node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,085
2
Maintenance_Operations_Protocol:maintenance operations protocol maintenance operation protocol mop used utility services uploading downloading system software remote testing problem diagnosis proprietary protocol digital equipment corporation mop frames one following commands
[ 7490 ]
Test
5,086
2
Operating_Systems:_Design_and_Implementation:operating systems design implementation operating systems design implementation computer science textbook written andrew s. tanenbaum help albert s. woodhull includes tanenbaum minix free unix-like operating system designed teaching purposes publisher prentice hall 1987 source code minix included part original 719 pages text later versions three editions also included loadable disks minix
[ 4435, 5094 ]
Validation
5,087
3
MOS_Technology_6510:mos technology 6510 mos technology 6510 8-bit microprocessor designed mos technology modified form successful 6502 6510 widely used commodore 64 home computer variants primary change 6502 addition 8-bit general purpose i/o port although six i/o pins available common version 6510 addition address bus could made tristate c64 extra i/o pins processor used control computer memory map bank switching controlling three four signal lines datasette tape recorder electric motor control key-press sensing write data lines read data line went another i/o chip possible writing correct bit pattern processor address 01 completely expose almost full 64 kb ram c64 leaving rom i/o hardware exposed except processor i/o port data directional register 1985 mos produced 8500 hmos version 6510 process modification virtually identical nmos version 6510 8500 originally designed use modernised c64 c64c however 1985 limited quantities 8500s found older nmos-based c64s finally made official debut 1987 appearing motherboard using new 85xx hmos chipset 7501/8501 variant 6510 introduced 1984 compared 6510 variant extends number i/o port pins 6 8 omits pins non-maskable interrupt clock output.. used commodore c16 c116 plus/4 home computers i/o port controlled datasette also cbm bus interface main difference 7501 8501 cpus manufactured slightly different processes 7501 manufactured hmos-1 8501 hmos-2 2 mhz-capable 8502 variant used commodore 128 cpus opcode compatible including undocumented opcodes commodore 1551 disk drive used 6510t version 6510 eight i/o lines nmi rdy signals available
[ 7960, 6078, 7519, 468, 7531, 5296, 5926, 7730, 2036, 1670, 2237, 4532, 7668, 6662, 7222, 1237, 3918, 263, 1150 ]
Test
5,088
2
Visi_On:visi visicorp visi short-lived highly influential graphical user interface-based operating environment program ibm compatible personal computers running ms-dos although visi never popular steep minimum system requirements day major influence later development microsoft windows spring 1981 personal software cash-flush ever-increasing sales visicalc corporate directors sat planned future directions ed esber introduced concept family products could sold together technical perspective none products similar anything name instance use visiplot visicalc data numbers plotted exported raw format re-imported dan fylstra led technical discussion sorts actions user would need able accomplish order products truly integrated decided three key concepts one universal data exchange would supported set common data structures used programs another common consistent interface users would re-learn ui moved one program another finally fylstra concerned time needed move one program another long useful – user needing quickly look something visidex would save exit visicalc look information quit re-launch visicalc process made quicker simpler july 1981 xerox announced xerox star advanced workstation computer featuring graphical user interface point well known secret apple computer working low-cost computer gui would later released apple lisa personal software president terry opdendyk knew two-man team texas working gui arranged scott warren dennis abbe visit personal software headquarters sunnyvale california demonstrated version smalltalk programming language running trs-80 microcomputer seriously underpowered machine task personal software extremely impressed contract soon signed work project quasar started almost immediately name shortly thereafter changed visi play vision retained visi naming experimental port ill-fated apple iii completed november development work shifted dec vax cross-compilers number different machines early 1982 personal software changed name visicorp betting much future success company visi visi many features modern gui included become common many years later fully mouse-driven used bit-mapped display text graphics included on-line help allowed user open number programs window visi however include graphical file manager visi also demanded hard drive order implement virtual memory system used fast switching time hard drives expensive piece equipment tom powers visicorp new vp marketing pushed system demonstrated fall comdex show 1982 others company worried product ready shipping showing early would leave potential customers distributors upset n't ready soon another concern visiword released show worry might lost shuffle demonstrations comdex huge success many viewers told simply movie watching bill gates speculated pc fact simply terminal real machine like vax became one talked-about products industry however huge success led number serious problems separate june july 1983 byte articles company mentioned late summer 1983 release visi development continued visicorp entity process self-destruction terry opdendyk president hand-picked early venture capital investors extremely autocratic management style led departure many key executives late 1981 eventual release visi product management company left notably mitch kapor charge visicalc development ed esber roy folk visi product marketing manager among others referred corporate civil war mitch kapor departure would prove devastating company however kapor developer visiplot visitrend pressing development greatly improved spreadsheet succeed visicalc opdendyk uninterested time visicorp visicalc developers impasse visicalc growing increasingly outdated kapor decided leave executives pressed clause forbidding kapor work integrated spreadsheet opdendyk could n't bothered exclaiming kapor spaghetti programmer denigrating abilities kapor would go release lotus 1-2-3 became major competitor visicalc 1983 end year sales cut half combined exodus major portions senior executive staff ongoing battle visicalc developers visicorp soon serious financial difficulty hopes company future placed visi october 31 1983 infoworld article titled finally visi flatly stated ... publisher putting product computer store shelves ... visi scheduled available last week october november 14 1983 issue said visicorp released visi however july 2 1984 issue says time visi actually shipped december 16 1983 ... pc magazine reported february 7 1984 issue still n't received product commercially available form operating system known visi applications manager released december 1983 sold 495 requiring mouse another 250 main disadvantage visi extremely high system requirements 1982 standards needed 512 kilobytes ram hard disk time pcs shipped 64k-128k ibm yet offer hard disk pc ibm first model hard drive pc xt n't ship march 1983 third-party drives however available time typically 5mb units connected floppy controller treated operating system oversized floppy disk subdirectory support brought total cost running visi 7500 three-quarters cost apple lisa press continued laud product going far claim represented end operating systems end-users less impressed however due high cost required hardware also general slowness system market computers generally used one two tasks usually business related whole purpose visi seriously diluted january 1984 apple computer released macintosh much fanfare although macintosh seriously lacking software faster cheaper included one feature visi lacked graphical file manager finder although n't compete directly visi really pc product nevertheless demonstrated gui could indeed fast relatively inexpensive visi failed deliver adding release problems bill gates took page visicorp book announced product microsoft windows would available may 1984 muddied waters significantly notably claimed would similar feature set n't require hard disk cost 250 windows released even longer delay visi shipping november 1985 lacking features forced visi demand hard drive eight visicorp employees still developing visi visicorp sold source code control data mid-1984 raise cash sued software arts continuing sell software sales apparently slow february 1985 visicorp responded lowering price basic os 99 knowing anyone purchasing would also need buy applications bundled three 990 improved situation somewhat sales still far projections certainly helping company stave problems due lotus 1-2-3 following declining visicalc sales low revenues visi november 1985 company merged paladin software new company kept paladin name visicorp line visiproducts history official system requirements visi work newer pcs requires compatible mouse hard disk partition 15mb fat12 file system supported addition revectors irqs used pc/ats later visionxt.exe requires modifications prevent graph applications functioning properly visi required mouse systems-compatible mice microsoft-compatible pc mice time became standard introduced later may 1983 visi used two mouse drivers first loaded text mode made mouse registers accessible embedded driver translated coordinates cursor position internal driver built-in subroutine visionxt.exe required mouse systems pc-mouse pointing device compatible microsoft mouse standard writing visi applications required unix development environment visi targeted toward high-end expensive pc workstations visi applications written subset c visic third-party could ported core software visihost visimachine virtual machine visionxt.exe ibm pc dos version unix never occurred 1984 visicorp assets sold control data corporation making working copies original floppy disks using modern methods difficult protected using pre-created bad sectors methods floppy disk identification
[ 1807, 7512, 4297, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 4347, 65, 4733, 5783, 6853, 5784, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 2300, 126, 6907, 4786, 4423, 6197, 4061, 1208...
Test
5,089
1
CrateDB:cratedb cratedb distributed sql database management system integrates fully searchable document oriented data store open-source written java based shared nothing architecture designed high scalability includes components facebook presto apache lucene elasticsearch netty cratedb project started jodok batlogg open source contributor creator contributed open source initiative vorarlberg lovely systems dornbirn software open source clustered database used fast text search analytics company called crate.io raised first round financing april 2014 4m round march 2016 2.5m round january 2017 dawn capital draper esprit speedinvest sunstone capital june 2014 crate.io judge choice award gigaom structure launchpad competition october 2014 win techcrunch disrupt europe london cratedb 1.0 released december 2016. reported one million downloads cratedb 2.0 enterprise edition released may 2017 cratedb language sql uses document-oriented approach nosql style databases software uses sql parser facebook presto query analysis distributed query engine elasticsearch lucene used transport protocol cluster discovery netty asynchronous event driven network application framework cratedb offers automatic data replication self-healing clusters high availability cratedb includes built-in administration interface command line interface crate shell – crash allows interactive queries python client advanced features sqlalchemy integration
[ 3915, 5571, 3396, 4511 ]
Train
5,090
2
Windows_DVD_Maker:windows dvd maker windows dvd maker dvd authoring utility developed microsoft first released 2007 windows vista utility allows users create dvd slideshows videos playback media devices dvd player comparable apple idvd released 2001 dvd maker removed windows 8 windows dvd maker first reported paul thurrott windows hardware engineering conference 2003 thurrott stated windows vista known codename longhorn would support dvd movie creation independent application shell information accompanied additional reports windows vista would support major dvd packet writing formats mount rainier would also eliminate staging burning steps writing optical media—files copied recordable media would instead written immediately latter functionality exposed via live file system windows dvd maker available home premium enterprise ultimate editions windows vista well home premium professional enterprise ultimate editions windows 7 simple aero wizard-style user interface takes user process creating dvd-video first step involves importing video files arranging play proper order windows dvd maker automatically splits videos scenes accessed special scene selection page dvd menu next step animated dvd menus added compilation windows dvd maker also add slide show pictures musical accompaniment transition effects many similar transition effects available windows movie maker users also customize font button styles application show interactive preview dvd look act like burned example users navigate dvd menus testing windows dvd maker designed encode video background process reduced scheduling priority ensure computer remains responsive compilation process
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 3340, 7602, 6164, 4759, 6880, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 5128, 3711, 5134, 7272, 1571, 5850, 140, 6558, ...
Test
5,091
9
Swift_(programming_language):swift programming language swift general-purpose multi-paradigm compiled programming language developed apple inc. ios macos watchos tvos linux z/os swift designed work apple cocoa cocoa touch frameworks large body existing objective-c code written apple products built open source llvm compiler framework included xcode since version 6 released 2014 apple platforms uses objective-c runtime library allows c objective-c c++ swift code run within one program apple intended swift support many core concepts associated objective-c notably dynamic dispatch widespread late binding extensible programming similar features safer way making easier catch software bugs swift features addressing common programming errors like null pointer dereferencing provides syntactic sugar help avoid pyramid doom swift supports concept protocol extensibility extensibility system applied types structs classes apple promotes real change programming paradigms term protocol-oriented programming similar traits swift introduced apple 2014 worldwide developers conference wwdc underwent upgrade version 1.2 2014 major upgrade swift 2 wwdc 2015 initially proprietary language version 2.2 made open-source software apache license 2.0 december 3 2015 apple platforms linux version 3.0 syntax swift went significant evolution core team making source stability focus later versions first quarter 2018 swift surpassed objective-c measured popularity swift 4.0 released 2017 introduced several changes built-in classes structures code written previous versions swift updated using migration functionality built xcode swift 5 released march 2019 introduced stable binary interface apple platforms allowing swift runtime incorporated apple operating systems source compatible swift 4 development swift started july 2010 chris lattner eventual collaboration many programmers apple swift took language ideas objective-c rust haskell ruby python c clu far many others list june 2 2014 apple worldwide developers conference wwdc application became first publicly released app written swift beta version programming language released registered apple developers conference company promise final version swift would source code compatible test version apple planned make source code converters available needed full release swift programming language free 500-page manual also released wwdc available ibooks store official website swift reached 1.0 milestone september 9 2014 gold master xcode 6.0 ios swift 1.1 released october 22 2014 alongside launch xcode 6.1 swift 1.2 released april 8 2015 along xcode 6.3 swift 2.0 announced wwdc 2015 made available publishing apps app store september 21 2015 swift 3.0 released september 13 2016 swift 4.0 released september 19 2017 swift 4.1 released march 29 2018 swift first place loved programming language stack overflow developer survey 2015 second place 2016 december 3 2015 swift language supporting libraries debugger package manager open sourced apache 2.0 license runtime library exception swift.org created host project source code hosted github easy anyone get code build even create pull requests contribute code back project december 2015 ibm announced swift sandbox website allows developers write swift code one pane display output another swift sandbox deprecated january 2018 wwdc 2016 apple announced ipad exclusive app named swift playgrounds intended teach people code swift app presented 3d video game-like interface provides feedback lines code placed certain order executed january 2017 chris lattner announced departure apple new position tesla motors swift project lead role going team veteran ted kremenek wwdc 2019 apple announced swiftui provides framework declarative ui structure design across apple platforms swift alternative objective-c language employs modern programming-language theory concepts strives present simpler syntax introduction described simply objective-c without c default swift expose pointers unsafe accessors contrast objective-c uses pointers pervasively refer object instances also objective-c use smalltalk-like syntax making method calls replaced dot-notation style namespace system familiar programmers common object-oriented oo languages like java c swift introduces true named parameters retains key objective-c concepts including protocols closures categories often replacing former syntax cleaner versions allowing concepts applied language structures like enumerated types enums cocoa cocoa touch environments many common classes part foundation kit library included nsstring string library using unicode nsarray nsdictionary collection classes others objective-c provided various bits syntactic sugar allow objects created on-the-fly within language created objects manipulated object calls instance objective-c concatenating two nsstrings required method calls similar swift many basic types promoted language core manipulated directly instance strings invisibly bridged nsstring foundation imported concatenated codice_1 operator allowing greatly simplified syntax prior example becoming swift supports five access control levels symbols codice_2 codice_3 codice_4 codice_5 codice_6 unlike many object-oriented languages access controls ignore inheritance hierarchies codice_6 indicates symbol accessible immediate scope codice_5 indicates accessible within file codice_4 indicates accessible within containing module codice_3 indicates accessible module codice_2 classes methods indicates class may subclassed outside module important new feature swift option types allow references values operate manner similar common pattern c pointer may refer value may null implies non-optional types result null-pointer error compiler ensure possible optional types created codice_12 mechanism—to make integer nullable one would use declaration similar codice_13 c swift also includes syntactic sugar allowing one indicate variable optional placing question mark type name codice_14 variables constants marked optional either value underlying type codice_15 optional types wrap base type resulting different instance codice_16 codice_17 fundamentally different types latter common codice_18 codice_16 access value inside assuming nil must unwrapped expose instance inside performed codice_20 operator case codice_20 operator unwraps codice_22 expose instance inside allowing method call made codice_22 nil null-pointer error occurs annoying practice swift also includes concept optional chaining test whether instance nil unwrap non-null case runtime calls codice_24 codice_22 nil suppressing error normally requires programmer test whether codice_26 nil proceeding origin term chaining comes common case several method calls/getters chained together instance reduced codice_27 syntax circumvents pyramid doom swift 2 introduced new keyword codice_28 cases code stop executing condition unmet using codice_28 three benefits syntax act codice_30 statement primary benefit inferring non-nullability codice_30 statement requires case codice_28 assumes case based condition provided also since codice_28 contains scope exception codice_34 closure codice_35 presented unwrapped optional guard super-scope lastly codice_28 statement test fails swift requires codice_34 exit current method loop ensuring codice_35 never accessed codice_15 performed keywords codice_40 codice_41 codice_42 codice_43 objective-c weakly typed allowed method called object time method call failed default handler runtime returned nil meant unwrapping testing needed equivalent statement objective-c would return nil could tested however also demanded method calls dynamic introduces significant overhead swift use optionals provides similar mechanism testing dealing nils way allows compiler use static dispatch unwrapping action called defined instance wrapper versus occurring runtime dispatch system many object-oriented languages objects represented internally two parts object stored block data placed heap data structure |heap name handle object represented pointer computer programming |pointer objects passed methods copying value pointer allowing underlying data heap accessed anyone copy contrast basic types like integers floating point values represented directly handle contains data pointer data passed directly methods copying styles access termed pass-by-reference case objects pass-by-value basic types concepts advantages disadvantages objects useful data large like description window contents document cases access data provided copying 32- 64-bit value versus copying entire data structure however smaller values like integers size pointers typically one word computer architecture |word advantage passing pointer versus passing value also pass-by-reference inherently requires dereferencing operation produce noticeable overhead operations typically used basic value types like mathematics similarly c contrast oo languages swift offers built-in support objects using either pass-by-reference pass-by-value semantics former using codice_44 declaration latter using codice_45 structs swift almost features classes methods implementing protocols using extension mechanisms reason apple terms data generically instances versus objects values structs support inheritance however programmer free choose semantics appropriate data structure application larger structures like windows would defined classes allowing passed around pointers smaller structures like 2d point defined structs pass-by-value allow direct access internal data dereference performance improvement inherent pass-by-value concept swift uses types almost common data types including codice_46 codice_47 types normally represented objects like codice_16 codice_49 using value types result significant performance improvements user applications well ensure even largest structs cause performance penalty handed swift uses copy write objects copied program attempts change value means various accessors effect pointer data storage data physically stored one instance memory level application values separate physical separation enforced copy write needed key feature objective-c support categories methods added extend classes runtime categories allow extending classes in-place add new functions need subclass even access original source code example might add spell checker support base codice_50 class means instances nsstring application gain spell checking system also widely used organizational technique allowing related code gathered library-like extensions swift continues support concept although termed extensions declared keyword codice_51 unlike objective-c swift also add new properties accessors types enums extant instances another key feature objective-c use protocol_ object-oriented_programming protocols known modern languages interfaces protocols promise particular class implements set methods meaning objects system call methods object supporting protocol often used modern oo languages substitute multiple inheritance although feature sets entirely similar common example protocol cocoa codice_52 protocol defines one method codice_53 implements object copying deep copy|deep copying objects objective-c languages implementing protocol concept programmer ensure required methods implemented class swift adds ability add methods using extensions use generic programming generics implement combined allow protocols written support wide variety instances also extension mechanism used add protocol conformance object list protocol definition example protocol might declared called codice_54 ensures instances conform protocol implement codice_55 method returns codice_16 swift declared code like protocol added string access base class source swift like many modern languages supporting interfaces protocols used types means variables methods defined protocol instead specific type matter sort instance codice_57 compiler ensure conforms protocol thus code safe syntax also means collections based protocols also like codice_58 swift treats structs classes similar concepts extensions protocols extensively used swift runtime provide rich api based structs instance swift uses extension add codice_59 protocol many basic types like strings arrays allowing compared codice_60 operator concrete example features interact seen concept default protocol implementations function defines method works instance conforming codice_59 providing equals function instance class struct automatically gains implementation simply conforming codice_59 many instances gain codice_59 base implementations generic extensions basic objects runtime gain equals equals code combination protocols defaults protocol inheritance extensions allows many functions normally associated classes inheritance implemented value types properly used lead dramatic performance improvements significant limits api concept widely used within swift apple begun calling protocol-oriented programming language suggest addressing many problem domains normally solved though classes inheritance using protocols structs instead swift uses runtime extant objective-c system requires ios 7 macos 10.9 higher swift objective-c code used one program extension c c++ also contrast c c++ code used directly swift objective-c c wrapper must created swift c++ case objective-c swift considerable access object model used subclass extend use objective-c code provide protocol support converse true swift class subclassed objective-c. aid development programs re-use extant code xcode 6 higher offers semi-automated system builds maintains bridging header expose objective-c code swift takes form additional header file simply defines imports objective-c symbols needed project swift code point swift refer types functions variables declared imports though written swift objective-c code also use swift code directly importing automatically maintained header file objective-c declarations project swift symbols instance objective-c file mixed project called myapp could access swift classes functions code codice_64 symbols available mechanism however—use swift-specific features like generic types non-object optional types sophisticated enums even unicode identifiers may render symbol inaccessible objective-c swift also limited support attributes metadata read development environment necessarily part compiled code like objective-c attributes use codice_65 syntax currently available set small one example codice_66 attribute marks given value code outlet available use within interface builder ib outlet device binds value on-screen display object code swift uses automatic reference counting arc memory management|manage memory apple used require manual memory management objective-c introduced arc 2011 allow easier memory allocation deallocation one problem arc possibility creating reference counting reference cycle|strong reference cycle objects reference way reach object started following references e.g references b b references causes become leaked memory never released swift provides keywords codice_67 codice_68 prevent strong reference cycles typically parent-child relationship would use strong reference child-parent would use either codice_67 reference parents children unrelated codice_68 child always parent parent may child weak references must optional variables since change become codice_15 closure within class also create strong reference cycle capturing self references self references treated weak unowned indicated using capture list key element swift system ability cleanly debugged run within development environment using read–eval–print loop repl giving interactive properties common scripting abilities python traditional system programming languages repl enhanced new concept swift playgrounds|playgrounds interactive views running within xcode environment respond code debugger changes on-the-fly swift playgrounds|playgrounds allow programmers add swift code along markdown documentation code changes time regard ranged input value view used timeline assistant demonstrate output animated way addition xcode debugging features swift development including breakpoints step step statements well ui element placement breakdowns app developers apple says swift industrial-quality programming language expressive enjoyable scripting language many features introduced swift also well-known performance safety trade-offs apple implemented optimizing compiler|optimizations reduce overhead swift similar c various ways also similarities objective-c differences objective-c include since language open-source prospects ported web web frameworks already developed ibm kitura perfect server framework |perfect vapor server-side swift |vapor official server apis work group also started apple members swift developer community playing central role second free implementation swift targets cocoa api |cocoa microsoft common language infrastructure .net framework|.net java software platform |java android operating system |android platform exists part elements compiler remobjects software category apple inc. software category computer-related introductions 2014 category object-oriented programming languages category pattern matching programming languages category programming languages category programming languages created 2014 category software using apache license category statically typed programming languages category systems programming languages
[ 6788, 3940, 1825, 7890, 6428, 3623, 4320, 1840, 2926, 4690, 1435, 734, 3968, 5397, 2576, 1854, 5752, 4705, 405, 6116, 7557, 6118, 6125, 2954, 1123, 7573, 6847, 7936, 6142, 775, 2609, 5786, 1895, 5787, 1901, 2619, 4017, 4376, 4749, 7601, ...
Test
5,092
2
Composer_(software):composer software composer application-level package manager php programming language provides standard format managing dependencies php software required libraries developed nils adermann jordi boggiano continue manage project began development april 2011 first released march 1 2012 composer strongly inspired node.js npm ruby bundler project dependency solving algorithm started php-based port opensuse libzypp satsolver composer runs command line installs dependencies e.g libraries application also allows users install php applications available packagist main repository containing available packages also provides autoload capabilities libraries specify autoload information ease usage third-party code composer offers several parameters including example composer.json generated following command different authorized versions libraries defined
[ 4296, 5726, 4675, 6428, 5386, 7555, 2594, 7933, 5433, 781, 4759, 7619, 7251, 3366, 4778, 4059, 3036, 1582, 4441, 523, 163, 1598, 1989, 8055, 5200, 5545, 6609, 1260, 5912, 1643, 5571, 578, 2034, 933, 2771, 6663, 1684, 952, 6312, 5965, 70...
Train
5,093
7
VOMS:voms voms acronym used virtual organization membership service grid computing structured simple account database fixed formats information exchange features single login expiration time backward compatibility multiple virtual organizations database manipulated authorization data defines specific capabilities roles users administrative tools used administrators assign roles capability information database command-line tool allows users generate local proxy credential based contents voms database credential includes basic authentication information standard grid proxy credentials contain also includes role capability information voms server voms-aware applications use voms data make authentication decisions regarding user requests voms originally developed european datagrid enabling grids e-science projects maintained italian national institute nuclear physics infn voms also acronym voucher management system used providing recharge management services prepaid systems telecom service providers typically external voucher management systems used intelligent network based prepaid systems
[ 112, 2362, 4159, 1805, 5539 ]
Train
5,094
2
Modern_Operating_Systems:modern operating systems modern operating systems book written andrew tanenbaum version target implementation book 4th edition published march 2014 modern operating systems mostly known mos popular book across globe includes fundamentals operating system small amounts code written autonomous c language mos describes many scheduling algorithms
[ 5571, 1435, 5086 ]
Test
5,095
4
Fabrik_Inc.:fabrik inc. fabrik inc. manufacturer external hard drives digital content management software services fabrik said third largest supplier external storage products north america 2007 headquartered san mateo offices santa ana culver city california company sells external hard drives online backup software bundled product consumers small business users audio/video a/v content creation professionals company also hosts free online digital content management sharing site joggle fabrik product lines include simpletech g-technology joggle fabrik ultimate backup fabrik founded web-based software company august 2005 former maxtor executives mike cordano keyur patel anaal udaybabu designed brand identity on-the-web storage following month company disclosed completion series funding 4.1 million followed 8 million series b funding july 2006 14.3 million february 2007 may 2007 company received 24.9 million funding bringing total 51.3 million funding february 2006 fabrik partnered maxtor acquired seagate 2005 develop maxtor fusion network-attached storage nas device built organizing sharing digital files late 2006 company launched myfabrik.com organized stored digital media online february 2007 company acquired consumer business simpletech inheriting simpletech product line external hard drives consumers small businesses january 2008 fabrik acquired g-technology inherited suite external hard drives mac creative pro photography a/v markets including firewire esata usb scsi fibre channel storage products fabrik acquisitions introduction joggle demo conference january 2008 created four brands simpletech g-technology joggle fabrik ultimate backup simpletech g-technology products still branded maintained separate online website entities february 23 2009 hitachi global storage technologies announced agreed acquire fabrik point fabrik revenue year 2009 estimated 350m 400m range growing 40 yearly basis april 6 2009 hitachi global storage technologies completed acquisition formed core hitachi gst new branded business division following acquisition subsidiary branded g-technology hitachi company simpletech products external hard drives mainstream consumers small business users includes portable external hard drives desktop external hard drives simpletech products come bundled free local backup software online backup capabilities simpletech drive 100 percent recyclable enclosure several energy resource efficiency features company claims drive world eco-friendly resource conscious external hard drive original design simpletech portable external storage product line inspired ferrari design team pininfarina fabrik started free online digital content management site called joggle early 2008 web site searches video photos music user computer external hard drive online communities networking sites automatically consolidates single online organizing sharing tool company also pure online backup approach fabrik ultimate backup data backed remote servers using 128-bit ssl blowfish encryption
[ 1710, 2390, 2566, 895 ]
Test
5,096
4
Kemp_Inc:kemp inc kemp inc. founded 2000 bethpage new york operates application delivery controller industry company builds load balancing products balances user traffic multiple application servers physical virtual cloud environment 2010 kemp opened european headquarters limerick ireland edison ventures kennet partners orix venture finance invested 16 million company research development sales marketing early 2012 april 2014 kemp announced investment limerick operations expand 30 positions 80 kemp recognized visionary 2015 gartner magic quadrant application delivery controllers 2016 2019 kemp purchased private equity firm mill point capital kemp software company develops load balancing application delivery software built linux operating system sold loadmaster brand 2017 40,000 customer deployments loadmaster need high availability scalability security visibility applications enables customers scale operations delivering applications layer 4 7 load balancing enhanced performance secure access loadmaster software-based load balancer adc available virtualized appliance well cloud including azure aws others kemp main product loadmaster load balancer built proprietary software platform called lmos enables run almost platform kemp loadmaster appliance virtual loadmaster vlm deployed hyper-v vmware bare metal public cloud kemp available azure top 15 deployed applications well aws vmware vcloud air 2013 kemp announced adding pre-authorization single sign-on sso persistent logging product range tmg alternative kemp ’ dns based global site load balancer gslb enables customers provide availability scaling resilience applications geographically distributed including data center environments private clouds multi-public cloud environments azure aws well hybrid environments applications deployed across public private cloud capabilities provided geo loadmaster similar hosted services dyn dns march 2014 kemp announced availability microsoft azure cloud platform first 3rd party load balancer available vlm azure loadmaster virtual load balancer may 2016 kemp launched centralized application monitoring reporting product called kemp 360 central™ allows network application administrators view state different load balancers application delivery controllers views include throughput users transactions per second product allows users connect 3rd party devices like f5 nginx haproxy time launching kemp 360 central kemp also announced general release 360 vision monitors health applications 360 vision monitors patterns application data statistics able provide pre-emptive health alerts designed prevent application outages march 2015 kemp launched free version loadmaster software called free loadmaster fully featured load balancer shares commercial product features including full layer 4 layer 7 load balancing reverse proxy web content caching compression non-commercial waf web application firewall 20mbps kemp announced launched world first software defined network sdn ready adaptive load balancer september 2014 kemp announced joining opendaylight open source sdn project kemp introduced service mesh part offering 2018 listed company watch techtarget
[ 193 ]
Test
5,097
3
Motorola_68030:motorola 68030 motorola 68030 sixty-eight-oh-thirty 32-bit microprocessor motorola 68000 family released 1987 68030 successor motorola 68020 followed motorola 68040 keeping general motorola naming cpu often referred 030 pronounced oh-three-oh oh-thirty 68030 features 273,000 transistors on-chip instruction data caches 256 bytes also on-chip memory management unit mmu built floating-point unit fpu 68881 faster 68882 floating point unit chips could used 68030 lower cost version 68030 motorola 68ec030 also released lacking on-chip mmu commonly available 132 pin qfp 128 pin pga packages poorer thermal characteristics qfp package limited full 68030 qfp variant 33 mhz pga 68030s included 40 mhz 50 mhz versions also small supply qfp packaged ec variants microarchitecture 68030 basically 68020 core additional 256 byte data cache process shrink added burst mode caches four longwords placed cache without cpu intervention motorola used process shrink pack hardware die case mmu mostly completely compatible external 68851 integration mmu made cost-effective 68020 external mmu also allowed 68030 access memory one cycle faster 68020/68851 combo however 68030 switch synchronous asynchronous buses without reset 68030 also lacks 68020 instructions increases performance ≈5 reducing power draw ≈25 compared 68020 68030 used 68020 bus case performance similar 68020 derived however 68030 provides additional synchronous bus interface used accelerates memory accesses 33 compared equally clocked 68020 finer manufacturing process allowed motorola scale full-version processor 50 mhz ec variety topped 40 mhz 68030 used many models apple macintosh ii commodore amiga series personal computers next cube later alpha microsystems multiuser systems descendants atari st line atari tt atari falcon also used unix workstations sun microsystems sun-3x line desktop workstations earlier sun3 used 68020 laser printers nortel networks dms-100 telephone central office switch recently 68030 core also adapted freescale microcontroller embedded applications lecroy used 68ec030 certain models 9300 series digital oscilloscopes including “ c ” suffix models high performance 9300 series models along mega waveform processing hardware option 68020-based 9300 series models 68ec030 low cost version 68030 difference two 68ec030 omits on-chip memory management unit mmu thus essentially upgraded 68020 68ec030 used cpu low-cost model amiga 4000 number cpu accelerator cards commodore amiga line computers also used cisco systems 2500 series router small-to-medium enterprise computer internetworking appliance 50 mhz speed exclusive ceramic pga package plastic '030 stopped 40 mhz
[ 3346, 5100, 7327, 1075, 7702, 4479, 5463, 102, 5469, 4768, 7888, 1454, 5916, 5477, 5652, 1094, 5037, 3708, 4783, 7905, 7990, 6111, 4702, 6200, 1386, 405, 4967, 6202, 7654, 3387, 2133, 3390, 3987, 234, 1216, 2501, 6299, 5952, 2781, 5622, ...
Train
5,098
9
Euler_(software):euler software euler euler mathematical toolbox eumatht free open-source numerical software package contains matrix language graphical notebook style interface plot window euler designed higher level math calculus optimization statistics software handle real complex interval numbers vectors matrices produce 2d/3d plots uses maxima symbolic operations software compilable windows unix linux versions contain computer algebra subsystem euler math toolbox originated 1988 program atari st. time title program simply euler turned unspecific internet main aim program create tool testing numerical algorithms visualize results demonstrate mathematical content classroom euler math toolbox uses matrix language similar matlab system development since 1970s main developer euler rené grothmann mathematician catholic university eichstätt-ingolstadt germany 2007 euler married maxima computer algebra system symbolic expressions functions added communicate maxima reach good degree integration numerical euler core euler core numerical system written c/c++ handles real complex interval values matrices types available data types sparse compressed matrices long accumulator exact scalar product strings strings used expressions file names etc based core additional functions implemented euler matrix language interpreted programming language style advanced basic dialect euler contains libraries statistics exact numerical computations interval inclusions differential equations stiff equations astronomical functions geometry clean interface consists text window graphics window text window contains fully editable notebooks graphics window graphics output graphics added notebook window exported various formats png svg wmf clipboard graphic types include line bar point plots 2d 3d including anaglyph plots 3d surfaces 3d plots euler api use open raytracer pov-ray euler handles symbolic computations via maxima loaded separate process communicating euler pipes two programs exchange variables values indeed maxima used various euler functions e.g newton method assist computation derivatives taylor expansions integrals moreover maxima called definition time euler function latex used within euler display formulas export formulas html either generated latex images mathjax used special export option exports graphics svg euler also includes tiny c compiler allows subroutines c compiled included via windows dll euler lot similarity matlab free clones gnu octave compatible
[ 3606, 2820, 4759, 3619, 5288, 5117, 7069, 6356, 5571, 4872, 578, 4705, 1569, 4067, 3981, 4070, 7860, 3410, 256, 4999, 1435 ]
Test
5,099
4
Malvertising:malvertising malvertising portmanteau malicious advertising use online advertising spread malware typically involves injecting malicious malware-laden advertisements legitimate online advertising networks webpages online advertisements provide solid platform spreading malware significant effort put order attract users sell advertise product advertising content inserted high-profile reputable websites malvertising provides malefactors opportunity push attacks web users might otherwise see ads due firewalls safety precautions like malvertising attractive attackers 'can easily spread across large number legitimate websites without directly compromising websites malvertising fairly new concept spreading malware even harder combat work way webpage spread system unknowingly interesting thing infections delivered malvertising require user action like clicking compromise system exploit vulnerabilities website server hosted ... infections delivered malvertising silently travel web page advertisements able expose millions users malware even cautious growing rapidly 2012 estimated nearly 10 billion ad impressions compromised malvertising attackers wide reach able deliver attacks easily advertisement networks companies websites difficulty diminishing number malvertising attacks suggests attack vector ’ likely disappear soon websites web publishers unknowingly incorporate corrupted malicious advertisement page computers become infected pre-click post click misconception infection happens visitors begin clicking malvertisement examples pre-click malware include embedded main scripts page drive-by-downloads malware also auto-run case auto redirects user automatically taken different site could malicious malware also found delivery ad – clean ad malware pre post click build design still infected whilst called malicious code hide undetected user idea coming way post-click malvertisement example user clicks ad visit advertised site instead directly infected redirected malicious site sites trick users copying viruses spyware usually disguised flash files popular web redirection often built online advertising spread malware often successful users expect redirection happen clicking advertisement redirection taking place needs co-opted order infect user computer malvertising often involves exploitation trustworthy companies attempting spread malware place clean advertisements trustworthy sites first order gain good reputation later insert virus spyware code behind ad mass virus infection produced remove virus thus infecting visitors site time period identities responsible often hard trace making hard prevent attacks stop altogether ad network infrastructure complex many linked connections ads click-through destinations malvertisements infect vulnerable computer even user never clicks normal-appearing advertisement 2007/2008 first recorded sighting malvertising late 2007 early 2008 threat based vulnerability adobe flash something continued day – see later affected number platforms including myspace excite rhapsody 2009 online edition new york times magazine found serving ad part larger click fraud scam created botnet network malware infected computers nicknamed bahama botnet went used carry click fraud pay per click ads web banner feed new york times hacked weekend september 11 14 causing readers see advertisements telling systems infected trying trick installing rogue security software computers according spokeswoman diane mcnulty culprit approached newspaper national advertiser provided apparently legitimate ads week ads switched virus alert malvertisement afterwards new york times suspended third-party advertisements address problem even posted advice readers regarding issue technology blog 2010 malvertising takes marketing analysts clickz noted online trust alliance ota identified billions display ads across 3500 sites carrying malware year online trust alliance formed cross industry anti-malvertising task force 2011 spotify malvertising attack used blackhole exploit kit – one first instances drive-by download user ’ even click ad become infected malware according bluecoat security systems report 2011 saw increase 240 malvertising based malicious sites 2012 symantec includes malvertising section internet security threat report 2013 looked back landscape 2012 symantec used scanning software across series websites detected half infected malvertising 2012 la times hit massive malvertising attack used blackhole exploit kit infect users seen part general campaign malvertising hit large news portals – strategy carried subsequent years attacks huffingtonpost.com ny times 2013 major malvertising campaign waged yahoo.com one largest ad platforms monthly visits 6.9 billion malware exploit based commonly used web attack cross-site scripting xss number three top ten web attacks types identified open web application security project owasp attack infected users machines ransomware ‘ cryptowall ’ type malware extorts money users encrypting data placing ransom 1000 bitcoins paid 7 days decrypt data 2014 2014 major malvertising campaigns doubleclick zedo ad networks various news portals including times israel hindustan times affected previous attacks cybercrime involved cryptowall malware infection spate malvertising believed brought 1 million ransom money infecting 600,000 computers 2015 mcafee threat report february 2015 said malvertising growing quickly mobile platforms 2015 malvertising campaigns ebay answers.com talktalk.co.uk wowhead.com among others campaigns involved breaches ad networks including doubleclick engage bdr also report possibly first political malvertising campaign pro-russian activists based botnet forced users machines visit bogus sites generated ad revenue activists users also ended several pro-russian propaganda videos several popular websites news sources victims malvertising malicious advertisements placed webpages widgets unknowingly including horoscope.com new york times london stock exchange spotify onion visiting websites affected malvertising users risk infection many different methods used injecting malicious advertisements programs webpages several precautions people take lessen chances getting tricked advertisements commonly used programs adobe flash player adobe reader flaws exploited become vulnerable attacks important avoid least keep date users also download anti-virus software protects threats removes malicious software systems users also push companies websites scan advertisements making active webpages users also use ad blocking software avoid downloading malware contained advertisements specific browser extension alerting malvertising campaigns
[ 496, 3857, 5848, 7232, 1376, 1847, 7803 ]
Test
5,100
3
Motorola_68040:motorola 68040 motorola 68040 sixty-eight-oh-forty 32-bit microprocessor motorola released 1990 successor 68030 followed 68060 68050 keeping general motorola naming 68040 often referred simply '040 pronounced oh-four-oh oh-forty apple macintosh computers 68040 introduced macintosh quadra named chip fastest 68040 processor clocked 40 mhz used quadra 840av expensive models short-lived macintosh centris line also used 68040 cheaper quadra centris macintosh performa used 68lc040 68040 also used personal computers amiga 4000 amiga 4000t well number workstations alpha microsystems servers hp 9000/400 series later versions next computer 68040 first 680x0 family member on-chip floating-point unit fpu thus included functionality previously required external chips namely fpu memory management unit mmu added 68030 also split instruction data caches 4 kilobytes fully pipelined six stages unfortunately 68040 ran transistor budget limit early design mmu take many transistors—indeed die cpu actually saved transistors—the fpu certainly motorola 68882 external fpu known high performance unit motorola wish risk integrators using lc version 68882 instead profitable full rc unit information motorola multiprocessing model 680x0 series see motorola 68020 fpu 68040 thus made incapable ieee transcendental functions supported 68881 68882 used popular fractal generating software time little else motorola floating point support package fpsp emulated instructions software interrupt exception handler heavy use transcendental functions caused severe performance penalties heat always problem throughout 68040 life delivered four times per-clock performance 68020 68030 chip complexity power requirements came large die large caches affected scaling processor never able run clock rate exceeding 40 mhz 50 mhz variant planned canceled overclocking enthusiasts reported success reaching 50 mhz using 100 mhz oscillator instead 80 mhz part novel technique adding oversized heat sinks fans 68040 offered features intel 80486 clock-for-clock basis could significantly outperform intel chip integer floating point instructions however 80486 ability clocked significantly faster without suffering overheating problems late 1991 higher-end macintosh desktop lineup transitioned '040 apple unable offer newer processor top-of-the-line powerbooks early 1994 powerbooks restricted 68030s several years macworld reviewers conceded best choice power users pc-compatible texas instruments 80486 notebook rather top-of-the-line powerbook 180 versions 68040 created specific market segments including 68lc040 removed fpu 68ec040 removed fpu mmu motorola intended ec variant embedded use embedded processors 68040 time need power 68040 ec variants 68020 68030 continued common designs motorola produced several speed grades 16 mhz 20 mhz parts never qualified xc designation used prototyping samples 25 mhz 33 mhz grades featured across whole line around 2000 40 mhz grade full 68040 planned 50 mhz grade canceled exceeded thermal design envelope information instructions architecture see motorola 68000 68ec040 version motorola 68040 microprocessor intended embedded controllers ec differs 68040 neither fpu mmu makes less expensive draws less power 68ec040 used cisco switch supervisor engine heart models 2900 2948g 2980g 4000 4500 5000 5500 6000 6500 7600 68lc040 low cost version motorola 68040 microprocessor fpu makes less expensive draws less power although cpu fits feature chart like motorola 68030 continues include 68040 caches pipeline thus significantly faster 68030 mask revisions 68lc040 contained bug prevents chip operating correctly software fpu emulator used according motorola errata chip mask set 2e71m later contain bug new mask introduced mid-1995 converted 68lc040 chip mc status buggy revisions typically found 68lc040-based apple macintosh computers chips mask set 2e23g used lc 475 confirmed faulty fault relates pending writes lost f-line exception triggered 68040 update microcode manner modern x86 chips means way use software requires floating-point functionality replace buggy 68lc040 later revision full 68040 atc address translation cache
[ 5097, 5012, 5100, 1075, 4389, 7327, 3688, 4479, 2009, 1454, 5732, 5477, 5652, 3708, 7905, 7990, 1103, 6111, 4702, 6200, 1386, 405, 7654, 2133, 5947, 1867, 234, 2501, 7572, 6041, 2781, 246, 2785, 4631, 608, 5079, 7403, 3063, 7499, 2257, ...
Test
5,101
2
OpenStep:openstep openstep defunct object-oriented application programming interface api specification legacy object-oriented operating system basic goal offering nextstep-like environment non-nextstep operating systems openstep principally developed next sun microsystems allow advanced application development sun operating systems specifically solaris next produced version openstep mach-based unix stylized openstep well version windows nt software libraries shipped openstep superset original openstep specification including many features original nextstep taligent considered venerable competitor operating system object markets microsoft cairo least consideration even without product releases either taligent theoretical newness often compared next older mature commercially established platform sun microsystems held exploratory meetings taligent deciding upon building object application framework openstep partnership next preemptive move taligent cairo bud tribble founding designer macintosh nextstep sunsoft vice president object products lead decision included 10 million investment sun next deal described first unadulterated piece good news next community last four years openstep api created result 1993 collaboration next sun microsystems allowing cut-down version nextstep operating system object layers run sun solaris operating system specifically solaris sparc-based hardware openstep effort strip away portions nextstep depended mach next-specific hardware present resulted smaller system consisted primarily display postscript objective-c runtime compilers majority nextstep objective-c libraries included basic operating system lower-level display system steve jobs said ahead today race far ... 1996 cairo close behind taligent far behind sun ceo scott mcnealy said insurance policy made firm one-company one-architecture decision like taligent getting trophy spouse signing hp first draft api published next mid 1994 later year released openstep compliant version nextstep openstep supported several platforms well sun sparc systems next submitted openstep specification industry object standards bodies official openstep api published september 1994 first split api foundation application kit first use ns prefix early versions nextstep use nx prefix contain application kit relying standard unix libc types low-level data structures openstep remained next primary operating system product purchased apple computer 1997 openstep combined technologies existing classic mac os produce mac os x. iphone ipad ios also descendant openstep targeted touch devices sun originally adopted openstep environment intent complementing sun corba-compliant object system solaris neo formerly known project doe providing object-oriented user interface toolkit complement object-oriented corba plumbing port involved integrating openstep appkit display postscript layer sun x11 server making appkit tolerant multi-threaded code project doe inherently heavily multi-threaded implementing solaris daemon simulate behavior mach ports extending sunpro c++ compiler support objective-c using next objc runtime writing x11 window manager implement nextstep look feel much possible integrating next development tools project builder interface builder sunpro compiler order provide complete end-user environment sun also ported nextstep-3.3 versions several end-user applications including mail.app preview.app edit.app workspace manager dock openstep corba parts products later split neo released late 1995 without openstep environment march 1996 sun announced joe product integrate neo java sun shipped beta release openstep environment solaris july 22 1996 made freely available download august 1996 non-commercial use sale september 1996 openstep/solaris shipped sparc architecture openstep differs nextstep various ways openstep api specification defines three major components foundation kit software framework application kit gui graphics front-end display postscript 2d graphics system drawing windows graphics screen standardization openstep also allowed creation several new library packages delivered openstep platform unlike operating system whole packages designed run stand-alone practically operating system idea use openstep code basis network-wide applications running across different platforms opposed using corba system primary among packages portable distributed objects pdo pdo essentially even stripped version openstep containing foundation kit technologies combined new libraries provide remote invocation little code unlike openstep defined operating system applications would run pdo libraries compiled application creating stand-alone native application particular platform pdo small enough easily portable versions released major server vendors mid-1990s next staff took writing solutions various corba magazine articles lines code whereas original article would fill several pages even though using pdo required installation considerable amount supporting code objective-c libraries pdo applications nevertheless considerably smaller similar corba solutions typically one-half one-third size similar d'ole provided types services presented resulting objects com objects goal allowing programmers create com services running high-powered platforms called microsoft windows applications instance one could develop high-powered financial modeling application using d'ole call directly within microsoft excel d'ole first released ole communicated applications running single machine pdo enabled next demonstrate excel talking microsoft applications across network microsoft able implement functionality dcom another package developed openstep enterprise objects framework eof tremendously powerful time object-relational mapping product eof became popular enterprise market notably financial sector openstep caused something minor revolution next first operating system nextstep sophisticated mach-unix based operating system originally ran next motorola 68k-based workstations ported run 32-bit intel x86-based ibm-compatible personal computers pa-risc-based workstations hewlett-packard sparc-based workstations sun microsystems next completed implementation openstep existing mach-based os called openstep mach 4.0 july 1996 4.1 december 1996 4.2 january 1997 intents nextstep 4.0 still retained flagship nextstep technologies dps unix underpinnings user interface characteristics like dock shelf retained classic nextstep user interface styles openstep mach improved comparison nextstep 3.3 vastly improved driver support – however environment actually write drivers changed introduction object-oriented driverkit openstep mach supported intel x86-based pc sun sparc workstations next 68k-based architectures hp pa-risc version dropped versions continued run underlying mach-based os used nextstep openstep mach became next primary os 1995 used mainly intel platform addition complete openstep implementation system delivered complete set nextstep libraries backward compatibility easy thing openstep due library versioning openstep suffer bloat addition openstep mach port sparc sun next developed openstep compliant set frameworks run sun solaris operating system developing solaris openstep sun lost interest openstep shifted attention toward java virtual machine development environment java served direct competitor openstep next also delivered implementation running top windows nt 4.0 called openstep enterprise often abbreviated ose unintentional demonstration true nature portability programs created openstep specification programs openstep mach could ported ose little difficulty allowed existing customer base continue using tools applications running windows many process switching never clean match ui perspective probably due openstep routing window graphics display postscript server—which also ported windows—ose nevertheless managed work fairly well extended openstep commercial lifespan openstep ose two revisions one major one never released next purchased apple 1997 acquiring next apple intended ship rhapsody reworked version openstep mach mac standard pcs rhapsody openstep mach copland appearance mac os 8 support java apple technologies including colorsync quicktime could regarded openstep 5 two developer versions rhapsody released known developer preview 1 2 ran limited subset intel powerpc hardware mac os x server 1.0 first commercial release operating system delivered exclusively powerpc mac hardware replacing display postscript windowserver quartz responding developers including better backward compatibility classic mac os applications addition carbon apple released mac os x mac os x server starting version 10.0 mac os x named macos macos primary programming environment essentially openstep certain additions xml property lists url classes internet connections macos ports development libraries tools called cocoa macos since become single popular desktop unix-like operating system world although macos longer openstep compliant operating system gnustep free software implementation next libraries began time nextstep predating openstep openstep ose purchased apple effectively ended commercial development implementing openstep platforms gnustep ongoing open source project aiming create portable free software implementation cocoa/openstep libraries gnustep also features fully functional development environment reimplementations newer innovations macos cocoa framework well extensions api
[ 6788, 6113, 405, 6119, 4355, 6479, 5786, 5787, 1897, 5450, 1154, 1522, 4759, 7982, 7259, 2294, 3705, 2300, 7990, 2327, 3043, 4453, 1599, 6583, 6236, 1989, 8043, 6594, 6965, 3764, 6256, 4136, 4869, 1279, 5571, 5579, 1654, 7011, 246, 971, ...
Validation
5,102
9
PLEXIL:plexil plexil plan execution interchange language open source technology automation created currently development nasa plexil programming language representing plans automation 2006 vandi verma one several co-writers plexil used automation technologies nasa k10 rover mars curiosity rover percussion drill deep space habitat habitat demonstration unit edison demonstration smallsat networks ladee autonomy operating system aos procedure automation international space station plexil executive execution engine implements plexil interfaced using provided software framework external systems controlled and/or queried plexil used demonstrate automation technologies targeted future nasa space missions binaries documentation widely available open source sourceforge.net fundamental programming unit plexil node node data structure formed two primary components set conditions drive execution node another set specifies node accomplishes execution hierarchical composition nodes called plan plan tree divided nodes close root high level nodes leaf nodes represent primitive actions variable assignments sending commands external system node types september 2008 nasa implemented seven types nodes node states node one state nodes transitions
[ 6507, 8137, 3372, 5571, 3966, 578 ]
Test
5,103
5
Video_Acceleration_API:video acceleration api video acceleration api va api royalty-free api well implementation free open-source library libva distributed mit license va api implemented device drivers offer end-user software vlc media player gstreamer access available video acceleration hardware purevideo libva-vdpau driver implements va api terms vdpau unified video decoder api enables provides access hardware-accelerated video processing using hardware graphics processing units gpu accelerate video encoding decoding offloading processing central processing unit cpu va api video decode/encode interface platform window system independent primarily targeted direct rendering infrastructure dri x window system unix-like operating systems including linux freebsd solaris android however potentially also used direct framebuffer graphics sub-systems video output accelerated processing includes support video decoding video encoding subpicture blending rendering va api specification originally designed intel gma graphics media accelerator series gpu hardware specific purpose eventually replacing xvmc standard default unix multi-platform equivalent microsoft windows directx video acceleration dxva api today api longer limited intel-specific hardware gpus hardware manufacturers freely use open standard api hardware accelerated video processing hardware without paying royalty fee main motivation va api enable hardware-accelerated video decode various entry-points vld idct motion compensation deblocking prevailing coding standards today mpeg-2 mpeg-4 asp/h.263 mpeg-4 avc/h.264 h.265/hevc vc-1/wmv3 extending xvmc considered due original design mpeg-2 motioncomp made sense design interface scratch fully expose video decode capabilities today gpus january 17 2012 va api natively supported va api currently supports video codecs official mainline version note exactly video codecs supported depends hardware driver capabilities video decoding post-processing processes offloaded accelerated device drivers gpu hardware supports current interface window system independent potentially used graphics sub-systems dri direct rendering infrastructure x window system direct framebuffer work third-party drm direct rendering manager libraries nutshell scheme pass various types data buffers application gpu decoding encoding compressed bit-stream
[ 6414, 2091, 7442, 4685, 305, 6011, 5571, 578, 7912, 6367, 2498, 2143, 8022, 1232, 4096, 1138, 6055, 6058, 6674, 1237, 1989, 1435 ]
Test
5,104
3
SGI_Visual_Workstation:sgi visual workstation sgi visual workstation series workstation computers designed manufactured sgi unlike product lines used 64-bit mips risc architecture line used intel pentium ii iii processors shipped windows nt 4.0 windows 2000 operating system lieu irix however visual workstation 320 540 models deviated architecture ibm-compatible pcs using sgi arcs firmware instead traditional bios internal components adapted mips-based products proprietary components made incompatible internal hardware designed standard pcs hence unable run versions microsoft windows especially windows 9x contrast remaining models line standard pcs using via technologies chipsets nvidia video cards standard components two series visual workstations based intel processors first series 320 540 used sgi arcloader prom cobalt video chipset remainder essentially standard pc 320 540 use unified memory architecture uma memory system shares video system memory runs speed allows 80 percent system ram applied video memory allocation static however adjusted via profile 320 540 also use onboard cobalt video adapter sgi proprietary graphics chipset firmware used systems prom enables booting graphical subsystem os loaded regard resemble irix/mips line sgi computers sgi o2 320 540 also stand firewire ieee 1394 ports onboard composite/s-video capture usb keyboards mice differ 320 dual pentium ii/iii-capable 1gb maximum system ram 540 quad pentium iii xeon-capable 2gb maximum system ram computers use proprietary dimm module essentially ecc sdram pc-100 package one-half normal size maximum memory per module 96mb sgi 320 twelve memory slots firewire ports built 320 never functioned sgi distributed orange micro firewire cards year production commenced lieu fixing firewire ports 320 540 limited pci slots albeit two 66 mhz one 33 mhz slot operated 3.3v step 5v slots used manufacturers limits number accessories added visual workstations built compete new intel processor based workstations considerably cheaper sgi line mips workstations little standard pcs use many parts also available aftermarket 320 540 visual workstations shipped originally microsoft windows nt 4.0 due arcloader prom custom hardware abstraction layer hal windows necessary windows 2000 last release included required sgi-specific hal sgi ceased supporting visual workstation series installation later windows versions xp unsupported 230 330 550 also supported windows nt 2000 addition sgi offered systems pre-loaded release 6.2 red hat linux distribution systems letter l appended model numbers various sgi enhancements particular 320 540 visual workstations often out-perform intel pcs similar configuration graphically-intensive memory bound applications however due hefty upgrade costs non-standard components cost effective purchase entire new higher-spec non-sgi pc rather purchase upgrades visual workstation visual workstations support conventional crt monitors vga display connectors 230 330 550 models use nvidia quadro cards also support dvi sgi 320 540 models shipped groundbreaking stylistically matched 1600sw lcd display using openldi display connector requires accessory flat panel adapter sgi o2 also supports 1600sw adapter model numbers visual workstations visual workstations initially equipped either single pentium ii pentium iii processor dual smp pentium iii processors 540 550 models support xeon implementation pentium series could support four xeons smp configuration two 550 although sgi visual workstation ever released cpu running higher 700 mhz hobbyists able run faster processors sgi 320 limit dual 1 ghz pentium iii processors single 1.4 ghz celeron dual 1 ghz processors require specific model cpu intended intel servers voltage regulator prom revision motherboard also correct setup work single processors powerleap pl-ip3t slocket adapter tualatin 1.4 ghz celeron processor limit straight bolt-in installation tualatin core gives modern processor powerleap adapter handles voltage regulation cpu sgi 540 reported handle 900 mhz quad xeon processors fastest pentium 3 xeons 100 mhz front side bus speed 540 230 330 550 models essentially standard pcs capabilities upgrade limits pcs time 230 330 based via chipsets used socket 370 processors conventional sdram 550 used slot 2 xeon processors intel 840 chipset rdram three models generic pc bios generic pc memory non-differentiated parts video cards systems used nvidia agp cards based quadro 2 chipset differ aftermarket quadros drivers
[ 4121, 4759, 3849, 1727, 3692, 4859, 4687, 2744, 4959, 7990, 5055, 7010, 2765, 4802, 6922, 3567, 156, 4362, 1052, 75, 4277, 970, 1992, 787 ]
Test
5,105
2
Object_access_method:object access method object access method oam access method z/os designed storage large numbers large files images number distinguishing features e.g compared vsam oam used conjunction db2 example use case oam would storing medical images db2 database running z/os oam created 1980s prototype product insurance company replace microfiche initially oam supported optical storage magnetic disks 1990s support magnetic tape added 2011 support added storage objects z/os unix file system—either zfs nfs 1990s object access method used canadian intellectual property office store documents related patent processing
[ 607, 5081, 1254, 1851, 3233, 5852, 7040, 7661, 2596, 7783 ]
Validation
5,106
3
Raft_(computer_science):raft computer science raft consensus algorithm designed alternative paxos meant understandable paxos means separation logic also formally proven safe offers additional features raft offers generic way distribute state machine across cluster computing systems ensuring node cluster agrees upon series state transitions number open-source reference implementations full-specification implementations go c++ java scala named reliable replicated redundant fault-tolerant raft byzantine fault tolerant algorithm nodes trust elected leader raft achieves consensus via elected leader server raft cluster either leader follower candidate precise case election leader unavailable leader responsible log replication followers regularly informs followers existence sending heartbeat message follower timeout typically 150 300 ms expects heartbeat leader timeout reset receiving heartbeat heartbeat received follower changes status candidate starts leader election raft implements consensus leader approach cluster one one elected leader fully responsible managing log replication servers cluster means leader decide new entries placement establishment data flow servers without consulting servers leader leads fails disconnects case new leader elected consensus problem decomposed raft two relatively independent subproblems listed existing leader fails start algorithm new leader needs elected case new term starts cluster term arbitrary period time server new leader needs elected term starts leader election election completed successfully i.e single leader elected term keeps going normal operations orchestrated new leader election failure new term starts new election leader election started candidate server server becomes candidate receives communication leader period called election timeout assumes acting leader anymore starts election increasing term counter voting new leader sending message servers requesting vote server vote per term first-come-first-served basis candidate receives message another server term number least large candidate current term candidate election defeated candidate changes follower recognizes leader legitimate candidate receives majority votes becomes new leader neither happens e.g. split vote new term starts new election begins raft uses randomized election timeout ensure split votes problem resolved quickly reduce chance split vote servers wo n't become candidates time single server timeout win election become leader sends heartbeat messages servers followers become candidates leader responsible log replication accepts client requests client request consists command executed replicated state machines cluster appended leader log new entry requests forwarded followers appendentries messages case unavailability followers leader retries appendentries messages indefinitely log entry eventually stored followers leader receives confirmation majority followers entry replicated leader applies entry local state machine request considered committed event also commits previous entries leader log follower learns log entry committed applies entry local state machine ensures consistency logs servers cluster ensuring safety rule log matching respected case leader crash logs left inconsistent logs old leader fully replicated cluster new leader handle inconsistency forcing followers duplicate log followers leader compare log log follower find last entry agree delete entries coming critical entry follower log replace log entries mechanism restore log consistency cluster subject failures raft guarantees safety properties first four rules guaranteed details algorithm described previous section state machine safety guaranteed restriction election process rule ensured simple restriction candidate ca n't win election unless log contains committed entries order elected candidate contact majority cluster given rules logs committed means every committed entry going present least one servers candidates contact raft determines two logs carried two distinct servers up-to-date comparing index term last entries logs logs last entry different terms log later term up-to-date logs end term whichever log longer up-to-date raft request candidate voter includes information candidate log log up-to-date candidate log voter denies vote candidate implementation ensures state machine safety rule follower crashes appendentries vote requests sent servers fail failures handled servers trying indefinitely reach downed follower follower restarts pending requests complete request already taken account failure restarted follower ignore timing critical raft elect maintain steady leader time order perfect availability cluster stability ensured respecting timing requirement algorithm broadcasttime « electiontimeout « mtbf typical number values 0.5ms 20ms broadcasttime implies set electiontimeout somewhere 10ms 500ms take several weeks months single server failures means values right stable cluster work https //groups.google.com/forum/ topic/raft-dev/95rzqptgpmu
[ 2315, 5239, 3371, 2619, 5602, 86, 993, 8124 ]
Test
5,107
3
Bit_Test:bit test codice_1 x86 assembly language instruction stands bit test added x86 instruction set 80386 processor codice_1 copies bit given register carry flag example copy third least significant bit eax carry flag codice_3 bit test set operates also sets bit register codice_4 bit test reset resets codice_5 bit test complement flips
[ 1335, 4611 ]
Validation
5,108
2
Mark_Zbikowski:mark zbikowski mark zibo joseph zbikowski born march 21 1956 former microsoft architect early computer hacker started working company years inception leading efforts ms-dos os/2 cairo windows nt 2006 honored 25 years service company third employee reach milestone bill gates steve ballmer designer ms-dos executable file format headers file format start initials ascii characters 'mz 0x4d 0x5a zbikowski born detroit michigan 1956 attending roeper school known roeper city country school 1961 1974 developed interest mathematics computers 8th-grade performance michigan mathematics prize competition led invitation nsf-funded summer program oakland university became friends microsoft steve ballmer jeff sachs zbikowski pursued computer science harvard a.b 1978 yale s.m 1979 active universities gilbert sullivan performing groups ballmer recruited zbikowski joined microsoft 1981 march 1982 replaced tim paterson development lead manager microsoft ms-dos 2.0 position held dos 4.0 first major contributions addition hierarchical directory structure dos 2.0 installable device drivers march 1985 1991 architecture team os/2 development manager file systems device drivers technical advisor paul maritz breakthrough concept installable file system os/2 attributed following demise microsoft/ibm joint development agreement architect development manager key contributor cairo working jim allchin later anthony short led cairo object file system content index efforts 1996 cairo migrated standalone product technology source zbikowski worked lou perazzoli windows nt kernel focusing performance size becoming architect development manager nt file systems 1998 2001 zbikowski candidate director harvard alumni association zbikowski retired microsoft june 2006 due interest education became affiliated 2007 university washington lecturer computer science engineering department college engineering mark zbikowski affiliated following companies __notoc__
[ 3907, 2290, 4291, 1442, 4843, 5784, 6380, 6256, 5661, 6907, 6262, 1992, 2084, 1248 ]
Test
5,109
7
Xgrid:xgrid xgrid proprietary program distributed computing protocol developed advanced computation group subdivision apple inc allows networked computers contribute single task provides network administrators method creating computing cluster allows exploit previously unused computational power calculations divided easily smaller operations mandelbrot maps setup xgrid cluster achieved next cost xgrid client pre-installed computers running mac os x 10.4 mac os x 10.7 xgrid client included mac os x 10.8 xgrid controller job scheduler xgrid operation also included within mac os x server free download apple apple kept command-line job control mechanism minimalist providing api develop sophisticated tools built around program employs communication protocol layered top schema communicate nodes communication protocol interfaces beep infrastructure network application protocol framework computers discovered xgrid system computers mac os x xgrid service enabled automatically added list available computers use processing tasks initiating computer sends complete instructions job processing controller controller splits task small instruction packets known tasks design xgrid system consists small packets transferred xgrid-enabled computers network computers nodes execute instructions provided controller return results controller assembles individual task results whole job results returns initiating computer apple modeled design xgrid zilla program distributed next openstep operating system application programming interface api apple owned rights company also opted provide client version mac os x command-line functions little flexibility giving mac os x server version xgrid gui control panel full set features xgrid original concept traced back zilla.app found openstep operating system created next late 1980s zilla first distributed computing program released end-user operating system used idle screen-saver motif design feature since found widely used projects seti home distributed.net zilla national computerworld smithsonian award science category 1991 ease use good design apple acquired zilla along rest next 1997 later used zilla inspiration xgrid first beta version xgrid released january 2004 several organizations adopted xgrid large international computing networks one example xgrid cluster macresearch openmacgrid scientists request access large amounts processing power run tasks related research another defunct xgrid stanford project used range computers stanford university campus around world perform biochemical research pre-release promotional piece macworld cited xgrid among unix features 10 things know tiger calling handy work huge amounts experimental data render complex animations xgrid introduction 2004 infoworld noted 'preview grade technology would directly benefit xserve g5 launch later year infoworld commentator ephraim schwartz also predicted xgrid opening move apple entry enterprise computing market apple discontinued xgrid os x v10.8 mountain lion along dependent services podcast producer xgrid protocol uses beep network framework communicate nodes network system infrastructure includes three types computers communicate protocol one client communicates calculation next controller starts segregates calculation finally agents process allocated part calculation computer act one three components time xgrid protocol provides basic infrastructure computers communicate involved processing specified calculation xgrid targeted towards time consuming computations easily segregated smaller tasks sometimes called embarrassingly parallel tasks includes monte carlo calculations 3d rendering mandelbrot maps within xgrid protocol three types messages passed computers cluster requests notifications replies requests must responded recipient reply notifications require reply replies responses sent messages identified name type request/notification/reply contents message encapsulated beep message beep msg acknowledged receipt empty reply rpy xgrid leverage beeps message/reply infrastructure received message requires response merely generates independent beep message containing reply xgrid messages encoded dictionaries key/value pairs converted xml sent across beep network architecture xgrid system designed around job based system controller sends agents jobs agents return responses actual computation controller executes xgrid system known job job contains files required complete task successfully input parameters data files directories executables and/or shell scripts files included xgrid job must able executed either simultaneously asynchronously benefits running job xgrid lost job completes controller set notify client task completion failure example email client leave network tasks running also monitor job status demand querying controller although track ongoing progress individual tasks controller central correct function xgrid node responsible distribution supervision coordination tasks agents program running controller assign reassign tasks handle individual agent failures demand number tasks assigned agent depend two factors number agents xgrid number processors node number agents xgrid determines controller assign tasks tasks may assigned simultaneously large number agents queued small number agents node one processor detected xgrid controller may assign one task per processor occurs number agents network lower number tasks controller complete xgrid layered upon blocks extensible exchange protocol beep ietf standard comparable http focus two-way multiplexed communication found peer-to-peer networks beep turn uses xml define profiles communicating multiple agents single network internet connection possible access xgrid command line xgrid graphical user interface program bundled mac os x server march 2009 available online much efficient way administering xgrid system originally xgrid agent included mac os x version 10.4 installations gui reserved users mac os x server decision limited efforts computer community embrace platform eventually apple released mac os x server administration tools public included xgrid administration application bundled mac os x server despite lack graphical controller interface standard non-server mac os x distribution possible set xgrid controller via command line tools codice_1 codice_2 xgrid controller daemon running administration grid apple xgrid admin tool possible applications visualhub provided xgrid controller capability user interfaces
[ 3940, 713, 4690, 734, 6832, 3989, 2597, 3322, 1502, 5786, 4740, 1897, 5450, 6505, 2627, 7609, 7246, 1171, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 2325, 5859, 6565, 2329, 3050, 163, 6582, 5535, 5191, 8051, 7335, 4484, ...
Test
5,110
2
PSOS_(real-time_operating_system):psos real-time operating system psos portable software silicon real time operating system rtos created 1982 alfred chao developed/marketed first part life company software components group scg 1980s psos rapidly became rtos choice embedded systems based motorola 68000 family architecture written 68000 assembler highly optimised start also modularised early support os-aware debugging plug-in device drivers tcp/ip stacks language libraries disk subsystems later came source-level debugging multi-processor support networking extensions 1991 software components group acquired integrated systems inc. isi developed psos restyled psos+ microprocessor families rewriting greater part c. attention also paid supporting successively integrated development environments culminating prism+ july 1994 integrated systems acquired digital research modular real-time multi-tasking operating system flexos novell 1995 integrated systems offered psosystem/nest package novell embedded systems technology nest february 2000 integrated systems inc. acquired wind river systems originators rival rtos vxworks despite initial reports psos support would continue development halted wind river announced plans 'convergence version vxworks support psos system calls releases psos made nxp semiconductors acquired psos trimedia wind river continued support os trimedia vliw core march 2000 rival company express logic released evaluation kit psos+ users designed provide migration path threadx rtos august 2000 mapusoft technologies inc. came psos os changer porting kit smoothly move software multiple os linux vxworks includes ide api optimization along profiling tool measure api timing target boards www.mapusoft.com august 2007 rowebots former partner scg isi open sourced psos+ compatible version called reliant available wish upgrade without applications changes xenomai project supports psos+ apis others traditional rtos apis linux-based real-time framework allow existing industrial applications migrate easily gnu/linux-based environment keeping stringent real-time guarantees another open sourced alternative rtems support various apis including classic api compatible psos posix api compared gnu/linux rtems closer match psos applications due lower memory footprint strict realtime behaviour popular ssl/tls libraries wolfssl still support psos
[ 1522, 7605, 5110, 6994, 7950, 4336, 224, 6918, 4890, 238, 7396, 4631, 3664, 861, 771, 5079, 3062, 7312, 3751, 4375 ]
Validation
5,111
8
SOAP-over-UDP:soap-over-udp soap-over-udp oasis standard covering publication soap messages udp transport protocol providing one-way request-response message patterns
[ 1760, 5500, 302, 7565, 3498, 7315, 4770, 1409 ]
Validation
5,112
8
Linked_data_page:linked data page linked data page web page explicitly describes one things objects via hyperdata links unlike traditional web page hypertext links hyperdata links expose properties attributes relationships property values associated things page linked data pages created hand generated dynamically via linked data server user agent single reference uri iri thing needed experience power serendipitous data discovery offered linked data page typical web page endowed links explicitly describe anything links simply expose unqualified associations documents web put differently linked data pages reveal explicit properties things basic web pages loosely anything requiring human interpretation reasoning order attain clarity
[ 84 ]
Validation
5,113
4
PRODIGAL_(computer_system):prodigal computer system prodigal proactive discovery insider threats using graph analysis learning computer system predicting anomalous behavior among humans data mining network traffic emails text messages server log entries part darpa anomaly detection multiple scales adams project initial schedule two years budget 9 million uses graph theory machine learning statistical anomaly detection high-performance computing scan larger sets data quickly past systems amount data analyzed range terabytes per day targets analysis employees within government defense contracting organizations specific examples behavior system intended detect include actions nidal malik hasan wikileaks source chelsea manning commercial applications may include finance results analysis five serious threats per day go agents analysts operators working counterintelligence
[ 429, 5220 ]
Train
5,114
2
Zero_page:zero page zero page series memory addresses beginning computer address space page whose starting address zero size page depends context significance zero-page memory versus higher addressed memory highly dependent machine architecture example motorola 6800 mos technology 6502 processor families treat first 256 bytes memory specially whereas many processors actual size zero page bytes determined microprocessor design older designs often equal largest value referenced processor indexing registers example aforementioned 8-bit processors 8-bit index registers page size 256 bytes therefore zero page extends address 0 address 255 early computers including pdp-8 zero page special fast addressing mode facilitated use temporary storage data compensated relative shortage cpu registers pdp-8 one register zero page addressing essential unlike modern hardware 1970s computer ram fast faster cpu thus made sense registers use main memory extended pool extra registers since memory location within zero page 16-bit address bus computer may addressed single byte faster 8-bit data bus machines access location rather non-zero page location example mos technology 6502 one general purpose register accumulator result used zero page extensively many instructions coded differently zero page non-zero page addresses two instructions accomplish thing load value memory location 00 .a register accumulator however first instruction two bytes long requires three clock cycles complete second instruction three bytes length requires four clock cycles execute obviously difference execution time could significantly improve performance repetitive code zero page addressing mostly historical significance since developments integrated circuit technology made adding registers cpu less expensive cpu operations much faster ram accesses computer architectures still reserve beginning address space purposes though instance intel x86 systems reserve first 512 words address space interrupt table run real mode similar technique using zero page hardware related vectors employed arm architecture leading badly written programs infamous ofla behaviour program tries read information unintended memory area winds mistaking executable code text vice versa especially problem zero page area used store system jump vectors firmware tricked storing data fact quite contrary zero page original preferential use modern operating systems freebsd linux microsoft windows actually make zero page inaccessible trap uses null pointers useful null pointers method used represent value reference points nothing since code operating reference written assuming reference actually refers valid structure value catching case reference points nothing use since sure sign bug 8-bit cp/m zero page used communication running program operating system see zero page cp/m information
[ 7960, 1254, 4843, 4759, 3782, 5296, 578, 3905, 2155, 1237, 352 ]
Validation
5,115
4
HTTP_header_injection:http header injection http header injection general class web application security vulnerability occurs hypertext transfer protocol http headers dynamically generated based user input header injection http responses allow http response splitting session fixation via set-cookie header cross-site scripting xss malicious redirect attacks via location header http header injection relatively new area web-based attacks primarily pioneered amit klein work request/response smuggling/splitting
[ 7300, 3932, 4144, 84, 3999, 3383, 2901 ]
Test
5,116
2
Shell_(computing):shell computing computing shell user interface access operating system services general operating system shells use either command-line interface cli graphical user interface gui depending computer role particular operation named shell outermost layer around operating system kernel cli shells require user familiar commands calling syntax understand concepts shell-specific scripting language example bash also easily operated via refreshable braille display provide certain advantages screen readers graphical shells place low burden beginning computer users characterized easy use since also come certain disadvantages gui-enabled operating systems also provide cli shells operating systems provide various services users including file management process management running terminating applications batch processing operating system monitoring configuration operating system shells direct interfaces underlying kernel even shell communicates user via peripheral devices attached computer directly shells actually special applications use kernel api way used application programs shell manages user–system interaction prompting users input interpreting input handling output underlying operating system much like read–eval–print loop repl since operating system shell actually application may easily replaced another similar application operating systems addition shells running local systems different ways make remote systems available local users approaches usually referred remote access remote administration initially available multi-user mainframes provided text-based uis active user simultaneously means text terminal connected mainframe via serial line modem remote access extended unix-like systems microsoft windows unix-like systems secure shell protocol usually used text-based shells ssh tunneling used x window system–based graphical user interfaces guis microsoft windows remote desktop protocol used provide gui remote access since windows vista powershell remote used text-based remote access via wmi rpc ws-management operating system shells fall one two categories command-line graphical command line shells provide command-line interface cli operating system graphical shells provide graphical user interface gui possibilities although common include voice user interface various implementations text-based user interface tui cli relative merits cli- gui-based shells often debated command-line interface cli operating system shell uses alphanumeric characters typed keyboard provide instructions data operating system interactively example teletypewriter send codes representing keystrokes command interpreter program running computer command interpreter parses sequence keystrokes responds error message recognize sequence characters may carry program action loading application program listing files logging user many others operating systems unix large variety shell programs different commands syntax capabilities operating systems single style command interface commodity operating systems ms-dos came standard command interface third-party interfaces also often available providing additional features functions menuing remote program execution application programs may also implement command-line interface example unix-like systems telnet program number commands controlling link remote computer system since commands program made keystrokes data sent remote computer means distinguishing two required escape sequence defined using either special local keystroke never passed always interpreted local system program becomes modal switching interpreting commands keyboard passing keystrokes data processed feature many command-line shells ability save sequences commands re-use data file contain sequences commands cli made follow typed user special features cli may apply carrying stored instructions batch files script files used repeatedly automate routine operations initializing set programs system restarted batch mode use shells usually involves structures conditionals variables elements programming languages bare essentials needed purpose others sophisticated programming languages conversely programming languages used interactively operating system shell purpose-built program command-line shell may offer features command-line completion interpreter expands commands based characters input user command-line interpreter may offer history function user recall earlier commands issued system repeat possibly editing since commands operating system typed user short command names compact systems representing program options common short names sometimes hard user recall early systems lacked storage resources provide detailed on-line user instruction guide graphical shells desktop shells provide means manipulating programs based graphical user interface gui allowing operations opening closing moving resizing windows well switching focus windows graphical shells may included desktop environments come separately even set loosely coupled utilities graphical user interfaces develop metaphor electronic desktop data files represented paper documents desk application programs similarly graphical representations instead invoked command names graphical shells typically build top windowing system case x window system wayland shell consists x window manager wayland compositor respectively well one multiple programs providing functionality start installed applications manage open windows virtual desktops often support widget engine case macos quartz could thought windowing system shell consists finder dock systemuiserver mission control modern versions microsoft windows operating system use windows shell shell windows shell provides familiar desktop environment start menu task bar well graphical user interface accessing file management functions operating system older versions also include program manager shell 3.x series microsoft windows fact shipped later versions windows 95 nt types least windows xp interfaces windows versions 1 2 markedly different desktop applications also considered shells long use third-party engine likewise many individuals developers dissatisfied interface windows explorer developed software either alters functioning appearance shell replaces entirely windowblinds stardock good example former sort application litestep emerge desktop good examples latter interoperability programmes purpose-designed software lets windows users use equivalents many various unix-based guis discussed well macintosh equivalent os/2 presentation manager version 3.0 run os/2 programmes conditions using os/2 environmental subsystem versions windows nt shell also used loosely describe application software built around particular component web browsers email clients analogy shells found nature also sometimes referred wrappers expert systems shell piece software empty expert system without knowledge base particular application
[ 1807, 6414, 7514, 4297, 5021, 13, 6088, 3271, 3276, 5381, 4691, 3289, 5041, 7546, 397, 2933, 7550, 4705, 405, 1855, 3979, 4341, 4347, 761, 424, 65, 768, 4733, 6853, 5784, 5787, 1897, 5088, 6500, 785, 2266, 788, 447, 790, 3682, 449, 15...
Test
5,117
9
MATLAB:matlab matlab matrix laboratory multi-paradigm numerical computing environment proprietary programming language developed mathworks matlab allows matrix manipulations plotting functions data implementation algorithms creation user interfaces interfacing programs written languages including c c++ c java fortran python although matlab intended primarily numerical computing optional toolbox uses mupad symbolic engine allowing access symbolic computing abilities additional package simulink adds graphical multi-domain simulation model-based design dynamic embedded systems 2018 matlab 3 million users worldwide matlab users come various backgrounds engineering science economics cleve moler chairman computer science department university new mexico started developing matlab late 1970s designed give students access linpack eispack without learn fortran soon spread universities found strong audience within applied mathematics community jack little engineer exposed visit moler made stanford university 1983 recognizing commercial potential joined moler steve bangert rewrote matlab c founded mathworks 1984 continue development rewritten libraries known jackpac 2000 matlab rewritten use newer set libraries matrix manipulation lapack matlab first adopted researchers practitioners control engineering little specialty quickly spread many domains also used education particular teaching linear algebra numerical analysis popular amongst scientists involved image processing matlab application built around matlab scripting language common usage matlab application involves using command window interactive mathematical shell executing text files containing matlab code variables defined using assignment operator codice_1 matlab weakly typed programming language types implicitly converted inferred typed language variables assigned without declaring type except treated symbolic objects type change values come constants computation involving values variables output function example simple array defined using colon syntax initial codice_2 increment codice_2 terminator instance defines variable named codice_4 assigns new value existing variable name codice_4 array consisting values 1 3 5 7 9 array starts 1 initial value increments step previous value 2 increment value stops reaches avoid exceeding 9 terminator value increment value actually left syntax along one colons use default value 1. assigns variable named codice_6 array values 1 2 3 4 5 since default value 1 used incrementer indexing one-based usual convention matrices mathematics although programming languages c c++ java matrices defined separating elements row blank space comma using semicolon terminate row list elements surrounded square brackets parentheses used access elements subarrays also used denote function argument list sets indices specified expressions 2:4 evaluates 2 3 4 example submatrix taken rows 2 4 columns 3 4 written square identity matrix size n generated using function eye matrices size zeros ones generated functions zeros ones respectively transposing vector matrix done either function transpose adding prime dot matrix without dot matlab perform conjugate transpose matlab functions accept matrices apply element example codice_7 multiply every element j 2 reduce element modulo n matlab include standard loops similar applications r using vectorized notation often produces code faster execute code excerpted function magic.m creates magic square odd values n matlab function codice_8 used generate square matrices j containing 1 n matlab structure data types since variables matlab arrays adequate name structure array element array field names addition matlab supports dynamic field names field look-ups name field manipulations etc. unfortunately matlab jit support matlab structures therefore simple bundling various variables structure come cost creating matlab function name file match name first function file valid function names begin alphabetic character contain letters numbers underscores functions often case sensitive matlab supports elements lambda calculus introducing function handles function references implemented either .m files anonymous/nested functions matlab supports object-oriented programming including classes inheritance virtual dispatch packages pass-by-value semantics pass-by-reference semantics however syntax calling conventions significantly different languages matlab value classes reference classes depending whether class handle super-class reference classes value classes method call behavior different value reference classes example call method alter member object object instance reference class example simple class provided put file named hello.m executed following commands matlab supports developing applications graphical user interface gui features matlab includes guide gui development environment graphically designing guis also tightly integrated graph-plotting features example function plot used produce graph two vectors x code produces following figure sine function matlab program produce three-dimensional graphics using functions surf plot3 mesh matlab graphical user interfaces programmed gui design environment guide tool matlab call functions subroutines written programming languages c fortran wrapper function created allowing matlab data types passed returned mex files matlab executables dynamically loadable object files created compiling functions since 2014 increasing two-way interfacing python added libraries written perl java activex .net directly called matlab many matlab libraries example xml sql support implemented wrappers around java activex libraries calling matlab java complicated done matlab toolbox sold separately mathworks using undocumented mechanism called jmi java-to-matlab interface confused unrelated java metadata interface also called jmi official matlab api java added 2016 alternatives mupad based symbolic math toolbox available mathworks matlab connected maple mathematica libraries also exist import export mathml matlab proprietary product mathworks users subject vendor lock-in although matlab builder products deploy matlab functions library files used .net java application building environment future development still tied matlab language toolbox purchased separately evaluation license requested mathworks sales department requires detailed information project matlab evaluated granted often evaluation license valid two four weeks student version matlab available home-use license matlab simulink subset mathwork toolboxes substantially reduced prices reported european union eu competition regulators investigating whether mathworks refused sell licenses competitor regulators dropped investigation complainant withdrew accusation evidence wrongdoing found matlab number competitors commercial competitors include mathematica tk solver maple idl also free open source alternatives matlab particular gnu octave scilab freemat sagemath intended mostly compatible matlab language julia programming language also initially used matlab-like syntax among languages treat arrays basic entities array programming languages apl fortran 90 higher s-lang well statistical languages r s. also libraries add similar functionality existing languages it++ c++ perl data language perl ilnumerics .net numpy/scipy/matplotlib python scilua/torch lua sciruby ruby numeric.js javascript gnu octave unique alternatives treats incompatibility matlab bug see matlab compatibility gnu octave theory octave thus superset matlab language practice octave implement matlab functionality number release number version reported concurrent license manager program flexlm complete list changes matlab official toolboxes consult matlab release notes several easter eggs exist matlab include hidden pictures jokes example typing spy used generate picture spies spy vs spy displays image dog typing randomly outputs philosophical answer commands include penny toilet image life every easter egg appears every version matlab
[ 2176, 5363, 3606, 7160, 3619, 6428, 3968, 5397, 1102, 4705, 1804, 7557, 3981, 7924, 1879, 7579, 68, 775, 776, 2619, 5091, 4020, 790, 6507, 1524, 5098, 1158, 4759, 5464, 7246, 4039, 109, 7254, 6527, 6181, 3368, 831, 486, 5138, 1569, 4067...
Test
5,118
7
Caspio:caspio caspio privately held global software company headquartered santa clara california offices ukraine poland philippines founded frank zamani 2000 caspio provides non-technical business professionals ability create database-centric web applications without coding caspio founder ceo frank zamani worked microsoft developer late 1990s vision enable organizations build custom cloud applications ease fraction time cost versus traditional software development “ wanted build tool business users create applications without coding ” zamani said “ time lot people said ’ done ’ going stop me. ” today caspio powers 1 million applications 100 countries research projects global low-code development platform market size grow us 4.32 billion 2017 us 27.23 billion 2022 compound annual growth rate cagr 44.49 forecast period
[]
Validation
5,119
4
MTR_(software):mtr software traceroute originally named matt traceroute mtr computer program combines functions traceroute ping programs one network diagnostic tool mtr probes routers route path limiting number hops individual packets may traverse listening responses expiry regularly repeat process usually per second keep track response times hops along path original matt traceroute program written matt kimball 1997 roger wolff took maintaining mtr renamed traceroute october 1998 mtr licensed terms gnu general public license gpl works modern unix-like operating systems normally works text console also optional gtk+-based graphical user interface gui mtr relies internet control message protocol icmp time exceeded type 11 code 0 packets coming back routers icmp echo reply packets packets hit destination host mtr also user datagram protocol udp mode invoked -u command line pressing u key curses interface sends udp packets time live ttl field ip header increasing one probe sent toward destination host udp mode used mtr relies icmp port unreachable packets type 3 code 3 destination reached mtr also supports ipv6 works similar manner instead relies icmpv6 messages tool often used network troubleshooting showing list routers traversed average round-trip time well packet loss router allows users identify links two given routers responsible certain fractions overall latency packet loss network help identify network overuse problems example shows mtr running linux tracing route host machine example.lan web server yahoo p25.www.re2.yahoo.com across level 3 communications network additional example shows recent version mtr running freebsd mpls labels displayed default -e switch used command line e key pressed curses interface winmtr windows gui application functionally equivalent mtr originally developed appnor msp s.r.l maintained white-tiger although similar winmtr shares common code mtr console version mtr exist windows fewer features mtr platforms
[ 1140, 5571, 6256, 7868, 6062, 7848, 578, 3775, 1435, 6092 ]
Test
5,120
1
Australian_Rock_Database:australian rock database australian rock database website searchable online database listed details australian rock music artists albums bands producers record labels established 2000 swedish national magnus holmgren developed interest australian music visiting exchange student information database entries initially gleaned chris spencer zbig nowara paul mchenry australian rock 3rd ed 1993 ian mcfarlane encyclopedia australian rock pop 1999 australian government former website culture recreation listed australian rock database resource australian rock music
[]
Test
5,121
0
Terminology-oriented_database:terminology-oriented database terminology-oriented database terminology-oriented database management system conceptual extension object-oriented database implements concepts defined terminology model compared object-oriented databases terminology-oriented database requires minor conceptual extensions schema level supporting set relations super-set subset intersection etc weak-typed collections shared inheritance data model terminology-oriented database high-level terminology-oriented database provides facilities transforming terminology model provided subject area experts completely database schema target schema might database schema object-oriented database well relational database schema even xml schema typically terminology-oriented databases bound specific database type since information content stored object-oriented databases relational databases identical data terminology-oriented database stored theoretically type database well xml file thus terminology-oriented databases may support several database systems storing application data terminology databases contain terms vocabularies become valuable ontologies turn ontologies help process associated triples complex predicates thus going deeper hierarchies keys rdbms semantic mapping also enhance performance
[ 2054, 6462 ]
Test
5,122
2
Haptik:haptik haptik enterprise conversational al platform based mumbai india founded 2013 platform reaches 30 million devices monthly processed billion messages far technology infrastructure employs blend artificial intelligence natural language processing machine learning haptik founded aakrit vaish swapan rajdev university illinois engineering alumni august 2013 march 2014 company launched first product haptik app chat-based personal assistant lets users get things done android ios platforms india september 2014 platform powered 125 chat experts helped users queries time evolved full-blown conversational commerce app 2 million downloads 15 million app installs company launched life insurance chat-bot hdfc life baap bot fathers day august 2015 dan roth university illinois joined haptik board advisers make platform underlying nlp technology layer smarter year haptik became official personal assistant mumbai city fc also provided customer support chat-bot swipe telecom may 2016 company growing 20 percent month-on-month chat volume downloads user addition put together technology perspective 25 percent responses already automated platform november 2017 company launched full-scale enterprise level bot management platform including analytics dashboard company partnered amazon pay hdfc life ola cabs uber times internet mumbai city fc coca-cola ziman zomato bookmyshow cleartrip goibibo urbanclap via.com dineout flipkart run campaigns haptik app march 2018 company partnered amazon web services aws offer al-enabled conversational solutions customers india haptik entered strategic partnership combinator-backed leena ai provide enterprises types bot solutions haptik repertoire chatbot customers india includes samsung future group kfc dream11 sharekhan edelweiss tokio club mahindra iifl among others haptik also built assistants toi samsung ziman akancha harassment online cyber safety initiative haptik one world largest conversational ai platforms october 2017 times india app incorporated haptik virtual personal assistant service sprite exclusive brand partner samsung second partner uses haptik power ‘ assistant ’ service pre-installed samsung galaxy s7 galaxy s7 edge india haptik built scalable support bot dream11 helped online handle 8x volume without large support staff ipl 2018 april times internet acquired majority stake company invested 11.2 million business haptik raised 11.2m series b funding round times internet april 2016 earlier company received funding 1 million kalaari capital september 2014 haptik app chat-based personal assistant allowing users set reminders book cab flight tickets recharge phones pay utility bills find places vicinity web check-in uses artificial intelligence ai machine learning deliver fast precise results platform successful forging alliances technology humans haptik utilizes skill set human resources customer service help train bots reported deccan chronicle platform app runs uses artificial intelligence al machine learning deliver fast precise results haptik open sourced proprietary named entity recognition system powers chatbots behind haptik app chatbot summit held berlin june 26 2017
[ 4337, 3507, 1444, 3263, 5064 ]
Train
5,123
4
Fail-stop:fail-stop fail-stop subset computer language one semantics original except case exceptional condition arises fail-stop subset must report exceptional condition whenever superset language reports one may additionally report exceptional condition cases fail-stop languages often used computer systems correctness important since easier make systems fail-fast example operator many programming languages associative possibility floating-point overflow repairing languages fail fast commonly assumed properties hold makes much easier write verify correct code many widely used programming languages code might reduce bank account value deposited amount old account value large causing overflowed value assigned new_bank_account_value fail-stop language treats overflow exceptional condition either correct terminate exceptional condition
[]
Test
5,124
4
Firewalk_(computing):firewalk computing firewalking technique developed mike schiffman david goldsmith utilizes traceroute techniques ttl values analyze ip packet responses order determine gateway acl access control list filters map networks active reconnaissance network security analysis technique attempts determine layer 4 protocols specific firewall allow firewalk software tool performs firewalking protect firewall gateway firewalking one block icmp time exceeded messages
[ 3821, 651, 6515, 7868, 1034, 3775, 6043, 1805 ]
Test
5,125
4
CERT_Coordination_Center:cert coordination center cert coordination center cert/cc coordination center computer emergency response team cert software engineering institute sei non-profit united states federally funded research development center cert/cc researches software bugs impact software internet security publishes research information findings works business government improve security software internet whole first organization kind cert/cc created pittsburgh november 1988 darpa direction response morris worm incident cert/cc part cert division software engineering institute 150 cybersecurity professionals working projects take proactive approach securing systems cert program partners government industry law enforcement academia develop advanced methods technologies counter large-scale sophisticated cyber threats cert program part software engineering institute sei federally funded research development center ffrdc carnegie mellon university main campus pittsburgh cert registered trademark carnegie mellon university 2003 department homeland security entered agreement carnegie mellon university create us-cert us-cert national computer security incident response team csirt united states america cooperation often causes confusion cert/cc us-cert related two organizations distinct entities general us-cert handles cases concern us national security whereas cert/cc handles general cases often internationally cert/cc coordinates information us-cert computer security incident response teams licensed use name “ cert. ” organizations license cert name carnegie mellon university organizations independent entities established countries operated cert/cc cert/cc established first organization promoting cooperating information exchange various national certs private product security psirts research work cert/cc split several different work areas key capabilities products listed cert/cc works directly software vendors private sector well government agencies address software vulnerabilities provide fixes public process known coordination cert/cc promotes particular process coordination known responsible coordinated disclosure case cert/cc works privately vendor address vulnerability public report published usually jointly vendor security advisory extreme cases vendor unwilling resolve issue contacted cert/cc typically discloses information publicly 45 days since first contact attempt software vulnerabilities coordinated cert/cc may come internal research outside reporting vulnerabilities discovered outside individuals organizations may reported cert/cc using cert/cc vulnerability reporting form depending severity reported vulnerability cert/cc may take action address vulnerability coordinate software vendor cert/cc regularly publishes vulnerability notes cert knowledgebase vulnerability notes include information recent vulnerabilities researched coordinated individuals organizations may mitigate vulnerabilities vulnerability notes database meant comprehensive cert/cc provides number free tools security research community tools offered include following cert/cc periodically offers training courses researchers organizations looking establish psirts cert coordination center summer 2014 cert research funded us federal government key de-anonymization tor anonymity network information subpoenaed cert fbi used take silkroad 2.0 fall fbi denied paying deanonymize users cmu denied receiving funding compliance government subpoena despite indirectly contributing taking numerous illicit websites arrest least 17 suspects research raised multiple issues cmu said statement november 2015 ... university time time served subpoenas requesting information research performed university abides rule law complies lawfully issued subpoenas receives funding compliance even though motherboard reported neither fbi cmu explained authority first learned research subpoenaed appropriate information past sei also declined explain nature particular research response press inquiries saying thanks inquiry practice comment law enforcement investigations court proceedings
[ 3932, 5275, 6879, 2991, 4932, 294, 4316, 1372, 7641, 7050, 5836, 7457, 3383, 6118, 2137, 7106, 1584, 3997, 2875, 4087, 1412, 7217, 74, 4456, 2891, 1332, 2900, 1805 ]
Test
5,126
1
Comparison_of_MySQL_database_engines:comparison mysql database engines comparison available database engines mysql database management system dbms database engine storage engine underlying software component dbms uses create read update delete crud data database
[ 7957, 5717, 1359, 6279, 1105, 4708, 4167, 3652, 1491, 2054, 6755, 4363, 5780, 6056, 1695, 2259, 174, 6500, 7598 ]
Test
5,127
5
SpaceTime_(software):spacetime software spacetime also known spacetime3d 3d graphical user interface displays web pages 3d tabbed stack interface available online flash application free desktop software download microsoft windows operating system technology presented 2008 ces tradeshow ceo eddie bakhash began working spacetime 1993 product debuted beta june 4 2007 day release san jose mercury news noted software advanced 3-d navigation system 've seen n't make dizzy except thoughts could become software capabilities compared current browsing 3d technologies techcrunch comment spacetime pure eye candy sort like second life meets firefox online version spacetime features ability search google google images wikipedia youtube desktop application released beta form june 4 2007 currently available windows 2000 xp vista systems mac os x version planned 2008 yet come fruition spacetime developers currently working port product opengl framework order support linux unix operating systems using search engines including google google images yahoo yahoo image ebay flickr spacetime loads first ten results stack pages beta browser received mixed reviews katherine boehret wall street journal stated though ’ still rely google basic searches visual search save time turn searching fun process jack m. germain technewsworld described spacetime delivers promise save time provide revolutionary online searching stating continue use 3-d searching environment though fun work edward n. albro pcworld gave beta browser 2.5/5 stating visual results make searches easier basic browsing spacetime appeal browser buggy slow basic browsing
[ 4655, 6802, 5378, 7537, 6809, 393, 3291, 2574, 2577, 6452, 4352, 4725, 1136, 6858, 445, 1152, 1525, 4759, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520, 3057, 5887, 6966, 5542, 1276, 5571, 578, 7015, 7749, 2049, 4565, ...
Test
5,128
6
Mount_Rainier_(packet_writing):mount rainier packet writing mount rainier mrw format writable optical discs provides packet writing defect management goal replacement floppy disk named mount rainier volcano near seattle washington united states mount rainier used drives explicitly support part scsi/mmc work atapi works standard cd-r cd-rw dvd+/-r dvd+/-rw media physical format mrw disk managed drive firmware remaps physical drive blocks virtual defect-free space thus host computer see physical format disk sequence data blocks capable holding filesystem time needed disk formatting shortened one minute background formatting capabilities drive formatting allocates sectors end disk defect management defective sectors recorded table lead-in administrative area copy table lead-out host computer perspective mrw disc provides defect-free block-accessible device upon host supported filesystem may written filesystems may fat32 ntfs etc. preferred format usually udf 1.02 file format widely supported mrw-formatted cd-rw udf filesystem gives approximately 500 mb free space mt rainier allows write access disc within seconds insertion spin-up even background formatting sequence taking place technology user would wait formatting complete writing data new disc even possible read write mrw disks without mrw-compatible drive remapper device driver needed example easywrite reader windows alternative mrw physically format disc udf 1.5 higher using spared build achieved use specialized packet writing software operating systems support udf versions 1.5 mrw capabilities overlap somewhat udf 1.5+ advantages mrw udf 1.5+ include advantage udf 1.5+ mrw include mount rainier implemented natively windows vista windows 7 linux built-in mrw support since kernel version 2.6.2 2004 amiga os4 supports natively since first beta appeared 2004 support reading format also added mac os x operating systems n't support mrw natively notably windows xp prior versions need third-party software read write mrw-formatted discs tend packet writing utilities allow native udf filesystems written optical media optical disk software isobuster support mount rainier non-mr drives easywrite logo marketing symbol created philips cd drives mount rainier compatible cd-mrw stands compact disc – mount rainier read/write
[ 2717, 3554, 5384, 3672, 2657, 1534, 5656, 2350, 578, 4354, 5090, 3903 ]
Validation
5,129
9
AutoIt:autoit autoit freeware programming language microsoft windows earliest release primarily intended create automation scripts sometimes called macros microsoft windows programs since grown include enhancements programming language design overall functionality scripting language autoit 1 2 statement-driven designed primarily simulating user interaction version 3 onward autoit syntax similar found basic family languages form autoit general-purpose third-generation programming language classical data model variant data type store several types data including arrays autoit automation script converted compressed stand-alone executable run computers autoit interpreter installed wide range function libraries known udfs user defined functions also included standard available website add specialized functionality autoit also distributed ide based free scite editor compiler help text fully integrated provide de facto standard environment developers using autoit autoit typically used produce utility software microsoft windows automate routine tasks systems management monitoring maintenance software installation also used simulate user interaction whereby application driven via automated form entry keypresses mouse clicks things autoit script autoit also used low-cost laboratory automation applications include instrument synchronisation alarm monitoring results gathering devices cnc routers 3d-printers also controlled developers autoit originally released source code gnu general public license gpl practice discontinued beginning version 3.2.0 august 2006 following terms gpl code version 3.1 used create fork autohotkey project community continuing develop release code gpl
[ 6507, 5197, 5367, 5987, 1255, 4759, 12, 2463, 6891, 8183, 4139, 5651, 2925, 3532, 3863, 5482, 7448, 7637, 5926, 5571, 7906, 5137, 5234, 2941, 3303, 666, 4170, 1304, 61, 6394, 4003, 5782, 2885, 7864, 1789, 5877, 4012, 4745, 1064 ]
Test
5,130
6
Lnfs:lnfs lnfs plan 9 file system enabling use long filenames filesystems support similar umsdos file system linux
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 4480, 12...
Test
5,131
4
Cybersecurity_Information_Sharing_Act:cybersecurity information sharing act cybersecurity information sharing act cisa 113th congress 114th congress united states federal law designed improve cybersecurity united states enhanced sharing information cybersecurity threats purposes law allows sharing internet traffic information u.s. government technology manufacturing companies bill introduced u.s. senate july 10 2014 passed senate october 27 2015 opponents question cisa value believing move responsibility private businesses government thereby increasing vulnerability personal private information well dispersing personal private information across seven government agencies including nsa local police text bill incorporated amendment consolidated spending bill u.s. house december 15 2015 signed law president barack obama december 18 2015 cybersecurity information sharing act introduced july 10 2014 113th congress able pass senate intelligence committee vote 12-3 bill reach full senate vote end congressional session bill reintroduced 114th congress march 12 2015 bill passed senate intelligence committee vote 14-1 senate majority leader mitch mcconnell r-ky attempted attach bill amendment annual national defense authorization act blocked 56-40 reaching necessary 60 votes include amendment mitch mcconnell hoped bring bill senate-wide vote week august 3–7 unable take bill summer recess senate tentatively agreed limit debate 21 particular amendments manager amendment set time limits debate october 2015 us senate took bill back following legislation concerning sanctuary cities main provisions bill make easier companies share personal information government especially cases cyber security threats without requiring information sharing bill creates system federal agencies receive threat information private companies respect privacy bill includes provisions preventing sharing personal data irrelevant cyber security personal information get removed sharing procedure used variety ways shared cyber threat indicators used prosecute cyber crimes may also used evidence crimes involving physical force sharing national intelligence threat data among public private partners hard problem one care national intelligence threat sharing nits project intended innovative solution hard problem altogether nits innovative useful first ensure nits trustworthy private partners must indemnified indemnification takes act congress literally underlying impediment fulsome cooperation among buyers sellers peers within supply chain indemnification indemnification needed secure industry partners legal responsibility actions unfortunately congressional refusal offer indemnification remains impediment real collaboration least qualified immunity accorded immunity individuals performing tasks part government actions cisa received support advocacy groups including united states chamber commerce national cable telecommunications association financial services roundtable number business groups also opposed bill including computer communications industry association well individual companies twitter yelp apple reddit bsa software alliance appeared initially supportive cisa sending letter july 21 2015 urging senate bring bill debate september 14 2015 bsa published letter support amongst things cyber threat information sharing legislation addressed congress signed board members adobe apple inc. altium autodesk ca technologies datastax ibm microsoft minitab oracle salesforce.com siemens symantec prompted digital rights advocacy group fight future organize protest cisa following opposition campaign bsa stated letter expressed support cyber threat sharing legislation general endorse cisa pending cyber threat sharing bill particular bsa later stated opposed cisa current form computer communications industry association another major trade group including members google amazon.com cloudflare netflix facebook red hat yahoo also announced opposition bill proponents cisa include bill main cosponsors senators dianne feinstein d-ca richard burr r-nc senators announced opposition cisa including ron wyden d-or rand paul r-ky bernie sanders i-vt senator ron wyden d-or objected bill based classified legal opinion justice department written early george w bush administration obama administration states rely legal justification laid memo wyden made repeated requests us attorney general declassify memo dating least far back 2010 office inspector general report cited memo legal justification fbi warrantless wire-tapping program august 4 2015 white house spokesman eric schultz endorsed legislation calling senate take bill soon possible pass united states department homeland security initially supported bill jeh johnson secretary dhs calling bill move forward september 15 however august 3 letter senator al franken d-mn deputy secretary dhs alejandro mayorkas expressed desire connections brokered dhs given department charter protect executive branch networks letter dhs found issue direct sharing information government agencies advocating instead dhs sole recipient cyberthreat information allowing scrub private information addition department homeland security published privacy impact assessment detailing internal review proposed system handling incoming indicators industry privacy advocates opposed version cybersecurity information sharing act passed senate october 2015 left intact portions law said made amenable surveillance actual security quietly stripping several remaining privacy protections cisa criticized advocates internet privacy civil liberties electronic frontier foundation american civil liberties union compared criticized cyber intelligence sharing protection act proposals 2012 2013 passed united states house representatives pass senate united kingdom government policy cyber security scottish government information sharing
[ 1501, 7037, 2656, 6586, 2727, 4036, 6092 ]
Test
5,132
4
Guardian_Analytics:guardian analytics guardian analytics american privately held company headquartered mountain view california provides behavioral analytics machine learning technology preventing banking fraud established 2005 products based anomaly detection monitor financial transactions 2012 guardian analytics together mcafee dissected us 78 million cyber attack titled operation high roller 2013 guardian analytics listed among top 10 influencers banking information security september 2016 nearly 430 financial institutions using guardian analytics products mitigate fraud risk rely company stop sophisticated criminal attacks guardian analytics offers fraud prevention services financial institutions general architecture includes two main components first component risk engine merges analytics behavior-based models user create probabilistic profile individual recognizing anomalous behavior possible identify fraudulent activity loss occurs risk engine dynamically adapts user behavior able detect new fraud attacks second component visual analytics data browser used financial institutions monitor investigate resolve potential fraud accessing collected data visual interface shows risk scores underlying contextual information facilitate analysis investigation guardian analytics able detect fraudulent activities account takeover account reconnaissance fraudulent wire ach bill pay transactions guardian analytics specific type threat protect cyber attacks phishing vishing man browser software transparent account holders require action side guardian analytics markets several services targeting particular types financial interactions guardian analytics marketed software service deployed company sas 70 type ii certified environment frauddesk fraud monitoring managed service
[ 496, 4184, 1321, 330 ]
Test
5,133
5
RONJA:ronja ronja reasonable optical near joint access free-space optical communication system originating czech republic developed karel kulhavý twibright labs released 2001 transmits data wirelessly using beams light ronja used create 10 mbit/s full duplex ethernet point-to-point link estimated 1000 2000 links built worldwide range basic configuration device consists receiver transmitter pipe optical head mounted sturdy adjustable holder two coaxial cables used connect rooftop installation protocol translator installed house near computer switch range extended doubling tripling transmitter pipe building instructions blueprints schematics published gnu free documentation licence free software tools used development author calls level freedom user controlled technology ronja project twibright labs building instructions written inexperienced builder mind basic operations like drilling soldering etc. explained several techniques – drilling templates detailed checks soldering testing procedures – employed minimize errors critical places help speed work printed circuit boards downloadable ready manufacture instructions fabhouse people previous experience building electronics reported mailing list device ran first try 154 installations worldwide registered gallery technical data pictures brightest variant lumileds hpwt-bd00-f4000 led 130 mm diameter cheap chinese magnifying glass lenses range 1.4 km less bright easier buy e4000 variant hpwt-bd00 yields 1.3 km speed always 10 mbit/s full duplex regardless distance definition clear visibility transmitter receiver essential beam obscured way link stop working typically problems may occur conditions snow dense fog one device weighs 15.5 kg requires 70 hours building time requires ability set full duplex manually network card switch take advantage full duplex since n't support autonegotiation must plugged directly pc switch using integral 1 ethernet cable complete ronja system made 2 transceivers 2 optical transmitters 2 optical receivers assembled individually combination complete system layout shown block diagram usual approach fso free space optics preamplifiers employ transimpedance amplifier transimpedance amplifier sensitive broadband high-speed device featuring feedback loop fact means layout plagued stability problems special compensation pin diode capacitance must performed therefore n't allow selection wide range cheap pin photodiodes varying capacitances ronja however uses feedbackless design pin high working electrical resistance 100 kilohms together total input capacitance roughly 8 pf 5 pf pin 3 pf input mosfet cascode makes device operate passband 6 db/oct slope low pass formed pin working resistance total input capacitance signal immediately amplified remove danger contamination signal noise compensation 6 db/oct slope done derivator element programming pins ne592 video amplifier surprisingly flat characteristic obtained pin diode equipped 3 kω working resistor operate flat band mode range reduced 30 due thermal noise 3 kω resistor hsdl4220 infrared led originally unsuitable 10 mbit/s operation bandwidth 9 mhz 10 mbit/s manchester-modulated systems need bandwidth around 16 mhz operation usual circuit current drive would lead substantial signal corruption range reduction therefore twibright labs developed special driving technique consisting driving led directly 15-fold 74ac04 gate output parallel rf voltage applied current-unlimited directly led large capacitors voltage keep nominal led average current 100ma varies temperature component tolerances ac-bypassed current sense resistor put series led feedback loop measures voltage resistor keeps preset level varying supply voltage 74ac04 gates therefore nominally digital 74ac04 operating structured power cmos switch completely analog mode way led junction flooded cleared carriers quickly possible basically short circuit discharge pushes speed led maximum makes output optical signal fast enough range/power ratio faster red hpwt-bd00-f4000 led side effects brutal driving technique 1 led overshoots beginning longer 5 mhz/1 mhz impulses 2x brightness measured adverse effect range 2 blocking ceramic capacitor bank backing 74ac04 switching array crucial correct operation charging discharging led done short circuit dimensioning bank causes leading trailing edges optical output grow longer ronja twister electronic interface free space optical datalink based counter shift register chips part ronja design effectively optical ethernet transceiver without optical drive part original design superseded twister2 logic circuit remained one doctoral dissertation 10 master bachelor theses three high school graduation exams one high school vocational activity 18 master bachelor theses one university semester project cite ronja czech technical university built 120 educational link buildings two faculties teaching students practically fso one czech private university dedicates page textbook ronja additional 12 journal conference university articles based largely ronja soderberg studying ronja sociologically writes arguably first project vindicated methods licensing schemes free software development applied practices open hardware development pulled state-of-the-art technology without backing universities firms ronja project whole toolchain built strictly upon free tools source files provided free gpl allows anyone enter development start manufacture invest technology without entry costs costs normally include software licence costs time investment resolution compatibility issues proprietary applications costs intellectual property licence negotiations decision conceive project way inspired observed organizational efficiency free software christmas 2001 ronja became world first 10 mbit/s free space optics device free sources examples tools used development
[ 2149 ]
Test
5,134
2
Commit_charge:commit charge computing commit charge term used microsoft windows operating systems describe total amount virtual memory guaranteed processes fit physical memory page file systems pagefile may thought maximum potential pagefile usage systems pagefile still counted virtual address space must remain physical memory ram times accessed windows task manager utility windows xp server 2003 performance tab shows three counters related commit charge program process explorer reports set values labeling total current additionally providing percentages peak current towards limit value commit charge increases program opened used goes program closed also change already-running programs allocate free private virtual memory example virtualalloc virtualfree apis task manager utility windows xp windows server 2003 graphical displays labeled pf usage page file usage history despite labels reflect pagefile contents total current commit charge height graph area corresponds commit limit show much actually written pagefile maximum potential pagefile usage amount pagefile would used current contents ram removed windows 2000 windows nt 4.0 displays labeled mem usage actually show commit charge commit limit similar displays task manager windows vista later changed reflect usage physical memory task manager processes display process contribution total commit charge shown vm size column windows xp server 2003 value labeled commit size windows vista later total commit charge always larger sum values total includes system-wide allocations paged pool display mem usage column windows xp server 2003 working set memory column windows vista later shows process current working set count physical memory ram rather virtual address space represents subset process virtual address space valid meaning referenced without incurring page fault commit charge process include major contributions process virtual address space mapped files reason process working set portion address space referenced without incurring page fault may larger contribution total commit charge total commit charge inclusive total memory physical virtual actually use commit limit may increased either creating additional pagefiles pagefile expansion enabled expanding existing one operating system expand pagefile automatically possible total commit charge approaches limit event popup window displayed stating system running low virtual memory system ever runs completely commit charge total reaches limit popup window displayed stating system virtual memory may become extremely sluggish even nonresponsive closing programs user still able point decreases total commit charge may thereby free system
[ 3937, 3263, 378, 2198, 6096, 1475, 7553, 5410, 7564, 6472, 422, 6844, 2245, 435, 5442, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 3711, 140, 6558, 6575, 3407, 3057, 1597, 2345, 7688, 2710, 1248, 8049, ...
Test
5,135
4
Security_as_a_service:security service security service secaas business model service provider integrates security services corporate infrastructure subscription basis cost effectively individuals corporations provide total cost ownership considered secaas inspired software service model applied information security type services require on-premises hardware avoiding substantial capital outlays security services often include authentication anti-virus anti-malware/spyware intrusion detection penetration testing security event management among others outsourced security licensing delivery boasting multibillion-dollar market secaas provides users internet security services providing protection online threats attacks ddos constantly searching access points compromise websites demand use cloud computing skyrockets users vulnerable attacks due accessing internet new access points secaas serves buffer persistent online threats cloud security alliance csa organization dedicated defining raising awareness secure cloud computing csa defined following categories secaas tools created series technical implementation guidance documents help businesses implement understand secaas categories include secaas typically offered several forms security service offers number benefits including secaas number deficiencies make insecure many applications individual security service request adds least one across-the-'net round-trip counting installer packages four opportunities hacker intercept conversation secaas makes security handling uniform security breach one request security broken requests broadest attack surface also multiplies rewards incentive hacker value gained effort dramatically increased factors especially tailored resources nation/state-sponsored hacker biggest challenge secaas market maintaining reputation reliability superiority standard non-cloud services secaas whole seemingly become mainstay cloud market cloud-based website security ’ cater businesses specific requirements must properly assessed individual needs business cater end consumers afford keep data loose vulnerable hacker attacks heaviest part secaas educating businesses since data biggest asset businesses cios ctos take care overall security company
[ 370, 7165, 3954, 3958, 1461, 6806, 22, 3627, 2566, 2212, 5401, 3309, 754, 5064, 758, 2961, 1514, 2988, 7613, 1550, 6906, 3028, 2317, 842, 1982, 2700, 7319, 5889, 5894, 189, 1634, 3091, 6262, 7722, 5927, 3794, 7741, 5940, 8123, 2430, 278...
Test
5,136
0
BulPosCor:bulposcor bulgarian part speech-annotated corpus bulposcor bulgarian български пос анотиран корпус булпоскор morphologically annotated general monolingual corpus written language item text assigned grammatical tag bulposcor created department computational linguistics institute bulgarian language bulgarian academy sciences consists 174 697 lexical items bulposcor compiled structured brown corpus bulgarian sampling 300+ word-excerpts expanded sentence boundary original bcb files way preserve bcb overall structure annotation process consists primary stage automatically assigning tags bulgarian grammar dictionary stage manual resolving morphological ambiguities.the disambiguated corpus consists 174,697 lexical units bulposcor search interface koeva sv gramatichen rechnik na balgarskiya ezik.opisanie na koncepciyata za organizaciyata na lingvistichnite danni grammatical dictionary bulgarian в български език 6 1998 с 49-58 koeva sv. sv leseva i. stoyanova e. tarpomanova m. todorova bulgarian tagged corpora proceedings fifth international conference formal approaches south slavic balkan languages 18–20 october 2006 sofia bulgaria pp 78–86 todorova maria rositsa dekova balgarski pos anotiran korpus – osobenosti na gramatichnata anotaciya bulgarian pos annoted corpus – specifics grammatical annotation в езикови ресурси и технологии за български език състав и научн ред св коева д. благоева т. тинчев софия академично издателство „ марин дринов “ 2014
[ 1314, 3159, 5304 ]
Test
5,137
9
Liberty_BASIC:liberty basic liberty basic lb commercial computer programming language integrated development environment ide interpreter developed smalltalk recognizes dialect basic programming language runs 16- 32-bit windows os/2 liberty basic written carl gundel published first release company shoptalk systems 1992 progressed steadily since last published update software june 2018 current version v4.5.1 though liberty basic share limitations design advanced programming provides introductory integrated development environment ide moderate advanced users windows os/2 dlls available current version runs microsoft windows wine linux alpha testing liberty basic v5.0 underway versions run microsoft windows mac os x linux raspberry pi well liberty basic compile native code instead compiles code written ide encrypted file extension tkn file executed exe file carries file name although may change release version 5 liberty basic allows programming style similar dos basics run console mode using default main window displays formatted text accepts user input also supports gui-based event-driven programming using several types windows may contain standard controls buttons menus textboxes etc central idea creating liberty basic model handling windows syntax file handling example liberty basic help file open command opens communication device disk file window dynamic link library serial communications port “ device ” open data also commands control device “ printed ” type device set commands sent way recent versions lb word print may dropped print statement making syntax even simpler simplicity heart liberty basic beginning makes easier learn cost perhaps limiting functionality two data types supported lb4.03 numeric string type declarations required variable sign end name string variable otherwise numeric plan lb5 support types user defined types well purpose making calls api 3rd party dlls struct additional types necessary dll data structure currently supported array arrays one two dimensions supported lb5 may support arrays user-defined types examples language hello world program program display pop-up message box words hello world program display input box running another application using liberty basic printing multiplication table 5 form gnu/liberty basic compiler collection glbcc anthony liguori set tools compile liberty basic programs runs windows linux systems project updated since 2001 2011 alternative windows implementation liberty basic lb booster lbb became available although substantially compatible liberty basic 4 language syntax lbb developed entirely independently richard russell written bbc basic lbb offers typically increased execution speed smaller self-contained executables additional capabilities however lbb 100 compatible lb4 whilst many programs run without modification may need adapted even unsuitable running lbb
[ 6507, 1158, 4296, 5367, 1255, 4759, 12, 2463, 6891, 3955, 8183, 4139, 5651, 2925, 7448, 5926, 5129, 5571, 7906, 578, 5234, 2941, 3303, 6029, 4070, 5948, 1304, 61, 1128, 6394, 4003, 8137, 5965, 7864, 1789, 5877, 7308, 6778, 4012, 4745, 1...
Test
5,138
6
Rmdir:rmdir computing codice_1 codice_2 command remove empty directory various operating systems available unix e.g macos solaris aix hp-ux unix-like e.g freebsd linux dos dr flexos ibm os/2 microsoft windows reactos operating systems ms-dos command available versions 2 later dr dos 6.0 also includes implementation command also available open source ms-dos emulator dosbox kolibrios numerical computing environments matlab gnu octave include codice_1 function similar functionality normal usage straightforward name_of_directory corresponds name directory one wishes delete options command -p unix removes parent directories also empty example first remove baz/ bar/ finally foo/ thus removing entire directory tree specified command argument rmdir remove directory empty unix rm command remove directory contents recursively example normal usage identical unix-like operating systems equivalent command ms-dos earlier non-nt-based versions microsoft windows deleting non-empty directories deltree later version windows windows based nt kernel xp vista 7 8 server 2003/2008 case insensitive like earlier predecessors unless two files name different case exist case sensitivity applies selecting file use case match either file one may chosen windows two files named different case sensitivity allowed either windows services unix installed windows registry settings set allow example security risk using rd/rmdir two directories name different case sensitivities exist one contains valid data and/or programs contains incriminating materials and/or malware rd/rmdir gets executed without regard case sensitivity windows chooses legitimate folder delete folder left undesired one windows uses folder instead previously legitimate one execute programs one may led believe contains legitimate data
[ 361, 362, 6789, 1812, 366, 4662, 6076, 6088, 1837, 3981, 3984, 2589, 1866, 3664, 5784, 1140, 5789, 4020, 3685, 4387, 4759, 1537, 2999, 5117, 2290, 5480, 126, 7272, 1572, 1213, 7667, 4447, 8030, 3417, 5181, 6242, 4464, 3085, 900, 3106, 5...
Test
5,139
7
Cloudsoft_Monterey:cloudsoft monterey cloudsoft monterey platform service paas software developed cloudsoft corp provide intelligent application mobility across multiple cloud computing environments supported vcloud amazon ec2 gogrid well private clouds using jclouds cloud api application written java using equinox osgi framework configuration dsls written groovy main components eclipse based development studio tool plugin developers management console monterey management network nodes run mobile application logic
[ 2961, 5571, 578 ]
Validation
5,140
2
CSI-DOS:csi-dos csi-dos operating system created samara soviet elektronika bk-0011m elektronika bk-0011 microcomputers csi-dos support earlier bk-0010 csi-dos used unique file system supported color graphics video mode system supported hard floppy drives well ram disks computer memory also included software work ay-3-8910 ay-3-8912 music co-processors covox speech thing number games demos designed specially system system also included turbo vision-like application programming interface api allowing simpler design user applications graphical file manager called x-shell
[ 1522, 861, 3748, 5571, 3538, 1288 ]
Train
5,141
3
Data_Transfer_Project:data transfer project data transfer project dtp open-source initiative features data portability multiple online platforms project launched introduced google july 20 2018 currently partnered facebook microsoft twitter apple project formed google data liberation front 2017 hoping provide platform could allow individuals move online data different platforms without need downloading re-uploading data ecosystem achieved extracting different files various available apis released online platforms translating codes could compatible platforms july 20 2018 joint project announced source code uploaded github mainly written google microsoft engineers july 30 2019 apple announced joining project allowing data portability icloud
[ 2902, 5372, 6427, 2569, 6110, 3309, 7924, 2591, 1491, 5775, 432, 6153, 5455, 4759, 4762, 7967, 7619, 6176, 5476, 831, 3028, 136, 2317, 840, 2673, 7285, 7660, 2683, 855, 6937, 168, 6950, 5534, 2712, 3076, 4116, 8054, 6978, 7346, 561, 807...
Test
5,142
5
Link_Access_Procedure_for_Frame_Relay:link access procedure frame relay wide area network computing link access procedure frame relay lapf part network communications protocol ensures frames error free executed right sequence lapf formally defined international telecommunication union standard q.922 derived ibm synchronous data link control protocol layer 2 protocol ibm systems network architecture developed around 1975 itu used sdlc basis develop lapf frame relay environment along equivalents lapb x.25 protocol stack lapm v.42 protocol lapd isdn protocol stack frame relay local management interface lmi messages carried variant lapf frames lapf corresponds osi model data link layer
[ 3209, 6871, 7916, 3207, 4580, 4101, 3597, 7433, 5492, 3525, 1543, 1709 ]
Test
5,143
5
Architecture_for_Control_Networks:architecture control networks architecture control networks acn suite network protocols control entertainment technology equipment particularly used live performance large-scale installations example lighting audio special effects equipment acn maintained entertainment services technology association first official release ansi standard e1.17-2006 entertainment technology architecture control networks standard subsequently revised released ansi e1.17-2010 acn initially designed layered top udp/ip therefore run ip transports including standard inexpensive ethernet 802.11 wi-fi networks acn defines common protocol architecture two major network protocols sdt dmp device description language ddl number ‘ e1.17 profiles interoperability ’ known epi interoperability profiles define elements acn architecture must used particular context achieve interoperability example providing specific values ranges timing parameters used particular network environment breakdown acn sub-protocols interoperability profiles small pieces criticized making acn hard read understand makes architecture highly modular cleanly layered allowed many pieces operated contexts replaced revised without changing pieces example dmp operated tcp well sdt defined initial standard ddl adapted little change describe devices accessed dmx512 ansi e1.31/streaming acn several interoperability profiles seen major revision replacement without disturbing parts standard common architecture specification defines format nested protocol data units pdus rather similar tlv encoding used main protocols defines minimal root layer protocol used splice higher level protocols lower level transport defines root layer protocol using pdu format use udp/ip session data transport sdt reliable multicast transport protocol operates udp/ip used group peers within network sessions deliver messages individually group messages delivery ordered messages may selectively sent reliably unreliably message-by-message basis reliability important data avoiding time resource overhead reliability mechanism beneficial others reliability mechanism also provides online status component detect connection broken sdt provides high degree fine tuning trade-off latency reliability levels resource requirements availability large numbers concurrent sessions means powerful tool grouping managing components whose functions related whose communication requirements similar device management protocol dmp represents device set addressable properties represent current desired state monitoring control controller achieved setting examining values properties avoid inefficiencies polling addition simply reading property values using get-property message dmp provides subscription mechanism whereby device asynchronously send event messages subscribed controllers value property changes dmp expects connections provide reliability set-property event messages form large part operational bandwidth show situation require explicit acknowledgement dmp level e1.17 standard majority systems sdt provides reliability dmp also operated using tcp provide reliable connections size bits representation read/write accessibility function property dmp device determined protocol defines mechanism read and/or write property value instead information must either provided externally device description written ddl limited cases may pre-programmed fore-knowledge specific device types device description language ddl allows machine parsable description interface capabilities device defined description interpreted controller may automatically configure controlling device description provides address property mapping information necessary dmp operate also contain huge amount information functionality capabilities semantics device extensible format allows controller extract features needs specific context skipping information relevant needs ddl xml based language descriptions contained small number xml documents normal acn systems description device may downloaded device however descriptions may also distributed ways internet download since description valid devices type controllers typically maintain cache descriptions devices commonly encounter interoperability profiles epis provided ansi e1.17 initial service discovery system allocation multicast addresses used udp ipv4 udp port allocation multicasting ip address assignment conformant systems protocol timeouts specific environments epis conform acn architecture developed outside ansi e1.17 standard see due modular nature acn easy extend major protocol ansi e1.31 known streaming acn sacn developed organization uses root layer pdu format acn transport data dmx512 data ip networks acn compatible transport number interoperability profiles developed standardized plasa include ansi e1.30-3-2009 time reference acn systems using sntp ntp ansi e1.30-4-2010 defines use ddl describe devices controlled using dmx512 streaming acn early open-source implementation acn released openacn available sourceforge ported wide range platforms limited scope implement ddl support recent much complete implementation c 'acacian includes features ddl support yet another open source acn project codeplex implemented c aims provide full managed code implementation includes code several related protocols e1.31 streaming dmx acn supported linux arm i386 x86-64 macintosh powerpc i386 x86-64 open lighting architecture rust implementation e1.31 found github acn deployed proprietary implementations number companies including use electronic theatre controls etc basis 'net3 branded networked control infrastructure shure inc. control wireless microphones
[ 3821, 5847, 827, 5506, 7848, 578, 3819, 1435 ]
Test
5,144
4
AVG_Technologies:avg technologies avg technologies cz s.r.o czech security software company headquartered brno founded 1991 jan gritzbach tomáš hofer wholly owned subsidiary avast since 2016 company develops antivirus software internet security services avg antivirus corporate offices europe israel brazil canada united states 2 february 2015 200 million active users used avg software products services include internet security performance optimization personal privacy identity protection applications july 2016 avast announced intended acquire avg acquisition completed 30 september 2016 avast avg operated single company since 3 october 2016 retaining two separate brands company founded brno czech republic jan gritzbach tomáš hofer 1991 grisoft /c/ software spol r. o.. owned jan gritzbach 2001 jan gritzbach decided sell grisoft benson oak capital acquisitions holding company grisoft inc. based wilmington delaware used transaction 2002 company renamed grisoft s.r.o.. three years later benson oak sold 65 share company intel capital enterprise investors us 52 million holding company grisoft holdings b.v. based amsterdam netherlands later grisoft international b.v. gradually became main company 19 april 2006 grisoft acquired german company ewido networks anti-spyware software manufacturer incorporated ewido features new versions avg software 6 november 2006 microsoft announced avg security products would available directly windows security center windows vista since 7 june 2006 avg software also used optional component gfi mailsecurity produced gfi software 5 december 2007 grisoft announced acquisition exploit prevention labs developer linkscanner safe surfing technology 2008 grisoft s.r.o renamed avg technologies cz s.r.o grisoft international b.v. avg technologies n.v.. change made increase effectiveness marketing activities january 2009 avg announced plans acquire sana security finalized plans integrate sana technologies free consumer product avg anti-virus still consideration according jr smith avg chief executive sana security developed technologies currently licensed symantec 5 october 2009 ta associates announced bought minority stake avg technologies us 200 million april 2010 avg announced appointed security industry veteran yuval ben-itzhak senior vice president engineering ben-itzhak became chief technology officer later year 9 june 2010 avg announced acquisition north carolina-based walling data north america security software distribution distributed avg offerings across united states since 2001 10 november 2010 avg announced acquisition tel aviv-based droidsecurity company specializes field mobile security solutions android devices upon completion acquisition droidsecurity become wholly owned subsidiary avg droidsecurity ceo co-founder eran pfeffer become general manager avg ’ mobile solutions team december 2010 avg released mandatory-install update 2011 version antivirus software caused thousands 64 bit windows vista windows 7 computers become completely inoperable avg since released fix attempts repair computers bricked installing update affected users watch following video avg official youtube page resolve issue 28 january 2011 dangerous rogue appeared interface graphics resemble previous version software uses sophisticated social engineering deceive users infect systems malware also portrays so-called emergency mode internet explorer exist genuine application 1 december 2011 avg technologies announced acquisition bsecure technologies inc. bsecure leading provider proprietary cloud-based technology internet filtering industry since 2001 endorsed software provider family online safety 2011 group restructured avg technologies holdings b.v. founded avg technologies cz s.r.o avg technologies n.v. subsidiaries 7 february 2012 avg technologies n.v. listed new york stock exchange 12 june 2013 avg technologies announced acquisition level platforms 8 march 2013 jr smith ceo tendered resignation avg eight years ceo leading company successful ipo nyse delivering eight quarters successive high-growth 30 july 2013 avg technologies announced gary kovacs company new ceo november 2014 avg technologies announced acquisition norman safeground asa oslo-based company known norman suite security products avg technologies announced may 2015 acquisition privax uk based company owner hidemyass vpn service september 2015 company announced acquisition location labs company personal security products four major us cellular carriers 7 july 2016 avast announced intended acquire avg technologies purchase price 25.00 per share cash total around 1.3 billion acquisition completed 30 september 2016 avast avg operate single company monday 3 october 2016 company delisted new york stock exchange 20 august 2010 avg entered partnership moka5 secure desktop virtualisation solutions partnership adds critical security layer virtual desktop marketplace enterprise companies turning desktop virtualization secure solution bringing computer byoc work home initiatives employees 1 july 2010 avg partnered opera software provide malware security web browser opera protection added existing fraud protection technology netcraft phishtank haute secure july 2011 avg joined forces israeli company zbang launch multimi free windows ipad app integrates e-mail social media multimedia one interface avg provides linkscanner app checking link sent e-mail shared social network found via search december 2012 avg yahoo partnered secure search toolbar september 2013 avg partnered facebook launch facebook privacy application avg crowd control may 2012 avg technologies issued copyright claim referred 'takedown request youtube video 1987 pop song never gon na give performed british singer rick astley video october 2015 150 million views 300,000 comments uploaded 2007 restored within 24 hours youtube video name refers internet meme commonly referred 'rickrolling someone pranks others tricking going video avg browser add-on avg secure search criticized adware since frequently bundled software often mistakenly installed exhibits malware-like behavior avg secure search also advertised users free versions avg products although add-on offers legitimate malware-blocking capabilities default behavior changing internet browser default search engine homepage new tab page avg secure search reminiscent potentially unwanted program pup problems uninstalling add-on widely reported add-on could potentially make internet browser vulnerable attacks
[ 5452, 91, 4115, 5984, 5546, 7425, 6257, 3089, 7809, 4492, 1931, 4138, 300, 385, 910, 1838, 2296, 4689, 6005, 6006, 4783, 3111, 7087, 496, 6644, 7193, 3123, 142, 935, 1395, 3561, 7478, 5601, 6043, 6305, 2789, 8134, 4456, 6777, 4645, 7597...
Validation
5,145
9
Analytica_(software):analytica software analytica visual software package developed lumina decision systems creating analyzing communicating quantitative decision models modeling environment interesting way combines hierarchical influence diagrams visual creation view models intelligent arrays working multidimensional data monte carlo simulation analyzing risk uncertainty optimization including linear nonlinear programming design especially influence diagrams treatment uncertainty based ideas field decision analysis computer language notable combining declarative non-procedural structure referential transparency array abstraction automatic dependency maintenance efficient sequencing computation analytica models organized influence diagrams variables objects appear nodes various shapes diagram connected arrows provide visual representation dependencies analytica influence diagrams may hierarchical single module node diagram represents entire submodel hierarchical influence diagrams analytica serve key organizational tool visual layout influence diagram matches natural human abilities spatially level abstraction people able take far information model structure organization glance possible less visual paradigms spreadsheets mathematical expressions managing structure organization large model significant part modeling process substantially aided visualization influence diagrams influence diagrams also serve tool communication quantitative model created final results computed often case understanding results obtained various assumptions impact results far important specific numbers computed ability target audience understand aspects critical modeling enterprise visual representation influence diagram quickly communicates understanding level abstraction normally appropriate detailed representations mathematical expressions cell formulae detail desired users drill increasing levels detail speeded visual depiction model structure existence easily understandable transparent model supports communication debate within organization effect one primary benefits investing quantitative model building interested parties able understand common model structure debates discussions often focus directly specific assumptions cut cross-talk therefore lead productive interactions within organization influence diagram serves graphical representation help make models accessible people different levels analytica uses index objects track dimensions multidimensional arrays index object name list elements two multidimensional values combined example expression revenue expenses multidimensional analytica repeats profit calculation dimension recognizes dimension occurs values treats dimension calculation process called intelligent array abstraction unlike programming languages inherent ordering dimensions multidimensional array avoids duplicated formulas explicit loops common sources modeling errors simplified expressions made possible intelligent array abstraction allow model accessible interpretable transparent another consequence intelligent array abstraction new dimensions introduced removed existing model without requiring changes model structure changes variable definitions example creating model model builder might assume particular variable example discount_rate contains single number later constructing model user might replace single number table numbers perhaps discount_rate broken country economic_scenario new divisions may reflect fact effective discount rate international divisions company different rates applicable different hypothetical scenarios analytica automatically propagates new dimensions results depend upon discount_rate example result net present value become multidimensional contain new dimensions essence analytica repeats calculation using discount rate possible combination country economic_scenario flexibility important exploring computation tradeoffs level detail computation time available data overall size dimensionality parametric spaces adjustments common models fully constructed way exploring what-if scenarios overall relationships variables incorporating uncertainty model outputs helps provide realistic informative projections uncertain quantities analytica specified using distribution function evaluated distributions sampled using either latin hypercube monte carlo sampling samples propagated computations results sampled result distribution summary statistics viewed directly mean fractile bands probability density function pdf cumulative distribution function cdf analytica supports collaborative decision analysis probability management use sipmath tm standard system dynamics approach simulating behaviour complex systems time deals feedback loops time delays behaviour entire system dynamic function analytica allows definition variables cyclic dependencies feedback loops expands influence diagram notation normally allow cycles least one link cycle includes time lag depicted gray influence arrow distinguish standard black arrows without time lags analytica includes general language operators functions expressing mathematical relationships among variables users define functions libraries extend language analytica several features programming language designed make easy use quantitative modeling visual programming language users view programs models influence diagrams create edit visually adding linking nodes declarative language meaning model declares definition variable without specifying execution sequence required conventional imperative languages analytica determines correct efficient execution sequence using dependency graph referentially transparent functional language execution functions variables side effects i.e changing variables analytica array programming language operations functions generalize work multidimensional arrays analytica used policy analysis business modeling risk analysis areas analytica applied include energy health pharmaceuticals environmental risk emissions policy analysis wildlife management ecology climate change technology defense strategic financial planning r planning portfolio management financial services aerospace manufacturing environmental health impact assessment analytica software runs microsoft windows operating systems three editions professional enterprise optimizer functions cost purchased users interested building models free edition available called analytica free 101 allows build medium moderate sized models 101 user objects.. free 101 also allows view models 101 objects change inputs compute results enables free sharing models review capable non-free power player enables users save inputs utilize database connections analytica cloud player allows share models web lets users access run via web browser recent release analytica version 5.1 released may 2018 analytica predecessor called demos grew research tools policy analysis max henrion phd student later professor carnegie mellon university 1979 1990 henrion founded lumina decision systems 1991 brian arnold lumina continued develop software apply environmental public policy analysis applications lumina first released analytica product 1996
[ 1908, 4759, 5571 ]
Test
5,146
4
CastleCops:castlecops castlecops volunteer security community focused making internet safer place services public free including malware rootkit cleanup infected computers malware phish investigations terminations searchable database lists malware file hashes targeted spammers throughout existence fought back using legal means defeat education collaborative information sharing among castlecops formerly known computer cops name change 2005 highest priorities achieved training volunteer staff anti-malware phishing rootkit academies additional services including castlecops forums news reviews continuing education castlecops consistently worked industry experts law enforcement reach ultimate goal securing safe smart computing experience everyone online castlecops reached five-year anniversary february 2007 accolades well-known computer security industry pundits players december 24 2008 website announced things come end castlecops ceased exist yet undisclosed reason later reported founder paul laudanski offered job microsoft however domain name remained active ever since albeit content order prevent purchased criminals castlecops malware databases well known security circles already moved systemlookup.com demise site
[ 6823 ]
Validation
5,147
2
Jean-loup_Gailly:jean-loup gailly jean-loup gailly author gzip wrote compression code portable archiver info-zip tools compatible pkzip archiver ms-dos worked zlib collaboration mark adler prefers write hyphenated first name j l ell capitalized wrote chapter fractal image compression mark nelson data compression book 1990 1995 designed real-time executive chorusos microkernel 1999 2001 cto mandrakesoft 2006 2014 worked google tech lead manager
[ 2334, 7058, 6380, 3219, 5021 ]
Validation
5,148
9
Saber_(software):saber software saber general purpose simulation program synopsys inc originally developed analogy inc. bought avanti corporation 2000 bought synopsys inc. saber began single-kernel analog simulation technology brought vhdl-ams verilog-ams spice saber-mast language single environment saber coupled digital simulators via calaveris algorithm
[ 4106, 5458 ]
Train
5,149
4
Authorization:authorization authorization function specifying access rights/privileges resources related information security computer security general access control particular formally authorize define access policy example human resources staff normally authorized access employee records policy usually formalized access control rules computer system operation system uses access control rules decide whether access requests authenticated consumers shall approved granted disapproved rejected resources include individual files item data computer programs computer devices functionality provided computer applications examples consumers computer users computer software hardware computer access control computer systems networks rely access policies access control process divided following phases policy definition phase access authorized policy enforcement phase access requests approved disapproved authorization function policy definition phase precedes policy enforcement phase access requests approved disapproved based previously defined authorizations modern multi-user operating systems include access control thereby rely authorization access control also uses authentication verify identity consumers consumer tries access resource access control process checks consumer authorized use resource authorization responsibility authority department manager within application domain often delegated custodian system administrator authorizations expressed access policies types policy definition application e.g form access control list capability policy administration point e.g xacml basis principle least privilege consumers authorized access whatever need jobs older single user operating systems often weak non-existent authentication access control systems anonymous consumers guests consumers required authenticate often limited authorization distributed system often desirable grant access without requiring unique identity familiar examples access tokens include keys certificates tickets grant access without proving identity trusted consumers often authorized unrestricted access resources system must verified access control system make access approval decision partially trusted guests often restricted authorization order protect resources improper access usage access policy operating systems default grant consumers full access resources others opposite insisting administrator explicitly authorizes consumer use resource even access controlled combination authentication access control lists problems maintaining authorization data trivial often represents much administrative burden managing authentication credentials often necessary change remove user authorization done changing deleting corresponding access rules system using atomic authorization alternative per-system authorization management trusted third party securely distributes authorization information public policy authorization feature trusted systems used security social control banking authorization hold placed customer account purchase made using debit card credit card publishing sometimes public lectures freely available texts published without approval author called unauthorized texts example 2002 'the theory everything origin fate universe collected stephen hawking lectures published without permission per copyright law
[ 3932, 374, 1461, 2566, 5392, 3293, 5401, 2219, 6823, 7570, 6483, 74, 5785, 6501, 3680, 3681, 6515, 4766, 4770, 6894, 5479, 7633, 1186, 5485, 2310, 3726, 4433, 1584, 4440, 6948, 533, 7319, 3448, 906, 917, 2747, 5571, 3794, 2404, 3486, 27...
Test
5,150
4
Anti-computer_forensics:anti-computer forensics anti-computer forensics sometimes counter forensics general term set techniques used countermeasures forensic analysis anti-forensics recently recognized legitimate field study within field study numerous definitions anti-forensics abound one widely known accepted definitions comes marc rogers purdue university rogers uses traditional crime scene approach defining anti-forensics attempts negatively affect existence amount and/or quality evidence crime scene make analysis examination evidence difficult impossible conduct abbreviated definition given scott berinato article entitled rise anti-forensics anti-forensics technology approach criminal hacking summed like make hard find impossible prove found neither author takes account using anti-forensics methods ensure privacy one personal data anti-forensics methods often broken several sub-categories make classification various tools techniques simpler one widely accepted subcategory breakdowns developed dr. marcus rogers proposed following sub-categories data hiding artifact wiping trail obfuscation attacks cf computer forensics processes tools attacks forensics tools directly also called counter-forensics within field digital forensics much debate purpose goals anti-forensic methods common conception anti-forensic tools purely malicious intent design others believe tools used illustrate deficiencies digital forensic procedures digital forensic tools forensic examiner education sentiment echoed 2005 blackhat conference anti-forensic tool authors james foster vinnie liu stated exposing issues forensic investigators work harder prove collected evidence accurate dependable believe result better tools education forensic examiner also counter-forensics significance defence espionage recovering information forensic tools serves goals spies equally well investigators data hiding process making data difficult find also keeping accessible future use obfuscation encryption data give adversary ability limit identification collection evidence investigators allowing access use common forms data hiding include encryption steganography various forms hardware/software based data concealment different data hiding methods makes digital forensic examinations difficult different data hiding methods combined make successful forensic investigation nearly impossible one commonly used techniques defeat computer forensics data encryption presentation gave encryption anti-forensic methodologies vice president secure computing paul henry referred encryption forensic expert nightmare majority publicly available encryption programs allow user create virtual encrypted disks opened designated key use modern encryption algorithms various encryption techniques programs make data virtually impossible read without designated key file level encryption encrypts file contents leaves important information file name size timestamps unencrypted parts content file reconstructed locations temporary files swap file deleted unencrypted copies encryption programs ability perform number additional functions make digital forensic efforts increasingly difficult functions include use keyfile full-volume encryption plausible deniability widespread availability software containing functions put field digital forensics great disadvantage steganography technique information files hidden within another file attempt hide data leaving plain sight steganography produces dark data typically buried within light data e.g. non-perceptible digital watermark buried within digital photograph experts argued use steganography techniques widespread therefore n't given lot thought experts agree steganography capability disrupting forensic process used correctly according jeffrey carr 2007 edition technical mujahid bi-monthly terrorist publication outlined importance using steganography program called secrets mujahideen according carr program touted giving user capability avoid detection current steganalysis programs use steganography conjunction file compression forms data hiding involve use tools techniques hide data throughout various locations computer system places include memory slack space hidden directories bad blocks alternate data streams hidden partitions one well known tools often used data hiding called slacker part metasploit framework slacker breaks file places piece file slack space files thereby hiding forensic examination software another data hiding technique involves use bad sectors perform technique user changes particular sector good bad data placed onto particular cluster belief forensic examination tools see clusters bad continue without examination contents methods used artefact wiping tasked permanently eliminating particular files entire file systems accomplished use variety methods include disk cleaning utilities file wiping utilities disk degaussing/destruction techniques disk cleaning utilities use variety methods overwrite existing data disks see data remanence effectiveness disk cleaning utilities anti-forensic tools often challenged believe completely effective experts n't believe disk cleaning utilities acceptable disk sanitization base opinions current dod policy states acceptable form sanitization degaussing see national industrial security program disk cleaning utilities also criticized leave signatures file system wiped cases unacceptable widely used disk cleaning utilities include dban srm bcwipe total wipeout killdisk pc inspector cyberscrubs cybercide another option approved nist nsa cmrr secure erase uses secure erase command built ata specification file wiping utilities used delete individual files operating system advantage file wiping utilities accomplish task relatively short amount time opposed disk cleaning utilities take much longer another advantage file wiping utilities generally leave much smaller signature disk cleaning utilities two primary disadvantages file wiping utilities first require user involvement process second experts believe file wiping programs n't always correctly completely wipe file information widely used file wiping utilities include bcwipe r-wipe clean eraser aevita wipe delete cyberscrubs privacysuite disk degaussing process magnetic field applied digital media device result device entirely clean previously stored data degaussing rarely used anti-forensic method despite fact effective means ensure data wiped attributed high cost degaussing machines difficult average consumer afford commonly used technique ensure data wiping physical destruction device nist recommends physical destruction accomplished using variety methods including disintegration incineration pulverizing shredding melting purpose trail obfuscation confuse disorient divert forensic examination process trail obfuscation covers variety techniques tools include log cleaners spoofing misinformation backbone hopping zombied accounts trojan commands one widely known trail obfuscation tools timestomp part metasploit framework timestomp gives user ability modify file metadata pertaining access creation modification times/dates using programs timestomp user render number files useless legal setting directly calling question files credibility another well known trail-obfuscation program transmogrify also part metasploit framework file types header file contains identifying information .jpg would header information identifies .jpg .doc would information identifies .doc transmogrify allows user change header information file .jpg header could changed .doc header forensic examination program operating system conduct search images machine would simply see .doc file skip past anti-forensic tools focused attacking forensic process destroying data hiding data altering data usage information anti-forensics recently moved new realm tools techniques focused attacking forensic tools perform examinations new anti-forensic methods benefited number factors include well documented forensic examination procedures widely known forensic tool vulnerabilities digital forensic examiners heavy reliance tools typical forensic examination examiner would create image computer disks keeps original computer evidence tainted forensic tools hashes created forensic examination software verify integrity image one recent anti-tool techniques targets integrity hash created verify image affecting integrity hash evidence collected subsequent investigation challenged use chassis intrusion detection feature computer case sensor photodetector rigged explosives self-destruction anti-forensic methods rely several weaknesses forensic process including human element dependency tools physical/logical limitations computers reducing forensic process susceptibility weaknesses examiner reduce likelihood anti-forensic methods successfully impacting investigation may accomplished providing increased training investigators corroborating results using multiple tools
[ 1998, 2813, 1715, 5561, 476, 3700, 6272, 2566, 7825, 5571, 8191, 4957, 33, 6020, 1756, 2857, 3644, 1020, 4523, 7110, 4536, 3823, 5254, 6488, 6327 ]
Validation
5,151
8
URL_shortening:url shortening url shortening technique world wide web uniform resource locator url may made substantially shorter still direct required page achieved using redirect links web page long url example url shortened url shortened often redirect domain name shorter original one friendly url may desired messaging technologies limit number characters message example sms reducing amount typing required reader copying url print source making easier person remember intention permalink november 2009 shortened links url shortening service bitly accessed 2.1 billion times uses url shortening beautify link track clicks disguise underlying address although disguising underlying address may desired legitimate business personal reasons open abuse url shortening service providers found spam blacklists use redirect services sites trying bypass blacklists websites prevent short redirected urls posted several reasons use url shortening often regular unshortened links may aesthetically unpleasing many web developers pass descriptive attributes url represent data hierarchies command structures transaction paths session information result urls hundreds characters long contain complex character patterns urls difficult memorize type-out distribute result long urls must copied-and-pasted reliability thus short urls may convenient websites hard copy publications e.g printed magazine book latter often requiring long strings broken multiple lines case e-mail software internet forums truncated twitter instant-messaging services limit number characters message carry however twitter shortens links automatically using url shortening service need use separate url shortening service shorten urls tweet services using url shortener allow linking web pages would otherwise violate constraint shortening services generate urls human-readable although resulting strings longer generated length-optimized service finally url shortening sites provide detailed information clicks link receives simpler setting equally powerful server-side analytics engine unlike latter require access server urls encoded two-dimensional barcodes qr code often shortened url shortener order reduce printed area code allow printing lower density order improve scanning reliability websites create short links make sharing links via instant messaging easier make cheaper send via sms done online web pages url shortening service batch demand may require use api well-known websites set url shortening services use example twitter t.co google g.co godaddy x.co url shortening every long url associated unique key part top-level domain name example key redirection treated equally redirection instruction sent browser contain header http status 301 moved permanently 302 found 307 temporary redirect 308 permanent redirect several techniques implement url shortening keys generated base 36 assuming 26 letters 10 numbers case character sequence alternatively uppercase lowercase letters differentiated character represent single digit within number base 62 26 26 10 order form key hash function made random number generated key sequence predictable users may propose custom keys example shortened protocols capable shortened 2011 although protocols http https ftp ftps mailto mms rtmp rtmpt ed2k pop imap nntp news ldap gopher dict dns addressed services url shortener typically urls supported security reasons combat attacks like xss session hijacking url shortening services support forwarding mailto urls alternative address munging avoid unwanted harvest web crawlers bots may sometimes done using short captcha-protected urls common makers url shorteners usually register domain names less popular esoteric top-level domains order achieve short url catchy name often using domain hacks results registration different url shorteners myriad different countries leaving relation country domain registered url shortener shortened links top-level domains countries libya .ly samoa .ws mongolia .mn malaysia .my liechtenstein .li used well many others cases political cultural aspects country charge top-level domain may become issue users owners usually case services may record inbound statistics may viewed publicly others many providers shortened urls claim never expire always implied small print —there contract breached free service regardless promises — permanent url necessarily good thing security implications obsolete short urls remain existence may circulated long cease point relevant even extant destination sometimes short url useful simply give someone telephone conversation one-off access file download longer needed within couple minutes url shorteners offer time-limited service expire specified period services available include ordinary easy-to-say word url lifetime 5 minutes 24 hours creation url expire specified date specified period creation very-short-lived url 5 characters typing smartphone restriction creator total number uses url password protection microsoft security brief recommends creation short-lived urls reasons explicitly security rather convenience early reference us patent 6957224 describes ... system method computer program product providing links remotely located information network remotely connected computers uniform resource locator url registered server shorthand link associated registered url associated shorthand link url logged registry database request received shorthand link registry database searched associated url shorthand link found associated url url fetched otherwise error message returned patent filed september 2000 patent issued 2005 us patent applications made public within 18 months filing another reference url shortening 2001 first notable url shortening service tinyurl launched 2002 popularity influenced creation least 100 similar websites although simply domain alternatives initially twitter automatically translated urls longer twenty-six characters using tinyurl although began using bit.ly instead 2009 later developed url shortening service t.co 14 august 2009 wordpress announced wp.me url shortener use referring wordpress.com blog post november 2009 shortened links bit.ly accessed 2.1 billion times around time bit.ly tinyurl widely used url-shortening services one service tr.im stopped generating short urls 2009 blaming lack revenue-generating mechanisms cover costs twitter default use bit.ly shortener questioning whether shortening services could profitable url shortening longer term resumed time closed shortest possible long-term urls generated nanourl december 2009 2011 associated top-level .to tonga domain form represents sequence random numbers letters 14 december 2009 google announced service called google url shortener goo.gl originally available use google products google toolbar feedburner extensions google chrome 21 december 2009 google introduced youtube url shortener youtu.be september 2010 google url shortener became available via direct interface goo.gl service provides analytics details qr code generator 30 march 2018 google announced turning support goo.gl coming weeks replacing firebase dynamic links although existing goo.gl links continue function main advantage short link fact short looks neat clean easily communicated entered without error limited extent may obscure destination url though easily discoverable may advantageous disadvantageous irrelevant short link expires terminated security advantages short urls often circumvent intended use top-level domains indicating country origin domain registration many countries requires proof physical presence within country although redirected url guarantee url shortening may utilized spammers illicit internet activities result many removed online registries shut web hosts internet service providers according tonic corporation registry .to domains serious keeping domains spam free may remove url shortening services registry service abused addition u.nu made following announcement upon closing operations google url-shortener discussion group frequently included messages frustrated users reporting specific shortened urls disabled reported spam study may 2012 showed 61 url shorteners shut 614 1002 common cause cited abuse spammers convenience offered url shortening also introduces potential problems led criticism use services short urls example subject linkrot shortening service stops working urls related service become broken legitimate concern many existing url shortening services may sustainable business model long term late 2009 internet archive started 301 works projects together twenty collaborating companies initially whose short urls preserved project shortened internet links typically use foreign country domain names therefore jurisdiction nation libya instance exercised control .ly domain october 2010 shut vb.ly violating libyan pornography laws failure predict problems url shorteners investment url shortening companies may reflect lack due diligence websites prevent short redirected urls posted april 2009 tinyurl reported blocked saudi arabia yahoo answers blocks postings contain tinyurls wikipedia accept links url shortening services articles reddit community strongly discourages subreddits outright bans url shortening services link submissions disguise origin domain name whether link previously submitted reddit legitimate reasons use link shorteners reddit link submissions sites adf.ly use number advertising techniques including interstitial advertising generate revenue may deter readers short url obscures target address used redirect unexpected site examples rickrolling redirecting shock sites affiliate websites short url allow blacklisted urls accessed bypassing site blocks facilitates redirection user blacklisted scam pages pages containing malware xss attacks tinyurl tries disable spam-related links redirecting zonealarm however warned users tinyurl may unsafe website known distribute spyware tinyurl countered problem offering option view link destination using shortened url ability installed browser via tinyurl website requires use cookies destination preview may also obtained prefixing word preview tinyurl url example destination revealed entering url shortening services provide similar destination display security professionals suggest users check short url destination accessing following instance shortening service cli.gs compromised exposing millions users security uncertainties several web applications display destination url shortened url url shortening services filter links bad-site screening services google safe browsing many sites accept user-submitted content block links however certain domains order cut spam reason known url redirection services often added spam blacklists another privacy problem many services shortened url format small enough vulnerable brute-force search many people use url shorteners share links private content fact many web services like google maps offered automatic generation shortened links driving directions reveal personal information like home addresses sensitive destinations like clinics specific diseases including cancer mental diseases addiction treatment centers abortion providers correctional juvenile detention facilities payday car-title lenders gentlemen ’ clubs etc short urls although making easier access might otherwise long url user-space isp server add additional layer complexity process retrieving web pages every access requires requests least one dns lookup though may cached one http/https request thereby increasing latency time taken access page also risk failure since shortening service may become unavailable another operational limitation url shortening services browsers resend post bodies redirect encountered overcome making service reverse proxy elaborate schemes involving cookies buffered post bodies techniques present security scaling challenges therefore used extranets internet-scale services open source commercial scripts also available redirecting shortening links usually written php web application plugin one popular applications wordpress scripts avoid many issues shortening services keep domain name part shortened link made private
[ 3935, 6790, 7047, 7249, 833, 740, 6029, 6297, 57, 1137, 6776, 80, 4198, 173, 84 ]
Test
5,152
0
BulNet:bulnet bulgarian wordnet bulnet lexical semantic network bulgarian following princeton wordnet pwn framework implements traditional semantic networks whose structure consists nodes relations nodes bulnet started within eu-funded project balkanet multilingual semantic network balkan languages directed construction synchronized semantic databases following balkan languages bulgarian greek romanian serbian turkish expansion czech lexical-semantic network balkanet completion development bulgarian wordnet continued within nationally funded projects bulnet lexical-semantic network bulgarian 2005-2010 language e-resources processing tools 2011-2013 latter co-funded project cesar central south-east european resources information communication technologies policy support programme call cip ict-psp-2010-4 currently bulgarian wordnet comprises 80,000 april 15 2015 synonym sets distributed nine parts speech nouns verbs adjectives adverbs pronouns prepositions conjunctions particles interjections words included bulgarian wordnet selected according different criteria main ones frequency analysis word occurrences large text corpora taking account number occurrences citation forms wordforms well inclusion synsets already featuring wordnets languages synsets correspond high-frequency word senses found parallel corpora synonym set synset encodes relation equivalence number lexical items literals least one explicitly represented synset unique meaning specified value sense pertain one part speech specified value pos represent one lexical meaning specified value def synset linked counterpart pwn 3.0 means unique identification number id common synsets balkan languages marked common concepts subsets bcs monolingual database synset linked least one synset intralingual relation non-obligatory information may also encoded examples usage stylistic peculiarities morphological syntactic properties author last edit details large number relations encoded bulgarian wordnet effectively illustrates language semantic derivational richness offers diverse opportunities numerous applications multilingual database bulgarian electronic semantic database offers linguistic solutions semantic level options synonym selection queries semantic relations word language lexical system antonymy holonymy etc explanatory definition queries translation equivalents lexical item bulgarian wordnet electronic multilingual dictionary synonym sets along explanatory definitions sets semantic relations words language hydra os-independent system designed wordnet development validation exploration program enables users browse edit number monolingual wordnets time individual wordnets synchronised equivalent synonym sets synsets may viewed explored parallel
[ 3159 ]
Validation
5,153
9
JavaPoly:javapoly javapoly library polyfills native jvm support within modern web browser allows websites import java libraries call directly javascript even user java installed computer unlike gwt teavm attempt compile subset java javascript javapoly actually executes java bytecode instructions means javapoly run almost java library including libraries use threads shared memory locking primitives 64-bit integers javapoly designed optimize performance taking advantage native jvms available running node.js javapoly always use native jvm thereby utilize native capabilities like multi-core support otherwise unavailable javascript applications similarly javapoly take advantage native java support within web browser support available suitable alternatives detected javapoly call doppio vm provides execution support legacy browsers
[ 562, 2451, 4759, 5571, 578 ]
Test
5,154
8
Open_Power_Template:open power template open power template web template engine written php 5 common strategy designing web application separation application logic i.e data processing presentation displaying data opt tool implementing separation presentation layer represented templates text files html code extra instructions controlling data substitution opt uses dedicated xml template language writing templates general-purpose domain-specific language primarily designed support simplify template-specific problems set declarative instructions instead implementing rendering algorithms statements like imperative programming template designer specifies expected result features aims ease costs efforts associated software development maintenance library provides object-oriented api based solutions popular frameworks first member bigger project open power libs built upon small opl core library provides basic features project started november 2004 template engine discussion board project inspired smarty later failed library became independent july 2006 version 1.0.0 released offered template language smarty-like syntax small set declarative instructions january 2007 developers release version 1.1.0 brings notable improvements pagination support tree rendering january 2008 developers form open-source programming team invenzzia develop opt php projects time development open power template 2.0 began last version 1.1 branch released may 2008 group focused opt 2.0 development new library went beta-stage december first stable version released july 2009 opt 2.0 template language xml application allows manipulate xhtml document structure features built-in xml parser reconfigured parse certain html documents plain text content since templates separated application logic need least two files first one contains presentation code xml template second one generates data configures library
[ 6029, 6489 ]
Validation
5,155
9
PrimeFaces:primefaces primefaces open-source user interface ui component library javaserver faces-based applications created turkish company primetek informatics initial development primefaces started late 2008 predecessor primefaces yui4jsf library set jsf components based yui javascript library yui4jsf got cancelled favor primefaces early 2009 since release primefaces strongly supported oracle particularly within netbeans world packt publishing publish books technology
[ 3915, 5571, 7347 ]
Validation
5,156
2
Bootsplash:bootsplash bootsplash also known bootscreen graphical representation boot process operating system bootsplash simple visualisation scrolling boot messages console also present graphics combinations unlike splash screens bootsplash necessarily designed marketing purposes enhance experience user eye candy provide user messages added advantage color-coding facility diagnose state system versions microsoft windows feature boot screen loaded startup process extra third-party utilities possible replace default windows boot screen custom images text and/or animations windows vista default boot screen represented green indeterminate progress indicator boot screen changed displays static image aurora text starting windows vista enabling gui boot option within windows system configuration utility msconfig.exe microsoft would update aurora image throughout lifecycle operating system starting first service pack altered match image displayed operating system hibernation screen windows 7 change boot screen although possible third-party utilities extremely risky may cause system unable boot also hidden aurora bootscreen removed
[ 2204, 4233, 5571, 5658, 6586, 4740, 2143, 2733, 6761, 2511, 1992 ]
Test
5,157
5
FreeS/WAN:frees/wan frees/wan free secure wide-area networking free software project implemented reference version ipsec network security layer linux project goal ubiquitous opportunistic encryption internet traffic realized although contribute general internet encryption project founded john gilmore administered duration hugh daniel john ioannidis angelos keromytis started codebase outside united states america prior autumn 1997 technical lead project henry spencer later michael richardson ike keying daemon pluto maintained d. hugh redelmeier ipsec kernel module klips maintained richard guy briggs sandy harris main documentation person project later claudia schmeing final frees/wan version 2.06 released 22 april 2004 earlier version 2.04 forked form two projects openswan strongswan openswan since 2012 forked libreswan
[ 2272, 7806, 2644, 651, 5571, 5488, 1559, 578, 4162, 8008, 3572, 7122, 6487, 7867, 4014, 2356 ]
Test
5,158
3
CDemu:cdemu cdemu free open-source virtual drive software designed emulate optical drive optical disc including cd-roms dvd-roms linux operating system cdemu available official repositories debian ubuntu fedora linux release available via official ppa ubuntu copr fedora linux cdemu consists software portable operating systems supported glib exceptions kernel module clients rely d-bus communication cdemu originally designed robert penz justus schwartz patch mplayer allowed mounting .cue/.bin files patch completed realized simplicity wrote module linux kernel originally cdemu named virtual cd name previously trademarked owners trademark requested use name june 2007 development cdemu 0.8 ceased rewrite developed instead work done rok mandeljc new version cdemu took another approach emulation much possible userspace june 2008 considered mostly stable version 2.0.0 cdemu supports following image formats emulator endeavors follow mmc-3 standard scsi optical drives closely possible ensuring realistic accurate emulation optical media emulated cdemu mounted within linux cdemu support cd subchannels cd-text isrc,mcn ecc/edc dpm/rmps also support limited number encrypted compressed image formats developers working supporting many major formats encourage users submit patches end alternative linux programs available repositories debian ubuntu fedora linux
[ 6984, 7584, 3915, 4759, 5571, 2657, 7306, 8092, 578 ]
Test
5,159
4
Deep_Freeze_(software):deep freeze software deep freeze faronics software application available microsoft windows macos operating systems allows system administrators protect core operating system configuration files workstation server restoring computer back saved configuration time computer restarted also known reboot restore software deep freeze also protect computer harmful malware since automatically deletes rather longer sees downloaded files computer restarted advantage using deep freeze uses system resources thus slow computer performance greatly disadvantage provide real-time protection therefore infected computer would restarted order remove malware deep freeze protects workstations fresh-booted state deep freeze prevents permanent tampering protected hard drives/partitions across reboots user activity restarts limited program example deep freeze prevent application installation user install modified version web browser seemingly harmless unknowing user designed secretly send users passwords server connected internet workaround deep freeze configured restart user logout shutdown chosen period inactivity restart/shutdown scheduled time attempt ensure installations retained rebooting system returns system original unmodified state deep freeze protect operating system hard drive upon installed computer booted another medium another bootable partition internal hard drive external hard drive usb device optical media network server cases user would real access contents supposedly frozen system windows-based computer scenario may prevented configuring cmos nonvolatile bios memory workstation boot hard drive protected password-protecting cmos normal precaution public access computers precaution would lock pc case shut physical lock tiedown cable system prevent access motherboard jumpers deep freeze protect hard drive partitions larger 2 tb capacity using ntfs
[ 3781, 5719, 4759, 5571, 1534, 3523, 2465 ]
Test
5,160
4
ElephantDrive:elephantdrive elephantdrive storage virtualization service used primarily online backup tool also remote access service/collaboration tool service runs windows mac platforms allows users create simple automated rules protecting data moving elephantdrive account elephantdrive makes use infrastructure-on-demand part architecture one first popular examples applications built amazon s3 simple storage service elephantdrive initially utilized amazon s3 tool datacenter migration quickly moved production infrastructure elephantdrive first major breakthrough came conjunction 2008 closing early cloud storage provider aol property xdrive service offered free tool migrating files xdrive platform simplifying process switching providers company turned focus network attached storage nas space designing deploying cloud storage optimized run natively nas devices series partnerships hardware makers initial partnership netgear storage product line readynas systems form co-branded embedded cloud backup service called readynas vault additional cloud storage nas integration launched hardware makers qnap thecus opted use elephantdrive brand opposed vault co-branding
[ 7838, 4594, 1254, 4759, 5571 ]
Test
5,161
2
Nemesis_(operating_system):nemesis operating system nemesis operating system designed university cambridge university glasgow swedish institute computer science citrix systems nemesis conceived multimedia uses mind microkernel environment application typically implemented number processes servers performing work behalf one client leads enormous difficulty accounting resource usage kernel-based system multimedia applications spend time kernel leading similar problems guiding principle design nemesis structure operating system way majority code could execute application process nemesis therefore extremely small lightweight kernel performed operating system functions shared libraries executed user process isas nemesis supports include x86 intel i486 pentium pentium pro pentium ii alpha arm strongarm sa-110 nemesis also runs evaluation boards 21064 21164
[ 1807, 4297, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 2226, 4347, 65, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 802, 4397, 6892, 5116, 2300, 126, 6907, 4786, 4423, 6197, 4061,...
Test
5,162
5
Konversation:konversation konversation internet relay chat irc client built kde platform free software released terms gnu general public license konversation currently maintained kde extragear network module means release cycle independent main kde applications default irc client many prominent linux distributions opensuse kde spin fedora kubuntu konversation supports ipv6 connections offers ssl server support supports blowfish encryption also supports identity management multiple server connections using separate identities different servers display multiple servers channels one window konversation features automatic utf-8 detection support different encodings different channels also features optional on-screen display osd message notifications save bookmarks channels servers konversation supports colors text decorations themable nicklist icons konversation also scriptable using shell scripts via d-bus includes support aliases action system automatic events also identifies different users conversation window choosing random color user
[ 4021, 4759, 5017, 7246, 4685, 6011, 578, 7463, 3722, 2415, 4891, 1674, 2142, 1691, 3915, 1989, 2706, 4461 ]
Test
5,163
2
DAVIX:davix davix live cd based slackware purposes computer security operations distribution focuses data analysis visualization davix stands data analysis visualization linux first live cd integrate many visualization tools long-term goal distribution provide good set tools supporting complete process visual data analysis jan monsch began work cd december 2007 discussions raffael marty january 2008 jan agreed produce cd applied security visualization based list utilities raffael discussed book davix contains collection 25 free tools data processing visualization examples tools davix cd ships 15 chapter manual covers davix use customization examples screenshots additionally utilities system documentation pages davix cd based slax computer information security visualization form visualization computer graphics enterprise environments computer security information generated large volumes become difficult analyze without visual context using davix security engineer visually spot anomalies network traffic changes ip sources/destinations network protocols application protocols traffic patterns frequency volume davix released black hat briefings/def con august 2008
[ 5200, 1629, 3444, 788, 7251, 2466, 474, 7075, 1941, 314, 5232, 2758, 1663, 2864, 588, 6209, 6761, 2063, 1594, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 7954, 6244, 1805 ]
Test
5,164
9
ML_(programming_language):ml programming language ml meta language general-purpose functional programming language roots lisp characterized lisp types known use polymorphic hindley–milner type system automatically assigns types expressions without requiring explicit type annotations ensures type safetythere formal proof well-typed ml program cause runtime type errors ml provides pattern matching function arguments garbage collection imperative programming call-by-value currying used heavily programming language research one languages completely specified verified using formal semantics types pattern matching make well-suited commonly used operate formal languages compiler writing automated theorem proving formal verification features ml include call-by-value evaluation strategy first-class functions automatic memory management garbage collection parametric polymorphism static typing type inference algebraic data types pattern matching exception handling ml uses static scoping rules ml referred impure functional language although encourages functional programming allow side-effects like languages lisp unlike purely functional language haskell like programming languages ml uses eager evaluation meaning subexpressions always evaluated though lazy evaluation achieved use closures thus one create use infinite streams haskell expression indirect ml strengths mostly applied language design manipulation compilers analyzers theorem provers general-purpose language also used bioinformatics financial systems ml developed robin milner others early 1970s university edinburgh whose syntax inspired iswim historically ml conceived develop proof tactics lcf theorem prover whose language pplambda combination first-order predicate calculus simply-typed polymorphic lambda calculus ml metalanguage today several languages ml family three prominent standard ml sml ocaml f ideas ml influenced numerous languages like haskell cyclone nemerle ats elm following examples use syntax standard ml ml dialects ocaml f differ small ways factorial function expressed pure ml describes factorial recursive function single terminating base case similar descriptions factorials found mathematics textbooks much ml code similar mathematics facility syntax part definition shown optional describes types function notation e read expression e type instance argument n assigned type integer int fac n int result applying fac integer n also type integer function fac whole type function integer integer int int fac accepts integer argument returns integer result thanks type inference type annotations omitted derived compiler rewritten without type annotations example looks like function also relies pattern matching important part ml programming note parameters function necessarily parentheses separated spaces function argument 0 zero return integer 1 one cases second line tried recursion executes function base case reached implementation factorial function guaranteed terminate since negative argument causes infinite descending chain recursive calls robust implementation would check nonnegative argument recursing follows problematic case n negative demonstrates use ml exception system function improved writing inner loop tail-recursive style call stack need grow proportion number function calls achieved adding extra accumulator parameter inner function last arrive following function reverses elements list precisely returns new list whose elements reverse order compared given list implementation reverse correct clear inefficient requiring quadratic time execution function rewritten execute linear time following efficient though less easy-to-read style notably function example parametric polymorphism consume lists whose elements type return lists type modules ml system structuring large projects libraries module consists signature file one structure files signature file specifies api implemented like c header file java interface file structure implements signature like c source file java class file example following define arithmetic signature implementation using rational numbers imported interpreter 'use command interaction implementation allowed via signature functions example possible create 'rat data object directly via code 'structure block hides implementation detail outside ml standard libraries implemented modules way
[ 1616, 6507, 5273, 4573, 5986, 283, 7333, 4302, 7713, 1450, 4039, 1825, 7717, 4135, 7071, 2740, 1549, 920, 8097, 6911, 7005, 7370, 7009, 666, 7385, 5506, 7391, 7296, 1313, 769, 160, 4543, 7680, 4737, 3753, 971, 2619, 7417 ]
Test
5,165
3
MultiProcessor_Specification:multiprocessor specification multiprocessor specification mps x86 architecture open standard describing enhancements operating systems firmware allow work x86-compatible processors multi-processor configuration mps covers advanced programmable interrupt controller apic architectures version 1.1 specification released april 11 1994 version 1.4 specification released july 1 1995 added extended configuration tables improve support multiple pci bus configurations improve expandability linux kernel freebsd known support intel mps utility called 'mptable used examine mps table motherboards since newer machines support advanced configuration power interface acpi subsumes mps functionality mps part supplanted acpi mps still useful machines operating systems support acpi
[ 584, 6647, 5431, 3173, 6675, 5571, 2498, 1770, 6616, 6523, 3139, 5669, 2332 ]
Test
5,166
7
Global_Information_Grid:global information grid global information grid gig all-encompassing communications project united states department defense defined globally interconnected end-to-end set information capabilities collecting processing storing disseminating managing information demand warfighters policy makers support personnel gig includes owned leased communications computing systems services software including applications data security services associated services national security systems non-gig information technology includes stand-alone self-contained embedded connected enterprise network new definition removes references national security systems defined section 5142 clinger-cohen act 1996 new definition removes references gig providing capabilities operating locations bases posts camps stations facilities mobile platforms deployed sites lastly definition removes part definition discusses interfaces coalition allied non-department defense users systems dod use term gig undergoing changes department deals new concepts cyberspace operations gig 2.0 joint staff j6 initiative department defense information enterprise die gig managed construct known netops netops defined operational framework consisting three essential tasks situational awareness sa command control c2 commander cdr united states strategic command usstratcom coordination dod global netops community employs operate defend gig ensure information superiority department defense information enterprise defined dod information resources assets processes required achieve information advantage share information across department defense mission partners includes network-centric warfare ncw doctrine represents fundamental shift military culture away compartmentalized war machines toward interconnected units operating cohesively tenets network centric warfare enterprise level forging new paths components military communicate ease logistics burdens improve communication combat effectiveness war fighter decrease instances confusion-related fratricide accelerate trend minimizing collateral damage hasten flow business warfighter situational awareness would improved tremendously linking sees overhead satellite sees fog war would lifted seamless communication unit members site detection devices commanders operating behind line improved coordination may also assist delivering appropriate firepower tangible assets first responders domestic attacks natural disasters worldwide
[ 545, 5255, 6251, 6603, 4804, 1844, 6786 ]
Validation
5,167
7
Wolf_Frameworks:wolf frameworks wolf frameworks web application designing development platform service based india united states represented via partners worldwide founded 2006 cloud computing infrastructure offered company enables users design deliver cross platform saas applications without writing technical code wolf 100 ajax xml .net based enables building mashable interoperable web applications using browser internet connection knowledge modelling business
[ 2961, 6986, 330, 2530, 2054 ]
Train
5,168
4
Geospatial_authentication:geospatial authentication software package designed allow authentication determining rover is/are within set boundaries specific area access critical geospatial information using gps signal structures means authenticate mobile devices network wirelessly real-time developed advantage lies system allows designated geospatial boundaries areas server geospatial authentication software two parts — server client server software virtual private network vpn developed linux operating system using perl programming language server stand-alone vpn server combined applications services client software gui windows ce software mobile graphical software allows users authenticate network purpose client software pass needed satellite information server authentication work done stacey d. lyle geospatial research innovation design nasa ’ stennis space center
[ 4014 ]
Train
5,169
5
RTP_Control_Protocol:rtp control protocol rtp control protocol rtcp sister protocol real-time transport protocol rtp basic functionality packet structure defined rfc 3550 rtcp provides out-of-band statistics control information rtp session partners rtp delivery packaging multimedia data transport media data primary function rtcp provide feedback quality service qos media distribution periodically sending statistics information transmitted octet packet counts packet loss packet delay variation round-trip delay time participants streaming multimedia session application may use information control quality service parameters perhaps limiting flow using different codec typically rtp sent even-numbered udp port rtcp messages sent next higher odd-numbered port rtcp provide flow encryption authentication methods mechanisms may implemented example secure real-time transport protocol srtp defined rfc 3711 rtcp provides basic functions expected implemented rtp sessions rtcp reports expected sent participants even multicast session may involve thousands recipients traffic increase proportionally number participants thus avoid network congestion protocol must include session bandwidth management achieved dynamically controlling frequency report transmissions rtcp bandwidth usage generally exceed 5 total session bandwidth furthermore 25 rtcp bandwidth reserved media sources times large conferences new participants receive cname identifiers senders without excessive delay rtcp reporting interval randomized prevent unintended synchronization reporting recommended minimum rtcp report interval per station 5 seconds stations transmit rtcp reports often every 5 seconds rtcp distinguishes several types packets sender report receiver report source description goodbye addition protocol extensible allows application-specific rtcp packets standards-based extension rtcp extended report packet type introduced rfc 3611 large-scale applications internet protocol television iptv long delays minutes hours rtcp reports may occur rtcp bandwidth control mechanism required control congestion see protocol functions acceptable frequencies usually less one per minute affords potential inappropriate reporting relevant statistics receiver cause evaluation media sender inaccurate relative current state session methods introduced alleviate problems rtcp filtering rtcp biasing hierarchical aggregation hierarchical aggregation also known rtcp feedback hierarchy optimization rtcp feedback model aim shift maximum number users limit together quality service qos measurement rtcp bandwidth constant takes 5 session bandwidth therefore reporting interval qos depends among others number session members large sessions become high minutes even hours however acceptable interval 10 seconds reporting bigger values would cause time-shifted inaccurate reported status current session status optimization made sender could even negative effect network qos conditions hierarchical aggregation used source-specific multicast single source allowed i.e iptv another type multicast could any-source multicast suitable large-scale applications huge number users modern iptv systems use hierarchical aggregation feedback target new type member firstly introduced internet draft draft-ietf-avt-rtcpssm-13 hierarchical aggregation method extended functionality function member receive receiver reports rr see rtcp retransmit summarized rr packets so-called receiver summary information rsi sender case single level hierarchy
[ 7148, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7169, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 7091, 3383, 3640, 2219, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880 ]
Test
5,170
7
Foundation_network:foundation network relayware formerly foundation network vendor partner relationship management prm solutions delivers businesses internet using software service model foundation network founded 1997 former business consultant technologist simon wallace-jones later year company secured first global customer 3com network infrastructure vendor april 2008 foundation network announced release relayware 8 next-generation prm software foundation network became relayware 2010 established headquarters redwood shores california usa
[ 330 ]
Validation
5,171
9
Esoteric_programming_language:esoteric programming language esoteric programming language sometimes shortened esolang programming language designed test boundaries computer programming language design proof concept software art hacking interface another language particularly functional programming procedural programming languages joke use esoteric distinguishes languages programming languages working developers use write software usually esolang creators intend language used mainstream programming although esoteric features visuospatial syntax inspired practical applications arts languages often popular among hackers hobbyists usability rarely goal esoteric programming language designers—often design leads quite opposite usual aim remove replace conventional language features still maintaining language turing-complete even one computational class unknown earliest still canonical example esoteric language intercal designed 1972 woods james m. lyon stated intention unlike programming language authors familiar parodied elements established programming languages day fortran cobol assembly language many years intercal represented paper copies intercal manual language revival 1990 implementation c unix stimulated wave interest intentional design esoteric computer languages 1993 wouter van oortmerssen created false small stack-oriented programming language syntax designed make code inherently obfuscated confusing unreadable also compiler 1024 bytes inspired urban müller create even smaller language now-infamous brainfuck consists eight recognized characters along chris pressey befunge like false two-dimensional instruction pointer brainfuck one best-supported esoteric programming languages canonical examples minimal turing tarpits needlessly obfuscated language features brainfuck related p′′ family turing machines turing tarpit turing-complete programming language computable function could theoretically written impractically difficult esoteric languages may described turing tarpits especially aim minimize number language features method encoding programs substring encoding instruction single instruction always includes two sequential phases choosing operation executing list operations may either static—as remorse thrat—or dynamic—as remorse4ever example based remorse thrat paradigm language fall number categories categories used get general understanding way specific language operates include imperative languages brainfuck instructions describe change data functional languages unlambda data code less interchangeable execution repeated application functions results functions rewriting languages thue transformation functions applied initial state funge esoteric programming language models programs metric spaces coordinate systems often necessarily cartesian execute instructions located points program space moving instruction pointer position vector indicates currently executing instruction space different instructions determine direction instruction pointer moves consequently sequence instructions executed current official standard behaviour programming languages funge-98 specification specification generalisation semantics befunge programming language two-dimensional toroidal topology languages adhere closely standard unefunge one-dimensional trefunge three-dimensional sometimes called funges distant relatives differ significant respects referred fungeoids one instruction set computer machine supports one operation deterministic language one given current state program next state always predicted true nondeterministic language languages deterministic languages befunge supply built-in randomization instruction moreover languages java2k randomized instructions thus getting even trivial programs reliable output often monumental outright impossible task nondeterministic languages used explore large search spaces grammars exhaustive search impractical random text generators dada engine rmutt examples kind nondeterminstic language esoterically nondeterministic algorithms employed theoretical investigation hypercomputation characteristic examples esoteric programming languages arnoldc esoteric programming language based one-liners arnold schwarzenegger following hello world programmed arnoldc showtime talk hand hello world terminated asciidots esoteric programming language based ascii art language dots represented periods codice_1 travel ascii art paths undergo operations example code golf counter 1/ befunge allows instruction pointer roam multiple dimensions code example following program displays hello world pushing characters reverse order onto stack printing characters loop circulates clockwise instructions codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 binary lambda calculus designed algorithmic information theory perspective allow densest possible code minimal means featuring 29 byte self interpreter 21 byte prime number sieve 112 byte brainfuck interpreter brainfuck designed extreme minimalism leads obfuscated code programs containing eight distinct characters following program outputs hello world chef david morgan-mar stack-oriented programming language designed make programs look like cooking recipes programs consist title list variables data values list stack manipulation instructions joking design principle states program recipes generate valid output easy prepare delicious morgan-mar notes example hello world program 101 eggs 111 cups oil would produce lot food one person false stack-based language single-character commands variables example 3 1 calculated evaluating λ x → x 1 3 fim++ object-oriented programming language based television show fim++ programs read like plain english style show 'friendship reports following program prints hello world fim++ supports many modern language features interfaces inheritance importing files uniquely variable names contain spaces fim++ dear princess celestia hello world today learned say hello world said hello world say hello world faithful student twilight sparkle fractran program ordered list positive fractions together initial positive integer input formula_1 program run multiplying integer formula_1 first fraction formula_3 list formula_4 integer integer formula_1 replaced formula_4 rule repeated fraction list produces integer multiplied formula_1 program halts fractran invented mathematician john conway .gertrude named gertrude stein designed gerson kurz enable programs vaguely resemble poetry programs golfscript consist lists items pushed onto stack encountered exception variables code blocks value case code executed grass functional programming language uses characters codice_8 codice_9 codice_4 thus programs grass said look like ascii art grass grass formal specification based untyped lambda calculus secd machine grass confused grass different programming language intercal short compiler language pronounceable acronym created 1972 parody satirize aspects various programming languages time jsfuck esoteric programming style javascript code written using six characters codice_11 codice_12 codice_13 codice_14 codice_15 codice_16 unlike brainfuck requires compiler interpreter jsfuck valid javascript code meaning jsfuck programs run web browser engine interprets javascript lolcode designed resemble speech lolcats following hello world example lolcode frequently criticized esoteric rather ordinary procedural language unusual vocabulary lollipop church esoteric programming language programs look like russian guide books lollipop church designed shakila tayefeh 7 april 2019 following hello world example gulfoffinland hello world malbolge 8th circle hell designed difficult esoteric programming language among features code self-modifying design effect instruction depends address memory modiscript esoteric programming language entirely consists quotes indian prime minister narendra modi speeches language follows many ideologies import rule importation code allowed consistent make india campaign following code prints mandir wahin banayenge mitrooon bjp governed state hai sp opposition hai agar ye sach hai nahi toh achhe din aa gaye piet language designed david morgan-mar whose programs bitmaps look like abstract art compilation guided pointer moves around image one continuous coloured region next procedures carried pointer exits region 20 colours behaviour specified 18 colourful colours ordered 6-step hue cycle 3-step brightness cycle black white ordered exiting colourful colour entering another one performed procedure determined number steps change hue brightness black entered pointer tries enter black region rules choosing next block changed instead possible rules tried program terminates regions outside borders image also treated black white perform operations allows pointer pass behaviour colours 20 specified left compiler interpreter variables stored memory signed integers single stack specified procedures deal operations stack others input/output rules compilation pointer moves piet named dutch painter piet mondrian originally intended name mondrian already taken pikachu esoteric programming language developed nilabhro datta whose programs look like dialect pikachu stated purpose easily usable pikachu programs written language readable writable pikachu end pikachu makes use 3 valid syntax elements codice_17 codice_18 codice_19 rockstar designed creating computer programs also song lyrics heavily influenced lyrical conventions 1980s hard rock power ballads dynamically typed turing-complete following example line code multiplies value codice_20 codice_21 stores codice_22 shakespeare designed make programs look like shakespearean plays example following statement declares point program reached via goto-type statement train completely visual programming language looks like wooden train set engines threads train cars memory cargo cars variables train contains multiple data types including blocks numbers colors dinosaurs stations operate cargo e.g increment decrement add subtract catapult type specific wyes direct flow trains include greater less prompt random magic tunnels allow creation functions unlike programming languages distinction code memory output train program state defined arrangement train pieces unlambda minimalist functional programming language based ski calculus combined first-class continuations imperative i/o input usually requiring use continuations whitespace uses whitespace characters space tab return ignoring characters reverse many traditional languages distinguish different whitespace characters treating tab space also allows whitespace programs hidden source code programs languages like c. ~ath esoteric programming language used humans trolls webcomic homestuck name spoken tilde ath pun til death known insufferable work despite relative simplistic syntax language compile using infinite loops context story capability import change objects wide library author universe wide range combined inability interact anything short lifespan leads files tied long-term events deaths characters universes ~ath also sensitive color text written accepts unusual characters one ~ath program shown story uses command called bifurcate split program red text blue text another ~ath program contains character appears animated flickering billiard ball ~ath code simplest language code deviating pattern compile cultural context esolangs studied people like geoff cox writes esolangs shift attention command control toward cultural expression refusal seeing esolangs similar code art code poetry mez breeze mezangelle daniel temkin describes brainfuck refusing ease boundary human expression assembly code thereby taking us ludicrous journey logic exposing inherent conflict human thinking computer logic connects programming within esolang performing event score fluxus movement playing rules logic code makes point view language clear
[ 6507, 1908, 2451, 6789, 6882, 3772, 3944, 3852, 6712, 7256, 3966, 1102, 1016, 666, 7557, 7658, 2866, 4078, 336, 7210, 6497, 6498, 2803, 1803, 5190 ]
Test
5,172
9
WMLScript:wmlscript wmlscript procedural programming language dialect javascript used wml pages part wireless application protocol wap wmlscript client-side scripting language similar javascript like javascript wmlscript used tasks user input validation generation error message dialog boxes etc wmlscript based ecmascript european computer manufacturers association script javascript standardized version thus syntax wmlscript similar javascript fully compatible despite syntactical similarities two different languages wmlscript objects array javascript hand allows declare include external functions scripts wmlscript optimised low power devices compiled language
[ 183, 884, 2451, 4755, 6172, 3092, 5998, 2658, 7734, 313, 3719, 2040, 6368, 237, 54, 3398, 2870, 6660, 422, 340, 3663, 7861, 6400, 7687, 4101, 4287 ]
Test
5,173
9
Yoix:yoix computer programming yoix high-level general-purpose interpreted dynamic programming language yoix interpreter implemented using standard java technology without add-on packages requires sun-compliant jvm operate initially developed labs researchers internal use available free open source software since late 2000 1998 java technology still emerging swing toolkit add-on package interruptible i/o regular expressions printf capability yet features java web start developed moreover java scripting languages largely non-existent time groovy jruby yet invented jython created late 1997 browsers 1998 limited feature sets unstable production use 8-hour shift still fighting skirmishes browser wars environment yoix technology created response pressing need reliable easy distribute maintain gui front-end mission-critical application developed within namely global fraud management system day monitors tracks fraud activity related voice traffic expanding networks wireline wireless ip yoix technology first released public late 2000 open source initiative common public license v1.0 yoix name came partially fox hunting cry encouragement hounds partially echo another familiar four-letter name ends ix partially avoid many false-positives google search yoix technology provides pure java programming language implementation general purpose dynamic programming language developed researchers labs syntax grammar easy learn familiar c programming language java end-user yoix application indistinguishable java application application developer yoix provide simpler coding experience working java directly much like writing perl code simpler writing c code yoix language object oriented language makes use 165 object types provide access standard java classes yoix interpreter built entirely using java technology means yoix applications cross-platform gui-capable network thread friendly yet yoix developers find insulated complex error-prone parts coding functionality directly java use reflection access java functionality thus adds value simplifying access functionality also improving application reliability coding java glitches complicated java features one-time behind-the-scenes yoix language includes safe pointers addressing declarations global local variables addition supporting native user functions users add builtin functions written java two central elements yoix design borrowed postscript language dictionaries language components permissions-protected dictionaries exposed system components homage tcl language exposure philosophy also given though direct influence another key yoix design element involves pointers addressing pointers pointer arithmetic yoix language syntactically similar found c language yoix implementation prevents using pointer outside bounds addition address operator always produces valid usable result overall yoix design attempted make language easy learn programmers experienced c java languages yoix distribution includes yoix web application instant template ywait software framework building yoix web application yoix web application resides web server downloaded piecemeal run-time as-needed basis yoix interpreters running client machines model analogous familiar model client web browsers downloading website piecemeal as-needed run-time permits simple efficient distribution maintenance applications relies ubiquitous web server yoix interpreter building web application using ywait framework requires standard unix tools available modern operating systems linux mac os x microsoft windows help add-on packages u/win client side ywait-based application relies yoix interpreter thus platform independent running wherever java runs yoix software development philosophy aims keep things simple eschewing popular tendency multiple embedded specialized languages ywait framework permits easy incremental screen development simple logical source tree hierarchy development yoix web application reduced basics command prompt text editor ide enthusiasts may nonplussed small beautiful approach software development highly effective practice addition role tool building gui applications yoix technology supports several modes data visualization data visualization module called ydat yoix data analysis tool included public yoix distribution since release 2.1.2 ydat uses data manager component coordinate data display filtering among several visualization components include event plot graph drawing pane histogram filters tabular detail ydat able display graphs generated graphviz graph drawing layout tool another open source tool freely available labs ydat highly configurable yoix language level image screenshot yoix ydat instantiation example used analyze vehicle auction transactions yoix technology provides good support graph drawing addition graph display mentioned part ydat module data types yoix language support building manipulating traversing graph structures native yoix functions support dot language output built-in dot language parser facilitate interaction graphviz layout engines ychart data visualization toolkit added yoix distribution release 2.2.0 ychart allows one organize display cells data two interactive ychart applications contained yoix distribution periodic table elements unicode chart program demonstrate using ychart variable width cells might occur schedule also available yoix distribution yoix distribution also includes yoix package called byzgraf rendering basic data plots line charts histograms statistical box plots currently implemented yoix language interpreted means example probably right choice computationally intensive applications unless one codes computations java module extension similarly excessive looping also display limitations interpreted language focus language interactive standalone client/server gui data visualization applications yoix technology free software licensed open source initiative common public license yoix registered trademark inc.. 1 extract html directives home page write standard output 2 build display gui two buttons titled frame i.e. window also titled border one button pops message pressed quits example window sized automatically fit components additional code calculates location put center screen making visible 3 code shown used generate yoix logo image png format seen language description box near top page command-line arguments allow size image specified well select png image output display on-screen window
[ 790, 6507, 5983, 3172, 4759, 5571, 6016, 578, 1102, 3915, 6497, 6778, 1803, 1435 ]
Test
5,174
2
Nokia_N73:nokia n73 nokia n73 smartphone announced nokia 25 april 2006 part nseries started shipping 24 july n73 succeeded n70 packed numerous multimedia features features 3.2 megapixel autofocus camera front camera then-large 2.4 inch display stereo speakers relatively slim pocketable size form runs symbian v9.1 s60 3rd edition became one top selling nseries devices 2006 2007 high popularity helped nokia sales 'multimedia phones grow 28 year-on-year q3 2007 according nokia top selling line n70 n95 common nokia 'nseries 'eseries phones time late 2006 n73 comes loaded many software applications including contacts messaging picture video galleries music player visual fm radio realplayer im client wap browser full web browser based khtml/webkit microsoft office document viewer pdf viewer adobe flash lite viewer games majority applications support background execution example one may listen music browsing internet may switch write text message e-mail without close applications exception newer sony ericsson phones like k550 w610 smartphones typically limited way example music player run background java applications well symbian s60 release 3 applications installed removed phone user using either nokia pc suite software included phone installer application phone n73 uses database system supplied 'gallery applications permanently run background order reduce seek operation times databases updated locally device means supported image video audio files placed almost anywhere file system browsed easily case mp3 audio files id3 tag e.g 'album 'artist etc. notably nokia supports firmware upgrades n73 made user via module nokia pc suite directly over-the-air besides original edition nokia released three variants n73 addition basic n73 nokia subsequently released n73 'music edition 'multimedia button keypad replaced button starts music player phone music edition also includes 2gb memory card phone completely black music player music edition supports album art visualisations regular n73 music player application stays background time even music played later firmware versions application terminated prevents music edition remote control working application started using phone keypad 'n73 internet edition essentially music edition retaining 'multimedia button function rather dedicated 'music button 'n73 internet edition available middle east north africa nokia also released another model n73 called 'n73 special edition middle east north africa phone released muslim holy month ramadan 2007 phone hardware editions n73 comes pre-loaded islamic applications phone completely white nokia also released n73 special edition indonesia without pre-loaded islamic applications three versions n73 appear updated software update 26 june 2007 updates standard n73 music player version music edition enhanced music player detailed keeping 'multimedia button function essentially making internet edition 2008 updates standard features nokia maps application installed default requires external bluetooth gps receiver nokia lifeblog ptt search applications carried previous updates plus addition nokia mobile tv application also installed default requires external nokia mobile tv receiver su-33w application available n77 camera much improved earlier firmware update phone takes 27 seconds boot compared 42 previous versions also n73 20 mb ram available boot little change users may able install n-gage application modified work n73 making better compared multimedia keypad rather single usage button features music player like supports album art visualizations enhanced control interface also available start screen menu key pressed hold phone boots also recent uk nokia poster campaigns black version phone advertised without term 'music edition o2 uk shop sells n73 silver/plum black black version multimedia button rather music button
[ 1066, 5979, 2271, 3082, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 6440, 7545, 6015, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 2415, 3039, 365...
Train
5,175
5
Modulation:modulation electronics telecommunications modulation process varying one properties periodic waveform called carrier signal modulating signal typically contains information transmitted radio systems 20th century used frequency modulation fm amplitude modulation radio broadcast modulator device performs modulation demodulator sometimes detector demod device performs demodulation inverse modulation modem modulator–demodulator perform operations aim analog modulation transfer analog baseband lowpass signal example audio signal tv signal analog bandpass channel different frequency example limited radio frequency band cable tv network channel aim digital modulation transfer digital bit stream analog communication channel example public switched telephone network bandpass filter limits frequency range 300–3400 hz limited radio frequency band analog digital modulation facilitate frequency division multiplexing fdm several low pass information signals transferred simultaneously shared physical medium using separate passband channels several different carrier frequencies aim digital baseband modulation methods also known line coding transfer digital bit stream baseband channel typically non-filtered copper wire serial bus wired local area network aim pulse modulation methods transfer narrowband analog signal example phone call wideband baseband channel schemes bit stream another digital transmission system music synthesizers modulation may used synthesize waveforms extensive overtone spectrum using small number oscillators case carrier frequency typically order much lower modulating waveform see frequency modulation synthesis ring modulation synthesis analog modulation modulation applied continuously response analog information signal common analog modulation techniques include digital modulation analog carrier signal modulated discrete signal digital modulation methods considered digital-to-analog conversion corresponding demodulation detection analog-to-digital conversion changes carrier signal chosen finite number alternative symbols modulation alphabet simple example telephone line designed transferring audible sounds example tones digital bits zeros ones computers may however communicate telephone line means modems representing digital bits tones called symbols four alternative symbols corresponding musical instrument generate four different tones one time first symbol may represent bit sequence 00 second 01 third 10 fourth 11 modem plays melody consisting 1000 tones per second symbol rate 1000 symbols/second 1000 baud since tone i.e. symbol represents message consisting two digital bits example bit rate twice symbol rate i.e 2000 bits per second similar technique used dial-up modems opposed dsl modems according one definition digital signal modulated signal digital signal according another definition modulation form digital-to-analog conversion textbooks would consider digital modulation schemes form digital transmission synonymous data transmission would consider analog transmission fundamental digital modulation techniques based keying qam in-phase signal one example cosine waveform quadrature phase signal q example sine wave amplitude modulated finite number amplitudes summed seen two-channel system channel using ask resulting signal equivalent combination psk ask methods phases frequencies amplitudes assigned unique pattern binary bits usually phase frequency amplitude encodes equal number bits number bits comprises symbol represented particular phase frequency amplitude alphabet consists formula_1 alternative symbols symbol represents message consisting n bits symbol rate also known baud rate formula_2 symbols/second baud data rate formula_3 bit/second example alphabet consisting 16 alternative symbols symbol represents 4 bits thus data rate four times baud rate case psk ask qam carrier frequency modulated signal constant modulation alphabet often conveniently represented constellation diagram showing amplitude signal x-axis amplitude q signal y-axis symbol psk ask sometimes also fsk often generated detected using principle qam q signals combined complex-valued signal jq j imaginary unit resulting called equivalent lowpass signal equivalent baseband signal complex-valued representation real-valued modulated physical signal so-called passband signal rf signal general steps used modulator transmit data receiver side demodulator typically performs common digital communication systems design modulator demodulator must done simultaneously digital modulation schemes possible transmitter-receiver pair prior knowledge data encoded represented communications system digital communication systems modulator transmitter demodulator receiver structured perform inverse operations non-coherent modulation methods require receiver reference clock signal phase synchronized sender carrier signal case modulation symbols rather bits characters data packets asynchronously transferred opposite coherent modulation common digital modulation techniques msk gmsk particular cases continuous phase modulation indeed msk particular case sub-family cpm known continuous-phase frequency shift keying cpfsk defined rectangular frequency pulse i.e linearly increasing phase pulse one-symbol-time duration total response signaling ofdm based idea frequency-division multiplexing fdm multiplexed streams parts single original stream bit stream split several parallel data streams transferred sub-carrier using conventional digital modulation scheme modulated sub-carriers summed form ofdm signal dividing recombining help handling channel impairments ofdm considered modulation technique rather multiplex technique since transfers one bit stream one communication channel using one sequence so-called ofdm symbols ofdm extended multi-user channel access method orthogonal frequency-division multiple access ofdma multi-carrier code division multiple access mc-cdma schemes allowing several users share physical medium giving different sub-carriers spreading codes different users two kinds rf power amplifier switching amplifiers class amplifiers cost less use less battery power linear amplifiers output power however work relatively constant-amplitude-modulation signals angle modulation fsk psk cdma qam ofdm nevertheless even though switching amplifiers completely unsuitable normal qam constellations often qam modulation principle used drive switching amplifiers fm waveforms sometimes qam demodulators used receive signals put switching amplifiers automatic digital modulation recognition intelligent communication systems one important issues software defined radio cognitive radio according incremental expanse intelligent receivers automatic modulation recognition becomes challenging topic telecommunication systems computer engineering systems many civil military applications moreover blind recognition modulation type important problem commercial systems especially software defined radio usually systems extra information system configuration considering blind approaches intelligent receivers reduce information overload increase transmission performance obviously knowledge transmitted data many unknown parameters receiver signal power carrier frequency phase offsets timing information etc. blind identification modulation made fairly difficult becomes even challenging real-world scenarios multipath fading frequency-selective time-varying channels two main approaches automatic modulation recognition first approach uses likelihood-based methods assign input signal proper class another recent approach based feature extraction term digital baseband modulation digital baseband transmission synonymous line codes methods transfer digital bit stream analog baseband channel a.k.a lowpass channel using pulse train i.e discrete number signal levels directly modulating voltage current cable serial bus common examples unipolar non-return-to-zero nrz manchester alternate mark inversion ami codings pulse modulation schemes aim transferring narrowband analog signal analog baseband channel two-level signal modulating pulse wave pulse modulation schemes also allow narrowband analog signal transferred digital signal i.e. quantized discrete-time signal fixed bit rate transferred underlying digital transmission system example line code modulation schemes conventional sense since channel coding schemes considered source coding schemes cases analog-to-digital conversion techniques analog-over-analog methods analog-over-digital methods
[ 1443, 7241, 2099, 6524, 3956, 7813, 8184, 5387, 2114, 731, 1375, 2117, 740, 4970, 8108, 3724, 7569, 3314, 5777, 2149, 768, 5693, 5175, 1988, 84 ]
Test
5,176
1
Diablo_Data_Systems:diablo data systems diablo data systems division xerox created acquisition diablo systems inc. us 29 million 1972 company founded 1969 george e. comstock charles l. waggoner others company best known hytype hytype ii diablo 630 daisywheel printers also produced hard disk drives resold dec rk02 rk03 removable disk drives used xerox manufactured xerox alto computer
[ 4721 ]
Test
5,177
4
Supplemental_access_control:supplemental access control supplemental access control sac set security features defined icao protecting data contained electronic travel documents e.g electronic passports sac specifies password authenticated connection establishment pace protocol supplements improves icao basic access control bac pace like bac prevents two types attacks implementation pace begins third generation electronic passports eu members must implement pace electronic passports end 2014 states sake global interoperability must implement pace without implementing bac inspection systems implement pace use supported mrtd chip thus important global interoperability achieved make enhancement reliable document verification process achieve interoperability called interoperability tests results last test focusing sac describe current state implementation field version 1.1 april 2014 icao supplemental access control technical report introduces chip authentication protocol alternative active authentication integrates pace achieving new protocol chip authentication mapping pace-cam allows faster execution separate protocols
[ 7461 ]
Validation
5,178
9
Programmable_Macro_Language:programmable macro language programmable macro language pml domain specific language developed aveva enable customisation plant marine design products pml file-based interpreted language enables application developer design microsoft windows form-based add-ins included within aveva product plant design management system pdms pml originated computer-aided design centre cadcentre established cambridge uk 1967 uk ministry technology cadcentre later became aveva carried great deal early pioneering cad research early staff members went become prominent worldwide cad community brothers dick martin newell cadcentre arguably important single factor transformation cambridge one world high technology centers within years late 1970s early 1980s pml language facilitates customisation plant design management system pdms system may used industries marine offshore onshore oil gas chemical process plants mining currently three iterations pml language following pml code prints classic hello world string pdms command window define function helloworld endfunction code defines new pml function called helloworld takes parameters returns value simply assigns string 'hello world local variable calls p command print text command window within pdms order example work code placed inside file called helloworld.pmlfnc extension mandatory filename function name pml case sensitive file placed inside directory pdms searches pml code initialization process
[ 4759 ]
Test
5,179
8
Web_Services_Modeling_Language:web services modeling language wsml web service modeling language formal language provides syntax semantics web service modeling ontology wsmo words wsml provides means formally describe wsmo elements ontologies semantic web services goals mediators wsml based logical formalisms description logic first-order logic logic programming
[ 2122, 1024, 7290, 5631 ]
Test
5,180
7
Gestigon:gestigon gestigon stylized gestigon software development company founded september 2011 sascha klement erhardt barth thomas martinetz company develops software solutions gesture control body tracking based 3d depth data gestigon developing augmented reality automotive solutions audi renault volkswagen company also working ar/vr headsets well consumer electronics smart home devices march 2017 gestigon acquired valeo french automotive supplier sascha klement worked student assistant ph.d. student professors thomas martinetz erhardt barth developing software solutions based time-of-flight sensors university lübeck since 2002 together founded gestigon 2011 seed-funding high-tech gründerfonds mittelständische beteiligungsgesellschaft schleswig-holstein local business angels march 2012 moritz von grotthuss joined company advisor later became ceo considered late-founder month gestigon received innovation award cebit 2012 one 15 startups receive award 276 candidates january 2013 gestigon participated ces las vegas later year also techcrunch disrupt new york city next year visteon volkswagen used gestigon gestures solutions products presented ces 2014 cebit 2014 “ cebit innovation award ” public displays gestigon technologies include audi ces 2015 ces 2016 volkswagen infineon gestigon launched virtual reality solution carnival techcrunch disrupt san francisco september 2015 using oculus rift different depth sensors first demo using mobile device done ces 2015 gestigon partnered several companies develop hardware solutions especially depth sensors provide sensing solutions 2015 gestigon partnered inuitive 3d computer vision image processors developer create vr unit system presented ces 2016 assembled oculus rift development kit july 2015 gestigon closed series financing round nbr technology ventures gmbh primary investor headed fabian von kuenheim financing round company received additional investments high-tech gründerfonds vorwerk direct selling ventures march 2017 gestigon developed software recognizes driving gestures gestigon develops software works 3d sensors recognize human gestures poses biometrical features real time gecko feature tracker developed company tracks individual measuring biometric features flamenco software finger hand gesture control gestigon developed carnival sdk software augmented reality virtual reality allows users see use hands virtual interfaces gestigon solutions based skeleton recognition software recognizes body parts 3d data making recognition faster accurate software sensor agnostic work based data depth module using time-of-flight- stereo- structured light technologies
[]
Validation
5,181
5
MAC_address:mac address media access control address mac address device unique identifier assigned network interface controller nic communications within network segment used network address ieee 802 network technologies including ethernet wi-fi bluetooth within open systems interconnection osi model mac addresses used medium access control protocol sublayer data link layer typically represented mac addresses recognizable six groups two hexadecimal digits separated hyphens colons separator see notational conventions mac address may referred burned-in address also known ethernet hardware address hardware address physical address confused memory physical address network node multiple nics must unique mac address sophisticated network equipment multilayer switch router may require one permanently assigned mac addresses mac addresses often assigned manufacturer network interface cards stored hardware card read-only memory firmware mechanism mac address typically includes manufacturer organizationally unique identifier oui mac addresses formed according principles two numbering spaces based extended unique identifiers eui managed institute electrical electronics engineers ieee eui-48 replaces obsolete term mac-48 eui-64 original ieee 802 mac address comes original xerox network systems ethernet addressing scheme 48-bit address space contains potentially 2 281,474,976,710,656 possible mac addresses ieee manages allocation mac addresses originally known mac-48 refers eui-48 identifiers ieee target lifetime 100 years 2080 applications using eui-48 space restricts applications accordingly ieee encourages adoption plentiful eui-64 non-ethernet applications distinction eui-48 mac-48 identifiers name application mac-48 used address hardware interfaces within existing 802-based networking applications eui-48 used 802-based networking also used identify devices software example bluetooth ieee considers mac-48 obsolete term eui-48 used cases addition eui-64 numbering system originally encompassed mac-48 eui-48 identifiers simple translation mechanism translations since deprecated individual address block iab inactive registry activity replaced ma-s ma-s previously named oui-36 registry product january 1 2014 iab uses oui ma-l ma-l registry previously named oui registry term oui still use calling registry belonging ieee registration authority concatenated 12 additional ieee-provided bits total 36 bits leaving 12 bits iab owner assign 4096 individual devices iab ideal organizations requiring 4096 unique 48-bit numbers eui-48 unlike oui allows assignee assign values various different number spaces example eui-48 eui-64 various context-dependent identifier number spaces individual address block could used assign eui-48 identifiers potential uses based oui iabs allocated reserved remain property ieee registration authority also noted 2007 september 2012 oui value 00:50 c2 used iab assignments september 2012 value 40 d8:55 used owners already assigned iab may continue use assignment another registry called ma-m mac addresses medium ma-m assignment block provides 2 eui-48 identifiers 2 eui-64 identifiers means first 28 bits ieee assigned bits first 24-bits assigned ma-m block oui assigned ieee reassigned addresses either universally administered addresses uaa locally administered addresses laa universally administered address uniquely assigned device manufacturer first three octets transmission order identify organization issued identifier known organizationally unique identifier oui remainder address three octets eui-48 five eui-64 assigned organization nearly manner please subject constraint uniqueness locally administered address assigned device network administrator overriding burned-in address universally administered locally administered addresses distinguished setting second-least-significant bit first octet address bit also referred u/l bit short universal/local identifies address administered bit 0 address universally administered 1 address locally administered example address first octet 06 hex binary form 00000110 second-least-significant bit 1 therefore locally administered address another example uses locally administered addresses decnet protocol mac address ethernet interface changed decnet software reflects decnet network address xx.yy host eliminates need address resolution protocol since mac address decnet host simply determined least significant bit address first octet 0 zero frame meant reach one receiving nic type transmission called unicast unicast frame transmitted nodes within collision domain modern wired setting collision domain usually length ethernet cable two network cards wireless setting collision domain receivers detect given wireless signal switch know port leads given mac address switch forward unicast frame ports except originating port action known unicast flood node matching hardware mac address accept frame network frames non-matching mac-addresses ignored unless device promiscuous mode least significant bit first octet set 1 frame still sent however nics choose accept based criteria matching mac address example based configurable list accepted multicast mac addresses called multicast addressing ieee built several special address types allow one network interface card addressed one time examples group addresses opposed individual addresses least significant bit first octet mac address distinguishes individual addresses group addresses bit set 0 individual addresses set 1 group addresses group addresses like individual addresses universally administered locally administered following network technologies use eui-48 identifier format every device connects ieee 802 network ethernet wifi eui-48 address common networked consumer devices pcs smartphones tablet computers use eui-48 addresses eui-64 identifiers used broadcast networks ethernet mac address expected uniquely identify node segment allows frames marked specific hosts thus forms basis link layer osi layer 2 networking upon upper layer protocols rely produce complex functioning networks many network interfaces support changing mac address unix-like systems command utility ifconfig may used remove add link address aliases instance active ifconfig directive may used netbsd specify attached addresses activate hence various configuration scripts utilities permit randomization mac address time booting establishing network connection changing mac addresses necessary network virtualization mac spoofing practiced exploiting security vulnerabilities computer system modern operating systems apple ios android especially mobile devices designed randomize assignment mac address network interface scanning wireless access points avert tracking systems internet protocol ip networks mac address interface corresponding ip address may queried address resolution protocol arp ipv4 neighbor discovery protocol ndp ipv6 relating osi layer 3 addresses layer 2 addresses according edward snowden us national security agency system tracks movements mobile devices city monitoring mac addresses avert practice apple started using random mac addresses ios devices scanning networks vendors followed quickly mac address randomization scanning added android starting version 6.0 windows 10 linux kernel 3.18 actual implementations mac address randomization technique vary largely different devices moreover various flaws shortcomings implementations may allow attacker track device even mac address changed instance probe requests elements timing random mac addresses used researchers confirmed possible link real identity particular wireless mac address using wireless access points ssid-hidden mode network cloaking mobile wireless device may disclose mac address traveling even mac addresses associated ssids device already connected configured send part probe request packets alternative modes prevent include configuring access points either beacon-broadcasting mode probe-response ssid mode modes probe requests may unnecessary sent broadcast mode without disclosing identity previously-known networks standard ieee 802 format printing eui-48 addresses human-friendly form six groups two hexadecimal digits separated hyphens transmission order e.g form also commonly used eui-64 e.g conventions include six groups two hexadecimal digits separated colons e.g three groups four hexadecimal digits separated dots e.g transmission order standard notation also called canonical format mac addresses written transmission order least significant bit byte transmitted first used output codice_1 codice_2 codice_3 commands example however since ieee 802.3 ethernet ieee 802.4 token bus send bytes octets wire left-to-right least significant bit byte first ieee 802.5 token ring ieee 802.6 fddi send bytes wire significant bit first confusion may arise address latter scenario represented bits reversed canonical representation example address canonical form would transmitted wire bits codice_4 standard transmission order least significant bit first token ring networks would transmitted bits codice_5 most-significant-bit first order latter might incorrectly displayed referred bit-reversed order non-canonical form msb format ibm format token ring format explained
[ 7876, 1812, 6088, 6093, 7534, 7177, 3287, 7910, 3301, 4342, 5058, 3314, 430, 1140, 2617, 456, 4387, 458, 2999, 7623, 7982, 5480, 1942, 5492, 5138, 7272, 1571, 500, 5850, 1213, 5519, 4451, 530, 4099, 5181, 4836, 4464, 2714, 3766, 6976, 5...
Test
5,182
4
HijackThis:hijackthis hijackthis also hijackthis hjt free open-source tool detect malware adware microsoft windows originally created merijn bellekom later sold trend micro program notable quickly scanning user computer display common locations malware rather relying database known spyware hijackthis used primarily diagnosis malware remove detect spyware—as uninformed use removal facilities cause significant software damage computer browser hijacking cause malware installed computer february 16 2012 trend micro released hijackthis source code open source available sourceforge site hijackthis generate plain-text logfile detailing entries finds entries fixed hijackthis inexperienced users advised exercise caution seek help using latter option except small whitelist known safe entries hijackthis discriminate legitimate unwanted items hijackthis attempts create backups files registry entries fixes used restore system event mistake common use post logfile forum experienced users help decipher entries need removed automated tools also exist analyze saved logs attempt provide recommendations user clean entries automatically use tools however generally discouraged specialize manually dealing hijackthis logs consider tools dangerous inexperienced users neither accurate reliable enough substitute consulting trained human analyst later versions hijackthis include additional tools task manager hosts-file editor alternate-data-stream scanner 2002 2003 entrepreneur glenn bluff owner computer hope uk made several attempts buy hijackthis led joint development hijackpro professional version hijackthis built-in capabilities kill processes similar killbox hijackpro 2.3 million downloads illegal download site 2003 2004 found sites claiming hijackthis free hijackpro sold touchstone software phoenix technologies 2007 integrated driveragent.com along glenn bluff company drivermagic.com
[ 6254, 4759, 5571, 2054, 88 ]
Validation
5,183
1
Eighteenth_Century_Collections_Online:eighteenth century collections online eighteenth century collections online ecco digital collection books published great britain 18th century gale education publishing company united states assembled collection digitally scanning microfilm reproductions 136,291 titles documents scanned 2002 added second collection ecco ii january 2014 ecco ii comprises 46,607 titles far 2,231 texts released free public work university michigan ’ text creation partnership rather ocr rekey texts tag tei aim enable improved access fraction collection making sgml/xml text editions 10,000 books addition free version subscription access also offered text analytic tools available subset text analysis portal research project one text creation partners university oxford converted public domain texts free publicly accessible versions accordance text encoding initiative p5 guidelines makes available variety file formats including html epub via oxford text archive cross-search also available proquest subscribe early english books online ecco
[ 4089 ]
Test
5,184
7
Fruux:fruux fruux cross-platform synchronization service operated fruux company behind popular open source project sabredav service enables users synchronize address book contacts calendar events tasks bookmarks notes apple computers devices web app also allows manage contacts calendars tasks browser fruux synchronization uses encrypted ssl transfers fruux supports conflict resolution helps users data changed one computer choose correct dataset fruux runs entirely amazon web services infrastructure company uses amazon elastic load balancing amazon elastic compute cloud amazon ec2 amazon elastic block store amazon ebs run nginx web servers amazon simple storage service amazon s3 fruux ’ choice versioned application code backup storage addition fruux uses amazon relational database service amazon rds manage central databases amazon simple email service ses highly scalable bulk transactional email-sending service service similar services icloud plaxo fruux supports synchronization mainly contacts calendar events items wide array devices services company recently announced launch calendar syncing ios caldav capable devices also offering contact synchronization ios carddav capable devices company released device management layer may 2012 working special offering teams another distinguishing feature recently released calendar sharing feature allows users invite people calendars possibility set individual permissions gives first glimpse future team offering fruux secured six-figure seed round march 2012 led high-tech gründerfonds
[ 7838, 2291, 1912, 5571, 5064 ]
Test