another type machine parallel machine time would exceedingly fast capable perhaps 20,000 operations per second pointed outstanding problem constructing machine development suitable memory instantaneously accessible contents first suggested using special vacuum tube—called selectron —which princeton laboratories rca invented tubes expensive difficult make von neumann subsequently decided build machine based williams memory machine—completed june 1952 princeton—has become popularly known maniac design machine inspired least half dozen machines built america known affectionately johniacs book first two paragraphs chapter ace read follows automatic computation national physical laboratory one modern digital computers embodies developments improvements technique automatic electronic computing recently demonstrated national physical laboratory teddington designed built small team mathematicians electronics research engineers staff laboratory assisted number production engineers english electric company limited equipment far erected laboratory pilot model much larger installation known automatic computing engine although comparatively small bulk containing 800 thermionic valves judged plates xii xiii xiv extremely rapid versatile calculating machine basic concepts abstract principles computation machine formulated dr. a. m. turing f.r.s. paper read london mathematical society 1936 work machines britain delayed war 1945 however examination problems made national physical laboratory mr. j. r. womersley superintendent mathematics division laboratory joined dr. turing small staff specialists 1947 preliminary planning sufficiently advanced warrant establishment special group already mentioned april 1948 latter became electronics section laboratory charge mr. f. m. colebrook first draft described design used many universities corporations construct computers among various computers illiac ordvac compatible instruction sets date information following chronology difficult put proper order dates first running test program dates first time computer demonstrated completed dates first delivery installation decades 1960s 1970s computers generally became smaller faster led evolutions architecture example memory-mapped i/o lets input output devices treated memory single system bus could used provide modular system lower cost sometimes called streamlining architecture subsequent decades simple microcontrollers would sometimes omit features model lower cost size larger computers added features higher performance shared bus program memory data memory leads von neumann bottleneck limited throughput data transfer rate central processing unit cpu memory compared amount memory single bus access one two classes memory time throughput lower rate cpu work seriously limits effective processing speed cpu required perform minimal processing large amounts data cpu continually forced wait needed data move memory since cpu speed memory size increased much faster throughput bottleneck become problem problem whose severity increases every new generation cpu von neumann bottleneck described john backus 1977 acm turing award lecture according backus surely must less primitive way making big changes store pushing vast numbers words back forth von neumann bottleneck tube literal bottleneck data traffic problem importantly intellectual bottleneck kept us tied word-at-a-time thinking instead encouraging us think terms larger conceptual units task hand thus programming basically planning detailing enormous traffic words von neumann bottleneck much traffic concerns significant data find several known methods mitigating von neumann performance bottleneck example following improve performance problem also sidestepped somewhat using parallel computing using example non-uniform memory access numa architecture—this approach commonly employed supercomputers less clear whether intellectual bottleneck backus criticized changed much since 1977 backus proposed solution major influence modern functional programming object-oriented programming much less geared towards pushing vast numbers words back forth earlier languages like fortran internally still computers spend much time even highly parallel supercomputers 1996 database benchmark study found three four cpu cycles spent waiting memory researchers expect increasing number simultaneous instruction streams multithreading single-chip multiprocessing make bottleneck even worse context multi-core processors additional overhead required maintain cache coherence processors threads aside von neumann bottleneck program modifications quite harmful either accident design simple stored-program computer designs malfunctioning program damage programs operating system possibly leading computer crash memory protection forms access control usually protect accidental malicious program modification
[ 5012, 4662, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 3967, 5042, 1102, 1853, 1481, 5055, 2226, 1867, 2248, 2251, 2610, 6148, 441, 2266, 4047, 3365, 5483, 1556, 5487, 1947, 6198, 1568, 1570, 6922, 7666, 154, 515, 8024, 4092, 5521, ...
Test
4,865
0
Variable_rules_analysis:variable rules analysis linguistics variable rules analysis set statistical analysis methods commonly used sociolinguistics historical linguistics describe patterns variation alternative forms language use also sometimes known varbrul analysis name software package dedicated carrying relevant statistical computations varbrul variable rule method goes back theoretical approach developed sociolinguist william labov late 1960s early 1970s mathematical implementation developed henrietta cedergren david sankoff 1974 variable rules analysis designed provide quantitative model situation speakers alternate different forms meaning stand free variation way probability choice either one form conditioned variety context factors social characteristics situation variation entirely random rule-governed also known structured variation variable rules analysis computes multivariate statistical model basis observed token counts determining factor assigned numerical factor weight describes influences probabilities choice either form done means stepwise logistic regression using maximum likelihood algorithm although necessary computations required variable rules analysis carried help mainstream general-purpose statistics software packages spss often done means specialised software dedicated needs linguists called varbrul originally written david sankoff currently exists freeware implementations mac os microsoft windows title goldvarb x also versions implemented statistical language r therefore available platforms include r-varb rbrul variable rules approaches commonly employed analysis data sociolinguistic research especially studies aim investigate reflexes linguistic change time appear shape structured variation patterns within speech community
[ 4070, 3807, 4759 ]
Validation
4,866
1
Object-based_spatial_database:object-based spatial database object-based spatial database spatial database stores location objects object-based spatial model treats world surface littered recognizable objects e.g cities rivers exist independent locations objects simple polygons lines complex represent cities field-based data model sees world continuous surface features e.g elevation vary using object-based spatial database easier store additional attributes objects direction speed etc using attributes make easier answer queries like find tanks whose speed 10 km oriented north find enemy tanks certain region storing attributes objects provide better result presentation improved manipulation capabilities efficient way field-based data model information usually stored different layers harder extract different information various layers data model applied er germ model giser s.shekhar introduces direction spatial object presents solution object-direction-based queries common representations data model follow open-source software program adds support geographic objects postgresql object-relational database postgis follows simple features sql specification open geospatial consortium provides uml representation geographic applications represent concept field object provides way differentiate spatial relation simple association represents framework objects classes partitioned three kinds classes simple classes link classes path classes objects simple class one hand like objects models object type object identity attributes whose values either data type e.g integer string object type attribute may contain reference another object structure object basically tuple record hand objects simple class nodes database graph – whole database also viewed single graph objects link class like objects simple class additionally contain two distinguished references source target objects belonging simple classes makes edges database graph finally object path class like object simple class contains additionally list references node edge objects form path database graph represent data model store geographic information top eer model geis define input data model provide following data model geometry giser model geometry entity related spatial object relationship determines shape additional entities represent primitives points lines polygons proposed related models topology topology property belonging spatial object property remains unaltered even object deforms example road network two nodes network thus remain connected even path nodes changed road construction order represent topology basic primitives networks i.e. graphs partitions provided additional primitives added lines worboy model system support representation stored data oracle spatial component enterprise oracle 10g provides support stores object road top current implentend construction used network data model store geographic data nodes links graph representation node links set attributes example route object added database supports raster set vector representation
[ 784, 2445 ]
Validation
4,867
4
Collision_attack:collision attack cryptography collision attack cryptographic hash tries find two inputs producing hash value i.e hash collision contrast preimage attack specific target hash value specified roughly two types collision attacks generally mathematically stated collision attack finds two different messages m1 m2 hash m1 hash m2 classical collision attack attacker control content either message arbitrarily chosen algorithm much like symmetric-key ciphers vulnerable brute force attacks every cryptographic hash function inherently vulnerable collisions using birthday attack due birthday problem attacks much faster brute force would hash n bits broken 2 time evaluations hash function efficient attacks possible employing cryptanalysis specific hash functions collision attack discovered found faster birthday attack hash function often denounced broken nist hash function competition largely induced published collision attacks two commonly used hash functions md5 sha-1 collision attacks md5 improved much 2007 takes seconds regular computer hash collisions created way usually constant length largely unstructured directly applied attack widespread document formats protocols however workarounds possible abusing dynamic constructs present many formats way two documents would created similar possible order hash value one document would shown authority signed signature could copied file malicious document would contain two different messages document conditionally display one subtle changes file extension collision attack chosen-prefix collision attack specific merkle–damgård hash functions case attacker choose two arbitrarily different documents append different calculated values result whole documents equal hash value attack much powerful classical collision attack mathematically stated given two different prefixes p1 p2 attack finds two appendages m1 m2 hash p1 ∥ m1 hash p2 ∥ m2 ∥ concatenation operation 2007 chosen-prefix collision attack found md5 requiring roughly 2 evaluations md5 function paper also demonstrates two x.509 certificates different domain names colliding hash values means certificate authority could asked sign certificate one domain certificate specially signature could used create new rogue certificate impersonate another domain real-world collision attack published december 2008 group security researchers published forged x.509 signing certificate could used impersonate certificate authority taking advantage prefix collision attack md5 hash function meant attacker could impersonate ssl-secured website man-in-the-middle thereby subverting certificate validation built every web browser protect electronic commerce rogue certificate may revokable real authorities could also arbitrary forged expiry time even though md5 known weak 2004 certificate authorities still willing sign md5-verified certificates december 2008 least one microsoft code-signing certificate still using md5 may 2012 flame malware successfully used new variation chosen-prefix collision attack spoof code signing components microsoft root certificate still used compromised md5 algorithm 2019 researchers found chosen-prefix collision attack sha-1 computing complexity 2 2 cost less 100,000 us dollars many applications cryptographic hash functions rely collision resistance thus collision attacks affect security example hmacs vulnerable attack useful attacker must control input hash function digital signature algorithms sign large amount data efficiently implementations use hash function reduce compress amount data needs signed constant size digital signature schemes often vulnerable hash collisions unless using techniques like randomized hashing usual attack scenario goes like 2008 researchers used chosen-prefix collision attack md5 using scenario produce rogue certificate authority certificate created two versions tls public key certificate one appeared legitimate submitted signing rapidssl certificate authority second version md5 hash contained flags signal web browsers accept legitimate authority issuing arbitrary certificates 2003 denial service dos attack described used hash collisions exploit worst-case runtime hash table lookups issue affected major programming languages used weaker hash functions
[ 4025, 363, 2823, 6795, 464, 1353, 113, 3100, 6015, 6016, 6448, 8103, 4358, 6049, 8147 ]
Validation
4,868
3
Plinian_Core:plinian core plinian core set vocabulary terms used describe different aspects biological species information biological species information kinds properties traits related taxa—biological non-biological—are included thus instance terms pertaining descriptions legal aspects conservation management demographics nomenclature related resources incorporated plinian core aimed facilitate exchange information species upper taxa scope scope plinian core design requirements includes ease use self-contained able support data integration multiple databases ability handle different levels granularity core terms grouped current version follows plinian core started collaborative project instituto nacional de biodiversidad gbif spain 2005 series iterations elements defined implanted different projects resulted plinian core flat deprecated result new development impulse overcome 2012 new formal requirements additional input better support standard documentation well align processes tdwg world reference body biodiversity information standards new version plinian core v3.x.x defined provides flexibility fully represent information species variety scenarios new elements deal aspects ipr related resources referenced etc introduced elements already included better-defined documented partner development plinian core new phase incorporated university granada ug spain alexander von humboldt institute iavh colombia national commission knowledge use biodiversity conabio mexico university são paulo usp brazil plinian core task group within tdwg interest group species information constituted currently working development plinian core presented levels abstract model application profiles abstract model comprising abstract model schema xsd terms uris normative part comprehensive allows different levels granularity describing species properties taken menu choose terms level detail needed specific project subsets abstract model intended implemented specific projects application profiles aps besides containing part elements aps impose additional specifications included elements controlled vocabularies examples aps use follow plinian incorporates number elements already defined standards following table summarizes standards elements used plinian core
[ 6741 ]
Validation
4,869
9
SenseTalk:sensetalk sensetalk english-like scripting language derived hypertalk language used hypercard sensetalk originally developed scripting language within hypersense multimedia authoring application nextstep openstep platforms sensetalk resurfaced 2002 scripting language eggplant first commercial mac os x cross-platform gui testing application sensetalk english-like scripting language xtalk family derived hypertalk advanced programming language extensions number features distinguish sensetalk xtalk languages one inclusion lists property lists first class data structures another inclusion objects sensetalk treats script property list object encapsulating properties behaviors sensetalk include concept object classes instead treats every object equally object inherit behavior object objects multiple inheritance supported
[ 6392, 3169, 5101, 3412, 5571 ]
Validation
4,870
1
Data_event:data event data event relevant state transition defined event schema typically event schemata described pre- post condition single set data items contrast eca event condition action considers event signal data event refers change signal describes specific state transitions referred eca conditions considering data events relevant data item state transitions allows defining complex event-reaction schemata database defining data event schemata relational databases limited attribute instance events object-oriented databases also support collection properties allows defining changes collections data events
[ 4083, 6462 ]
Test
4,871
6
Fusion-io_NVMFS:fusion-io nvmfs sandisk/fusion-io nvmfs file system formerly known direct file system dfs accesses flash memory via virtual flash storage layer instead using traditional block layer api file system two main novel features first lays files directly large virtual storage address space second leverages virtual flash storage layer perform block allocations atomic updates result nvmfs performs better much simpler traditional unix file system similar functionalities additionally approach avoids log-on-log performance issues triggered log-structured file systems microbenchmark results show nvmfs deliver 94,000 i/o operations per second iops direct reads 71,000 iops direct writes virtualized flash storage layer top first-generation fusion-io iodrive direct access performance nvmfs consistently better ext3 platform sometimes 20 buffered access performance nvmfs also consistently better ext3 sometimes 149 application benchmarks show nvmfs outperforms ext3 7 250 requiring less cpu power additionally i/o latency lower nvmfs compared ext3 api used nvmfs access flash memory consists layer provides api called virtualized flash storage layer dfs paper responsibility layer perform block allocation wear leveling garbage collection crash recovery address translation also make address translation data structures persistent
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1616, 1624, 59...
Test
4,872
9
Gretl:gretl gretl open-source statistical package mainly econometrics name acronym g nu r egression e conometrics ime-series l ibrary graphical user interface gui command-line interface written c uses gtk+ widget toolkit creating gui calls gnuplot generating graphs native scripting language gretl known hansl see also used together tramo/seats r stata python octave ox julia gretl output models latex files besides english gretl also available albanian basque bulgarian catalan chinese czech french galician german greek italian polish portuguese varieties romanian russian spanish turkish ukrainian gretl reviewed several times journal applied econometrics recently australian economic review review also appeared journal statistical software 2008 since journal featured several articles gretl used implement various statistical techniques gretl offers fully documented xml-based data format also import ascii csv databank eviews excel gnumeric gnu octave jmulti opendocument spreadsheets pcgive rats 4 sas xport spss stata files export stata gnu octave r csv jmulti pcgive file formats gretl scripting language called hansl recursive acronym hansl neat scripting language hansl turing-complete interpreted programming language featuring loops conditionals user-defined functions complex data structures considered domain-specific language econometrics like scientifically oriented programming languages matlab julia matrices supported natively primitive variable type gretl add-ons known function packages written hansl simple example hansl running code produces random number generation rng gretl examined tested yalta schreiber 2012 authors conclude results show rng related procedures gretl implemented soundly perform well three crush test suites testu01 due libre nature breadth econometric techniques contains gretl widely used teaching econometrics undergraduate level onwards datasets gretl format available several popular textbooks following list textbooks use gretl software choice addition free supplement hill griffiths lim principles econometrics wiley available
[ 1523, 5098, 8158, 3606, 2820, 1626, 3174, 4759, 5548, 1351, 1731, 3619, 5288, 5117, 2559, 6356, 5571, 3868, 6365, 4705, 7463, 1569, 4067, 3981, 3388, 4070, 3807, 7559, 1398, 6934, 2599, 1406, 1879, 7579, 7860, 3410, 5965, 256, 3915, 4999,...
Test
4,873
6
AtheOS_File_System:atheos file system atheos file system afs originally used atheos operating system mbr partition id 0x2a part syllable syllable-based wave os operating system afs started exactly data structures file system bfs extended feature set many ways afs 64-bit journaled file system support file attributes file indexing soft deletions also partially supported
[ 3599, 2547, 7161, 4672, 3626, 6117, 7581, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1254, 1624, 5900, 4480, 4855, 7...
Validation
4,874
9
Semantic_dictionary_encoding:semantic dictionary encoding semantic dictionary encoding sde preserves full semantic context source programs adding information used accelerating speed code generation sde forms code-generating loader form bytecode combined jit compiler code generation load time elementary form dictionary entries represent nodes directed acyclic graph dag describes actions program abstract syntax tree ast tabular form uses intermediate representation ir based encoded abstract syntax tree symbol table program
[ 6002, 7474 ]
Test
4,875
2
OpenPlay:openplay openplay name open-source cross-platform networking library created apple inc. openplay compiles runs classic mac os macos windows linux operating systems openplay high-level networking solution game applications known abstraction game player top automatically managed networking core version 2.0 includes netsprockets api mac os 9 netsprockets subset apple obsolete game sprockets
[ 405, 2067, 4759, 5571, 578 ]
Validation
4,876
9
Jacob_T._Schwartz:jacob t. schwartz jacob theodore jack schwartz january 9 1930 – march 2 2009 american mathematician computer scientist professor computer science new york university courant institute mathematical sciences designer setl programming language started nyu ultracomputer project founded new york university department computer science chairing 1964 1980 schwartz born bronx new york january 9 1930 ignatz hedwig schwartz attended stuyvesant high school went city college new york received b.s 1949 city college new york m.a 1949 ph.d. 1951 yale university research interests included theory linear operators von neumann algebras quantum field theory time-sharing parallel computing programming language design implementation robotics set-theoretic approaches computational logic proof program verification systems multimedia authoring tools experimental studies visual perception multimedia high-level software techniques analysis visualization bioinformatic data authored 18 books 100 papers technical reports also inventor artspeak programming language historically ran mainframes produced graphical output using single-color graphical plotter served chairman computer science department founded courant institute mathematical sciences new york university 1969 1977 also served chairman computer science board national research council former chairman national science foundation advisory committee information robotics intelligent systems 1986 1989 director darpa information science technology office darpa/isto arlington virginia jacob schwartz two daughters abby schwartz living new york city rachel fainman stage name rachel kane living winnipeg canada jack also two grandchildren adrienne fainman adam fainman
[ 3470, 8032, 1243 ]
Test
4,877
2
Kernel_same-page_merging:kernel same-page merging computing kernel same-page merging abbreviated ksm also known kernel shared memory memory merging kernel feature makes possible hypervisor system share identical memory pages amongst different processes virtualized guests directly linked kernel-based virtual machine kvm use ksm merge memory pages occupied virtual machines ksm performs memory sharing scanning main memory finding duplicate pages detected duplicate pair merged single page mapped original locations page also marked copy-on-write cow kernel automatically separate one process modify data ksm originally intended run virtual machines one host sharing memory processes well virtual machines upon implementation different users found ksm also useful non-virtualized environments memory premium experimental implementation ksm red hat found 52 virtual instances windows xp 1 gb memory could run host computer 16 gb ram ksm merged linux kernel mainline kernel version 2.6.32 released december 3 2009 effective operating system kernel must find identical memory pages held different processes kernel also needs decide whether pages going update infrequently enough merging would efficient use processor resources concern although memory usage reduced cpu usage increased thus negating potential increases performance security also concern
[ 3599, 3256, 2182, 3613, 7528, 7532, 2559, 5744, 6443, 3635, 2942, 7555, 6117, 4341, 5762, 412, 415, 5765, 3666, 2970, 7956, 5453, 5803, 5460, 7242, 1535, 1924, 6892, 1176, 1933, 5829, 1208, 6211, 4435, 5865, 7669, 3404, 1227, 1596, 165, ...
Test
4,878
9
CMU_Common_Lisp:cmu common lisp cmucl free common lisp implementation originally developed carnegie mellon university cmucl runs unix-like platforms including linux bsd experimental windows port well steel bank common lisp derived cmucl scieneer common lisp commercial derivative cmucl earliest implementation predates common lisp part spice lisp around 1980 1985 rob maclachlan started re-writing compiler would become python compiler cmucl ported unix workstations ibm pc rt mips sparc early cmucl releases support intel x86 architecture due lack registers cmucl strictly separated type-tagged immediate data types garbage collector would rely knowing one half cpu registers could hold tagged types half untagged types leave enough registers python backend cmu canceled project favor dylan implementation using cmucl compiler base maintenance taken group volunteers 1996 group making regular releases infrastructure around time port intel x86 architecture completed first running freebsd later linux problem lacking registers solved new conservative garbage collector new garbage collector accepts value type registers treats anything might pointer pointer purpose collecting moving target
[ 7878, 1445, 6796, 6087, 2915, 5734, 1478, 4332, 4704, 5757, 6116, 1116, 6471, 2600, 5077, 2249, 1889, 1890, 6876, 4759, 6886, 6888, 3370, 1557, 6191, 5494, 5501, 6210, 144, 7298, 5515, 8025, 3749, 5883, 4837, 1616, 897, 6981, 2734, 5571, ...
Test
4,879
3
ZiiLABS:ziilabs ziilabs global technology company producing line media-oriented application processors reference platforms enabling software series platforms named zms designed create products target range low-power consumer electronics embedded devices including android-based phones tablets ziilabs founded 1994 3dlabs became wholly owned subsidiary creative technology ltd 2002 january 2009 company re-branded ziilabs re-branding reflected 3dlabs focus supplying low-power media-rich application processors hardware platforms middleware rather 3d gpus previously case company announced first applications/media processor dms-02 2005 followed zms-05 zms-08 recently zms-20 zms-40 zms processors combine ziilabs ’ core asset stemcell computing array arm cores integrated peripheral functions create system chip soc 3dlabs company developed glint permedia gpus used personal workstation graphics cards 2002 company acquired intense3d group become vertically integrated graphics board vendor supplying workstation graphics card realizm brand 3dlabs stopped developing graphics gpus cards 2006 focus media processor business november 2012 creative technology limited announced entered agreement intel corporation intel license certain technology patents ziilabs inc. ltd acquire certain engineering resources assets related uk branch part 50 million deal ziilabs still wholly owned creative continues retain ownership stemcell media processor technologies patents continue supply support zms series chips customers company products include range arm-based zms processors feature so-called stemcell media processing architecture plus portfolio tablet reference platforms based in-house android board support package application software recent platform jaguar android reference tablet announced may 2011 core asset ziilabs zms chips seem array processing units called stemcells programmed perform media processing described 32-bit floating-point processing units likely form digital signal processor cores used accelerate various operations video codec 3d graphics handling zms processors handled programming array coprocessors job years number development platforms made introduced including zii development kits traditional large form factor systems
[ 3262, 6421, 7890, 722, 2926, 5740, 1473, 5750, 742, 5752, 5405, 5406, 6830, 1864, 3319, 6133, 67, 7228, 446, 451, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 496, 7654, 3397, 2332, 1977, 2339, 6945, 2711, 1995, 4840, 550, 4479, ...
Validation
4,880
2
Windows_Aero:windows aero windows aero backronym authentic energetic reflective open design language introduced windows vista operating system changes made aero interface affected many elements windows interface including incorporation new look along changes interface guidelines reflecting appearance layout phrasing tone instructions text applications windows aero force development windows vista windows 7 2012 development windows 8 windows server 2012 microsoft moved design language codenamed metro aero interface unveiled windows vista complete redesign windows interface replacing windows xp luna theme release windows vista beta 1 july 2005 little shown aero public leaked builds previous user interfaces plex featured longhorn builds 3683–4042 slate first featured lab06 compile build 4042 used development reset jade builds 4074 4094 microsoft started using aero theme public builds build 5048 first build full-featured aero build 5219 build 5270 released december 2005 contained implementation aero theme virtually complete according sources microsoft though number stylistic changes introduced operating system release windows aero incorporated following features windows vista windows aero revised windows 7 several ui changes touch friendly interface many new visual effects features including pointing device gestures windows 8 windows server 2012 adopted metro design language inherit elements aero aero glass theme replaced flatter solid colored theme transparency effects removed interface aside taskbar maintains transparency longer blur effect flip 3d also removed switches metro-style apps pre-release versions windows 8 used updated version aero glass flatter squared look glass theme ultimately removed final version first time since release windows 95 microsoft completely revised user interface guidelines covering aesthetics common controls buttons radio buttons task dialogs wizards common dialogs control panels icons fonts user notifications tone text used windows vista windows 7 computers meet certain hardware software requirements aero glass theme used default primarily incorporating various animation transparency effects desktop using hardware acceleration desktop window manager dwm personalize section added control panel windows vista users customize glass effects either opaque transparent change color tinted enabling aero glass also enables new features including enhanced alt-tab menu taskbar thumbnails live previews windows flip 3d window switching mechanism cascades windows 3d effect windows 7 features refinements aero glass including larger window buttons default minimize maximize close query revised taskbar thumbnails ability manipulate windows dragging top sides screen side make fill half screen top maximize ability hide windows hovering show desktop button taskbar ability minimize windows shaking one use dwm extension aero glass theme requires video card 128mb graphics memory least 64mb video ram 1gb system ram on-board graphics supporting pixel shader 2.0 wddm-compatible drivers aero glass also available windows 7 starter available limited extent windows vista home basic automatically disabled user detected running non-genuine copy windows windows server 2008 windows server 2008 r2 also support aero glass part desktop experience component disabled default wizard 97 prevailing standard wizard design visual layout functionality used windows 98 windows server 2003 well microsoft products time frame aero wizards replacement wizard 97 incorporating visual updates match aesthetics rest aero well changing interaction flow specifically notifications allow application operating system component icon notification area create pop-up window information event problem windows first introduced windows 2000 known colloquially balloons similar appearance speech balloons commonly seen comics balloons often criticized prior versions windows due intrusiveness especially regard interacted full-screen applications games entire application minimized bubble came notifications aero aim less intrusive gradually fading appearing full-screen application screensaver displayed—in cases notifications queued appropriate time larger icons multiple font sizes colors also introduced aero notification windows segoe ui typeface default font aero languages use latin greek cyrillic character sets default font size also increased 8pt 9pt improve readability segoe ui typeface prior windows 8 numeral zero 0 narrow capital letter wider windows 8 segoe ui keeps difference numeral one 1 top hook capital letter equal crown base windows 8 1 base crown base aero base icons designed iconfactory previously designed windows xp icons vista user experience guidelines also address issue tone writing text used aero user interface prior design guidelines microsoft done much address issue user interface text phrased way information requests presented user consistent parts operating system guidelines vista applications suggest messages present technically accurate advice concisely objectively positively assume intelligent user motivated solve particular problem specific advice includes use second person active voice e.g print photos camera avoidance words like please sorry thank
[ 4293, 7879, 3937, 3263, 378, 2198, 6096, 1097, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 6136, 2245, 5781, 435, 5442, 4377, 5090, 3340, 7602, 6164, 458, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, ...
Test
4,881
9
Pkfix:pkfix text-producing systems latex tex produce dvi files files written user files used moderate extent still post-processed tool called dvips converted dvi files postscript files understood many printers older versions dvips embedded bitmapped fonts represented letters symbols pictures fixed resolution instance 300 dpi files printed newer devices resolution 1200 dpi letters files bitmapped fonts display remarkably low quality jagged lines curves diagonals one solution problem substitute bitmapped fonts scalable fonts known among postscript users type 1 fonts remedy problem low quality printing one use heiko oberdiek utility called pkfix input pkfix postscript file generated dvips versions 5.58 newer output another postscript file time bitmapped fonts substituted scalable fonts possible technically speaking pkfix perl script searches postscript file comments bitmapped pk fonts introduced relatively recent dvips versions replaces corresponding type 1 fonts course simpler solution problem would reprocess latex/tex files recent tools fonts cases person given postscript file n't author document n't access source files worse source files may lost times
[ 5983, 1113, 3915, 5571, 6016 ]
Test
4,882
2
Single_address_space_operating_system:single address space operating system computer science single address space operating system sasos operating system provides one globally shared address space processes
[ 1855, 7325, 5275, 5571, 4695, 5021, 8066, 7550, 3299, 3905, 4920 ]
Test
4,883
3
The_Hobbit_(1982_video_game):hobbit 1982 video game hobbit illustrated text adventure computer game released 1982 zx spectrum home computer based book hobbit j. r. r. tolkien developed beam software philip mitchell dr. veronika megler published melbourne house later converted home computers available time including commodore 64 bbc micro oric computers arrangement book publishers copy book included game sold parser advanced time used subset english called inglish released adventure games used simple verb-noun parsers allowing simple phrases like get lamp inglish allowed player type advanced sentences ask gandalf curious map take sword kill troll parser complex intuitive introducing pronouns adverbs viciously attack goblin punctuation prepositions allowing player interact game world ways previously possible many locations illustrated image based originals designed kent rees tape version save space image stored compressed format storing outline information flood filling enclosed areas screen slow cpu speed meant would take several seconds scene draw disk-based versions game used pre-rendered higher-quality images game innovative text-based physics system developed veronika megler objects including characters game calculated size weight solidity objects placed inside objects attached together rope damaged broken main character sitting barrel barrel picked thrown trapdoor player would go unlike works interactive fiction game also real time insofar period idleness causes wait command automatically invoked possibility events occurring result suppressed entering pause command stops events key pressed game cast non-player characters npcs entirely independent player bound precisely game rules loyalties strengths personalities affect behaviour always predicted character gandalf example would roam freely around game world fifty locations picking objects getting fights captured volatility characters coupled rich physics impossible-to-predict fighting system enabled game played many different ways though would also lead problems important character killed early numerous possible solutions hindsight game might regarded one first examples emergent gameplay also resulted however many bugs example development megler found animal npcs killed player arrived game documentation warned due immense size complexity game impossible guarantee ever completely error-free melbourne house issued version 1.1 fixes another bug resulted game unwinnable forcing release version 1.2 company never fixed bugs info 1985 rated hobbit commodore 64 three-plus stars five stating graphics pleasant show-stoppers game parser puzzles typical adventures today magazine concluded tolkien fans likely pleased title hobbit bestseller uk zx spectrum 1983 c64 bbc following year game 1983 golden joystick award best strategy game game also huge commercial success selling 100,000 copies first two years retail price £14.95 records sales figures article march 1985 estimated range 100,000 200,000 figure 500,000 copies possible making excellent candidate bestselling text adventure time challenged infocom ’ zork use images many locations opposed mostly text-only adventure games time flexibility inglish parser innovative independence non-player characters popularity tolkien work attributed game phenomenal success help players book called guide playing hobbit david elkan published 1984 developer beam software followed hobbit 1985 1987 shadows mordor game two lord rings 1989 crack doom would also reuse inglish sherlock 1986 parody game released crl boggit phrase game entered popular culture thorin sits starts singing gold also game mentioned nick montfort twisty little passages book exploring history form interactive fiction genre discworld noir references hobbit protagonist lewton discovers someone concealed wine barrel wonders brings mind phrases wait – time passes thorin sits starts singing gold
[ 3925 ]
Test
4,884
9
PDF/VT:pdf/vt pdf/vt international standard published iso august 2010 iso 16612-2 defines use pdf exchange format optimized variable transactional printing built top pdf/x-4 first variable-data printing vdp format ensures modern international color consortium-based icc color management use icc output intents adds notion encapsulated groups graphic objects support optimized efficient processing repeating text graphic image content introducing concept document part metadata dpm enables reliable dynamic management pages high volume transactional output hvto print data like record selection postage optimization based metadata pdf/vt-1 always consists self-contained file variants standard support use external graphic content pdf/vt-2 well streaming use multi-part mime packages pdf/vt-2s addition digital master vdp printing shared viewed interactively navigated human operators using normal pdf reader though completely accurate rendering requires pdf/x-4 pdf/vt conforming viewer number vendors announced support pdf/vt upon publication standard 2010 subsequent years various pdf/vt-consuming -producing products also reached market ubiquity pdf well fact pdf iso standard iso 32000-1:2008 clearly work favor pdf/vt nevertheless currently difficult predict industry pdf/vt adopted fast happen positioned vis-à-vis formats architectures variable data printing practical requirements benefits pdf/vt explained detail along related recommendations guide global graphics. ref name= dopdf/vtright /ref
[ 3764, 6172, 7721, 3620, 1543, 6428, 7732, 6015, 2214, 737, 7745, 6208, 1114, 5948, 1774, 2057, 2872, 2877, 3916, 698, 1435, 7144 ]
Test