node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
5,185 | 4 | John_Herivel:john herivel john william jamieson herivel 29 august 1918 – 18 january 2011 british science historian former world war ii codebreaker bletchley park codebreaker concerned cryptanalysis enigma herivel remembered chiefly discovery soon dubbed herivel tip herivelismus herivelismus consisted idea herivel tip method establishing whether applied using herivel square based herivel insight habits german operators enigma cipher machine allowed bletchley park easily deduce part daily key brief critical period may 1940 herivel tip conjunction cillies another class operator error main technique used solve enigma war herivel became academic studying history philosophy science queen university belfast particularly isaac newton joseph fourier christiaan huygens retirement wrote autobiographical account work bletchley park entitled herivelismus german military enigma john herivel born belfast attended methodist college belfast 1924 1936 1937 awarded kitchener scholarship study mathematics sidney sussex college cambridge supervisor gordon welchman welchman recruited herivel government code cypher school gc cs bletchley park welchman worked alan turing newly formed hut 6 section created solve army air force enigma herivel aged 21 arrived bletchley 29 january 1940 briefed enigma alan turing tony kendrick time herivel started work bletchley park hut 6 limited success enigma-enciphered messages mostly luftwaffe enigma network known red working alongside david rees another cambridge mathematician recruited welchman nearby elmers school testing candidate solutions working plugboard settings process slow however herivel determined find method improve attack would spend evenings trying think ways intercepted morse coded messages enciphered germans ’ enigma electro-mechanical rotor cipher machine implemented polyalphabetic cipher main model use 1940 three rotors set electrical pathway keyboard lampboard pressing key caused one lamp light right-most rotor advance one letter position changed electrical pathway pressing key caused different letter light one 26 positions notch right-most rotor engaged middle rotor two rotors advanced together similarly middle rotor would engage left-most rotor giving long period sequence repeated 26 × 26 × 26 17,576 ring rotor contained notch caused next rotor advance could set one 26 positions three rotors selected set five giving 60 different ways mounting rotors machine however germans laid rule rotor position successive days previous days rotors positions known number reduced 32 enigma machine worked reciprocally identical machine identical settings would fed enciphered letters show deciphered letters lampboard hut 6 enigma replica machines logically identical machines germans using decipher intercepted messages required selection rotors ring settings plugboard connections known time first three letters prelude message used indicator tell receiving operator letters appear windows particular message herivel insight february 1940 lazy german code clerks might give away enigma ring settings ringstellung first message day several lazy clerks first message grundstellung would random would clustering around ringstellung insight became known herivel tip needed time luftwaffe doubly-enciphering message keys techniques zygalski sheets could used may 1940 germans stopped doubly-enciphered keys methods becoming ineffective bletchley park started using herivel tip break luftwaffe traffic continued main method bombe delivered august 1940 rotors positioning ring containing notch changed daily settings defined codebook common operators network start day messages sent received enigma operators implemented day rotor selection ring settings selected three rotors adjusted ring settings could done rotors mounted axle inserted machine possible adjust ring settings loaded rotors moving spring-loaded retaining pin right turning rotor display specified letter herivel thought likely least operators would adjust rings mounted rotors machine set alphabet rings closed lid operator moved rotors well away positions displayed three letters ring setting windows operators herivel great insight came one evening february 1940 relaxing front landlady fire stressed lazy operators set rings rotors machine might left ring setting near top used three letters first message day transmitted message sending operator would follow standard procedure september 1938 would use initial position encrypt indicator send clear followed message key enciphered setting ground setting gkx example would use enigma rotors set gkx encrypt message setting might choose rtq might encrypt llp may 1940 encrypted message setting repeated makes difference herivel insight operator would turn rotors rtq encrypt actual message thus preamble message would unencrypted ground setting gkx followed encrypted message setting llp receiving enigma operator could use information recover message setting decrypt message ground setting gkx example chosen random herivel reasoned operators lazy hurry otherwise pressure might simply use whatever rotor setting currently showing machine first message day operator set ring settings rotors already inside machine rotor position currently showing machine could well ring setting close situation occurred example gkx would ring setting close polish cryptographers used idea pc bruno phoney war day insight herivel colleagues agreed idea possible way enigma hut 6 began looking effect predicted herivel tip arranged first messages day transmitting station sent early plotted indicators grid termed herivel square example shown rows columns grid labelled alphabet first indicator first message day received station network entered grid done finding column corresponding first letter row corresponding second letter entering third letter cell row column intersected example gkx would recorded entering x cell column g row k. herivel tip suggested would cluster entries close together cluster around gkx example would narrow options ring settings 17,576 small set possibilities perhaps 6 30 could tested individually effect predicted herivel immediately show enigma traffic however bletchley park continue rely different technique get enigma method perforated sheets passed polish cryptologists situation changed 1 may 1940 germans changed indicating procedure rendering perforated sheet method obsolete hut 6 suddenly unable decrypt enigma fortunately codebreakers pattern predicted herivel tip began manifest soon 10 may germans invaded netherlands belgium david rees spotted cluster indicators 22 may air force message sent 20 may decoded first since change procedure although herivel tip provided enigma ring settings provide parts enigma key rotor order plugboard settings luftwaffe key time chose 5 rotors 60 possible rotor orders addition might 8 10 plugboard connections means 6 26 letters permuted plugboard codebreakers use methods find remaining portions enigma key herivel tip used combination another class operator mistake known cillies solve settings decipher messages herivel tip used several months specialised codebreaking machines designed alan turing so-called bombes ready use gordon welchman wrote herivel tip vital part breaking enigma bletchley park importance contribution herivel singled introduced winston churchill visit bletchley park also taught enigma cryptanalysis party americans assigned hut 6 intensive two-week course herivel later worked administration newmanry section responsible solving german teleprinter ciphers using machine methods colossus computers assistant head section mathematician max newman 2005 researchers studying set enigma-encrypted messages world war ii noted occurrence clustering predicted herivel tip messages august 1941 end war herivel taught mathematics school year found could handle rumbustious boys joined queen university belfast became reader history philosophy science one students supervised actor simon callow said published books articles isaac newton joseph fourier christiaan huygens publications include 1978 retired oxford became fellow souls college retirement published died oxford 2011 survived daughter josephine herivel | [
6372,
1641,
3241,
1353,
5185,
5796
] | Validation |
5,186 | 4 | TIMEnavigator:timenavigator atempo time navigator also known tina backup recovery solution atempo major unix linux windows mac os platforms supported | [
2390,
1254
] | Test |
5,187 | 4 | Carbanak:carbanak carbanak apt-style campaign targeting limited financial institutions claimed discovered 2014 russian/uk cyber crime company kaspersky lab said used steal money banks microsoft windows malware said introduced targets via phishing emails hacker group said stolen 900 million dollars 140 billion dollars reports banks thousand private customers criminals able manipulate access respective banking networks order steal money variety ways instances atms instructed dispense cash without locally interact terminal money mules would collect money transfer swift network criminals ’ accounts kaspersky said carbanak group went far alter databases pump balances existing accounts pocketing difference unbeknownst user whose original balance still intact intended targets primarily russia followed united states germany china ukraine according kaspersky lab one bank lost 7.3 million atms programmed spew cash certain times henchmen would collect separate firm 10 million taken via online platform kaspersky lab helping assist investigations countermeasures disrupt malware operations cybercriminal activity investigations provide technical expertise analyzing infection vectors malicious programs supported command control infrastructure exploitation methods fireeye published research tracking activities referring group fin7 including sec-themed spear phishing campaign proofpoint also published research linking group bateleur backdoor expanded list targets u.s.-based chain restaurants hospitality organizations retailers merchant services suppliers others beyond initial financial services focus march 26th 2018 europol claimed arrested mastermind carbanak associated cobalt cobalt strike group alicante spain investigation led spanish national police cooperation law enforcement multiple countries well private cybersecurity companies group campaigns appear continued however hudson bay company breach using point sale malware recently attributed group controversy exists around carbanak attacks seemingly described several months earlier report internet security companies group-ib russia fox-it netherlands dubbed attack anunak anunak report shows also greatly reduced amount financial losses according statement issued fox-it release new york times article compromise banks outside russia match research also interview conducted russian newspaper kommersant controversy claims kaspersky lab group-ib come light group-ib claims banks outside russia ukraine hit activity outside region focused point sale systems reuters issued statement referencing private industry notification issued fbi usss united states secret service claiming received reports carbanak affected financial sector two representative groups us banking industry fs-isac aba american bankers association interview bank technology news say us banks affected | [
704,
5452,
4025,
7328,
1528,
4759,
2991,
7799,
7066,
376,
1173,
6526,
998,
3528,
3277,
2923,
7818,
5922,
3864,
6628,
6904,
1376,
6541,
6194,
1383,
2854,
3875,
7600,
2587,
2678,
3038,
4531,
2054,
600,
1307,
3047,
6569,
2693,
1043,
3323,
... | Test |
5,188 | 7 | GlobalEnglish:globalenglish globalenglish corporation american technology company founded 1997 reece duca stephen patrick martin rice used owned pearson plc bought back management globalenglish provides on-demand enterprise solutions support global business performance effective business english communication company headquartered silicon valley california company announced pending acquisition pearson plc lse pson may 2012 all-cash transaction officially acquired pearson july 5 2012.. november 10 2016 company acquired pearson management | [
330
] | Test |
5,189 | 4 | Icy_(application):icy application icy discontinued package manager jailbroken iphone ipod touch originally created maintained ripdev allows users browse download mobile apps range sources apps available download free requiring purchase downloading including software created ripdev kate apps downloaded directly iphone ipod touch generally located codice_1 directory place apple native apps located icy project closed october 24 2009 source code released mit license icy installer taken two development teams weamdev infini-dev icy intended alternative cydia source unofficial apps since development installer.app created nullriver discontinued purpose developing icy create package manager used apt method used cydia therefore making icy compatible cydia sources faster lightweight cydia icy project closed october 24 2009 source code released mit license icy project picked weamdev latest version beta 2.3 support ios 7 group called infini dev also taken project reviving icy created version ripdev source code called icy version 1.5.1 icy 1.4.7 added support ipad development member sammy guichelaar icy development halted early 2014 support ios 9 infini-dev dropped icy support order support installer x package manager legacy devices | [
6788,
3940,
3612,
4320,
4690,
734,
6125,
2954,
1123,
6847,
6142,
2609,
1895,
5091,
4749,
7601,
3342,
2284,
1940,
2300,
3025,
2665,
2327,
6565,
2331,
3050,
4820,
6582,
1234,
889,
2368,
552,
7335,
3445,
3107,
5571,
5579,
1654,
1656,
1657,
... | Validation |
5,190 | 3 | Machine_code:machine code machine code computer program written machine language instructions executed directly computer central processing unit cpu instruction causes cpu perform specific task load store jump alu operation one units data cpu registers memory machine code strictly numerical language intended run fast possible may regarded lowest-level representation compiled assembled computer program primitive hardware-dependent programming language possible write programs directly machine code tedious error prone manage individual bits calculate numerical addresses constants manually reason programs rarely written directly machine code modern contexts may done low level debugging program patching especially assembler source available assembly language disassembly overwhelming majority practical programs today written higher-level languages assembly language source code translated executable machine code utilities compilers assemblers linkers important exception interpreted programs translated machine code however interpreter may seen executor processor performing instructions source code typically consists directly executable machine code generated assembly high-level language source code machine code definition lowest level programming detail visible programmer internally many processors use microcode optimise transform machine code instructions sequences micro-ops generally considered machine code per se every processor processor family instruction set instructions patterns bits physical design correspond different commands machine thus instruction set specific class processors using mostly architecture successor derivative processor designs often include instructions predecessor may add additional instructions occasionally successor design discontinue alter meaning instruction code typically needed new purposes affecting code compatibility extent even nearly completely compatible processors may show slightly different behavior instructions rarely problem systems may also differ details memory arrangement operating systems peripheral devices program normally relies factors different systems typically run machine code even type processor used processor instruction set may instructions length may variable-length instructions patterns organized varies strongly particular architecture often also type instruction instructions one opcode fields specifies basic instruction type arithmetic logical jump etc actual operation add compare fields may give type operand addressing mode addressing offset index actual value constant operands contained instruction called immediates machines individual instructions explicit operands accumulator machine combined left operand result implicit accumulator arithmetic instructions architectures 8086 x86-family accumulator versions common instructions accumulator regarded one general registers longer instructions stack machine operands implicit stack special purpose instructions also often lack explicit operands cpuid x86 architecture writes values four implicit destination registers instance distinction explicit implicit operands important code generators especially register allocation live range tracking parts good code optimizer track implicit well explicit operands may allow frequent constant propagation constant folding registers register assigned result constant expression freed replacing constant code enhancements computer program list instructions executed central processing unit program execution done order cpu executing solve specific problem thus accomplish specific result simple processors able execute instructions one another superscalar processors capable executing variety different instructions program flow may influenced special 'jump instructions transfer execution instruction numerically following one conditional jumps taken execution continues another address execution continues next instruction depending condition much readable rendition machine language called assembly language uses mnemonic codes refer machine code instructions rather using instructions numeric values directly example zilog z80 processor machine code codice_1 causes cpu decrement codice_2 processor register would represented assembly language codice_3 mips architecture provides specific example machine code whose instructions always 32 bits long general type instruction given op operation field highest 6 bits j-type jump i-type immediate instructions fully specified op r-type register instructions include additional field funct determine exact operation fields used types rs rt rd indicate register operands shamt gives shift amount address immediate fields contain operand directly example adding registers 1 2 placing result register 6 encoded load value register 8 taken memory cell 68 cells location listed register 3 jumping address 1024 computer architectures machine code implemented even fundamental underlying layer called microcode providing common machine language interface across line family different models computer widely different underlying dataflows done facilitate porting machine language programs different models example use ibm system/360 family computers successors dataflow path widths 8 bits 64 bits beyond nevertheless present common architecture machine language level across entire line using microcode implement emulator enables computer present architecture entirely different computer system/360 line used allow porting programs earlier ibm machines new family computers e.g ibm 1401/1440/1460 emulator ibm s/360 model 40 machine code generally different bytecode also known p-code either executed interpreter compiled machine code faster direct execution exception processor designed use particular bytecode directly machine code case java processors machine code assembly code sometimes called native code referring platform-dependent parts language features libraries harvard architecture computer architecture physically separate storage signal pathways code instructions data today processors implement separate signal pathways performance reasons implement modified harvard architecture support tasks like loading executable program disk storage data executing harvard architecture contrasted von neumann architecture data code stored memory read processor allowing computer execute commands point view process code space part address space code execution stored multitasking systems comprises program code segment usually shared libraries multi-threading environment different threads one process share code space along data space reduces overhead context switching considerably compared process switching pamela samuelson wrote machine code unreadable united states copyright office identify whether particular encoded program original work authorship however us copyright office allow copyright registration computer programs program machine code sometimes decompiled order make functioning easily understandable humans cognitive science professor douglas hofstadter compared machine code genetic code saying looking program written machine language vaguely comparable looking dna molecule atom atom | [
3930,
708,
5012,
4662,
6078,
6079,
1445,
7515,
3944,
6428,
3623,
7533,
5381,
7541,
2567,
3966,
1102,
1854,
4703,
4705,
5055,
7557,
6118,
410,
5771,
421,
4361,
4003,
2251,
74,
4009,
6497,
6498,
6159,
6507,
1908,
2630,
458,
2633,
4397,
51... | Test |
5,191 | 2 | Uniform_Type_Identifier:uniform type identifier uniform type identifier uti text string used software provided apple inc. uniquely identify given class type item apple provides built-in utis identify common system objects – document image file types folders application bundles streaming data clipping data movie data – allows third party developers add utis application-specific proprietary uses support utis added mac os x 10.4 operating system integrated spotlight desktop search technology uses utis categorize documents one primary design goals utis eliminate ambiguities problems associated inferring file content mime type filename extension type creator code utis use reverse-dns naming structure names may include ascii characters a-z a-z 0-9 hyphen period unicode characters u+007f colons slashes prohibited compatibility macintosh posix file path conventions utis support multiple inheritance allowing files identified number relevant types appropriate contained data one difficulties maintaining user-accessible operating system establishing connections data types applications processes effectively use data example file contains picture data particular compression format opened processed applications capable handling picture data applications must able identify compression type used order extract work data early computer systems – particularly dos variants versions windows – file associations maintained file extensions three four character code following file name instructs system open file particular applications beginning system 1 macintosh operating systems attached type codes creator codes part file metadata four-character codes designed specify application created file creator code specific type file type code applications could easily open process file data however type creator codes extended flexibility system — particular type file restricted opening particular application — suffered many problems file extensions type creator codes could lost files transferred across non-macintosh systems unix-based servers plethora type codes made identification problematic addition classic mac os recognize file extensions leading unrecognized file errors files transferred dos/windows systems openstep formed basis mac os x used extensions early versions mac os x followed suit led controversy users developers coming os x next windows origins advocating continued use file extensions coming classic mac os urging apple replace supplement file extensions type creators file identification types exist example mime types used identifying data transferred web however apple uti system designed create flexible file association system would describe data hierarchically allow better categorization searching standardize data descriptions across contexts provide uniform method expanding data types instance public.jpeg public.png utis inherit public.image uti allowing users search narrowly jpeg images png images broadly kind image merely changing specificity uti used search application developers design new data types easily extend utis available example new image format developed company may uti com.company.proprietary-image specified inherit public.image type apple macos continues support forms file association contains utilities translating use utis preference available apple maintains public domain set base data types utis utis associated base utis conformance system similar class inheritance utis conform utis share basic types general application works data general uti able work data uti conforms general uti basic public utis apple hierarchy follows utis even used identify file type identifiers dynamic utis created needed applications prefix dyn take form uti-compatible wrapper around otherwise unknown filename extension mime type ostype apple provides large collection system-declared uniform type identifiers third-party applications add utis database maintained macos exporting utis declared within application package new utis declared conform existing system utis declarations associate new utis file extensions exported declaration alone provide operating system enough information enable new functions enabling quick look new file types get uti given file use mdls meta data list part spotlight command terminal | [
7517,
3940,
713,
4690,
734,
2214,
405,
6832,
3989,
2597,
3322,
1502,
7584,
5786,
4740,
1897,
6505,
2627,
7609,
1171,
5109,
2284,
1178,
6188,
1187,
1562,
6909,
6548,
1955,
502,
6557,
2679,
510,
6565,
2329,
6221,
3050,
163,
6582,
169,
553... | Train |
5,192 | 6 | Archivemount:archivemount archivemount fuse-based file system unix variants including linux purpose mount archives e.g tar tar.gz etc mount point read written file system makes accessing contents archive may compressed transparent programs without decompressing | [
8092,
1435,
5571
] | Test |
5,193 | 4 | Black_bag_operation:black bag operation black bag operations black bag jobs covert clandestine entries structures obtain information human intelligence operations usually entails breaking entering denied areas tactics techniques procedures associated black bag operations lock picking safe cracking key impressions fingerprinting photography electronic surveillance including audio video surveillance mail manipulation flaps seals forgery host related skills term black bag refers small bag burglars carry tools black bag operations federal bureau investigation fbi agents entered offices targeted individuals organizations photographed information found records practice used fbi 1942 1967 july 1966 fbi director j. edgar hoover ordered practice discontinued use black bag jobs fbi declared unconstitutional united states supreme court 19 june 1972 plamondon case united states v. u.s. district court 407 u.s. 297 fbi still carries numerous black bag entry-and-search missions search covert target investigation informed search took place investigation involves criminal matter judicial warrant required national security cases operation must approved foreign intelligence surveillance court example 1947 american spy elizabeth bentley defected soviet underground started talking fbi fbi broke brooklyn hotel black-bag job verify background – look anything otherwise found nothing ordinary bentley learned dodge intrusions earliest days underground learned determine enemy agents discovered secret documents possession leave apartment careful put black trunk tie thin black thread around would know tampered absence cia used black-bag operations steal cryptography secrets foreign government offices outside united states practice preceding u.s. intelligence organisations dates back least far 1916 | [
4184,
1071,
104
] | Test |
5,194 | 4 | Cain_and_Abel_(software):cain abel software cain abel often abbreviated cain password recovery tool microsoft windows recover many kinds passwords using methods network packet sniffing cracking various password hashes using methods dictionary attacks brute force cryptanalysis attacks cryptanalysis attacks done via rainbow tables generated winrtgen.exe program provided cain abel cain abel maintained massimiliano montoro sean babcock virus scanners browsers e.g chrome 20.0.1132.47 detect cain abel malware avast detects win32 cain-b tool classifies potentially dangerous program microsoft security essentials detects win32/cain 4_9_14 classifies tool program potentially unwanted behavior even cain install directory well word cain added avast exclude list real-time scanner known stop cain functioning however latest version avast longer blocks cain | [
5272,
4759,
2823,
7715,
1928,
7626,
7170,
3700,
7534,
726,
5571,
2408,
7207,
3486,
6574,
1593,
2337,
6157,
7868,
4746,
4208
] | Test |
5,195 | 2 | Asus_Zen_UI:asus zen ui asus zen ui stylized asus zenui front-end touch interface developed asus partners featuring full touch user interface current version zenui 6 zenui used asus android phones tablet computers available licensing external parties zenui also comes asus-made apps preloaded like zenlink pc link share link party link remote link zenui made debut asus zenfone series asus memopad 7 me176c asus padfone mini 2014 zenui asus made front-end interface android phones tablets called asus waveshare ui asus waveshare ui front-end touch interface developed asus partners waveshare ui used asus android phones tablet computers available licensing external parties waveshare ui originally released asus padfone hybrid smartphone/tablet later used asus products last gadget use waveshare ui asus memo pad hd 7 asus zenui updated google play store preloaded apps preloaded apps | [
3933,
5372,
6427,
1095,
740,
4340,
42,
3310,
2591,
5771,
5775,
7956,
5473,
474,
6183,
822,
136,
6209,
1582,
6937,
6232,
4116,
2003,
195,
6978,
7346,
561,
201,
2017,
5919,
7357,
5571,
2398,
2037,
2756,
7007,
7749,
2417,
2054,
3816,
2788,... | Validation |
5,196 | 4 | Kaō:kaō kaō huāyā stylized signature mark used east asia place true signature kaō first appeared china tang dynasty began used japan heian period though use became far less widespread edo period continue used even contemporary politicians famous people reading identification individual kaō often requires specialist knowledge whole books devoted topic published often used japanese swordsmith sword tang nakago | [
6672
] | Test |
5,197 | 2 | LinuxLive_USB_Creator:linuxlive usb creator linuxlive usb creator free microsoft windows program creates live usb systems installed images supported linux distributions | [
6549,
4496,
3626,
4759,
5129,
5571,
2728,
4207,
3271,
3738
] | Test |
5,198 | 4 | Offline_private_key_protocol:offline private key protocol offline private key protocol opkp cryptographic protocol prevent unauthorized access back archive data protocol results public key used encrypt data offline private key later used decrypt data protocol based three rules regarding key offline private key comply rules offline private key protocol uses method asymmetric key wrapping protocol provide rules strength encryption methods keys used security protocol depends actual cryptographic implementation used combination strong encryption methods protocol provide extreme security initially archiving creating backup session file restore backed archived data | [
5199,
2390
] | Test |
5,199 | 4 | Offline_private_key:offline private key offline private key cryptographic key stored network-connected medium key used decrypt archive backup data key result offline private key protocol printed form key trusted paper key | [
5198,
2390
] | Test |
5,200 | 2 | Source_Mage:source mage source mage linux distribution package installed source code automatically downloaded compiled installed source mage descended sorcerer source mage name suggests source-based linux distribution instead delivering binaries users source code compiled method allows greater control software precompiled distributions ubuntu individual dependencies selected deselected saving valuable hard drive space freeing ram cpu cycles instance openssh compiled without support x11 sharing one choose set cflags cxxflags ldflags specific situation using source-based distribution one way unlock full performance computer many binary distros compile software wide audience particular group users specific processor source mage spell cast latest stable release downloaded developer site rather source mage allows up-to-date system unlike gentoo another popular source-based distribution maintains customized cache packages smgl changes little possible packages fit bare standards filesystem hierarchy standard immune kind errors resulting distribution developers tampering 2000 kyle sallee released linux distribution named sorcerer gnu/linux due several issues 2002 chuck s. mead forked sorcerer lunar linux soon afterwards kyle sallee took sorcerer gnu/linux offline remaining sorcerer gnu/linux development team brought back online continued development month later kyle sallee brought version sorcerer back online new license prevented forking dropping gnu/linux name consequently request sallee sorcerer gnu/linux team renamed project source mage source mage tagline linux advanced may well magic commands sorcerous theme package called spell package management program called sorcery install package user must cast spell casting spell consists downloading source code already downloaded checking dependencies casting necessary compiling program installing set available spells called grimoire uninstall package user must dispel spell source mage established distribution commitment source mage social contract establishes basic rules similar though identical debian first part contract ensures freedom source mage source mage restrict user choice software free software installing source mage involves first creating minimal installation kernel run gcc c compiler network connection basic tools support downloading compiling source code enables system download compile install components compilation results tailored specific system source mage-maintained code designed presume minimal system base system n't explicitly require c++ compiler gcc 4.x+ replaced besides posix-compliant tools core components require bash sed either gawk mawk instead heavyweight languages like perl python makes source mage suitable small installation | [
361,
2179,
6789,
5017,
2187,
2909,
5724,
5726,
6086,
4675,
7894,
2935,
6453,
2581,
7555,
2585,
2228,
1487,
2594,
58,
3996,
7587,
4008,
1893,
781,
7954,
5092,
1909,
6884,
7969,
7619,
6175,
7251,
4400,
7253,
3696,
474,
1179,
3366,
7635,
6... | Test |
5,201 | 4 | Vulnerability_Discovery_Model:vulnerability discovery model vulnerability discovery model vdm uses discovery event data software reliability models predicting thorough presentation vdm techniques available numerous model implementations available mcmcbayes open source repository several vdm examples include | [
2513,
429,
3932,
1805
] | Test |
5,202 | 4 | Khalil_Sehnaoui:khalil sehnaoui khalil sehnaoui belgian-lebanese information security consultant specialises middle-east founder managing partner beirut-based krypton security also member chaos computer club ccc europe largest association hackers co-founded managing partner security firm krypton security helps test companies security strengths weaknesses potential loopholes online report published april 6 2016 sehnaoui listed one top 100 influencers information security sehnaoui often called upon comment media information security matters sehnaoui born beirut parents marwan sehnaoui mouna bassili sehnaoui 23 may 1975 grew living paris france beirut lebanon father president lebanese order malta mother middle-east painter attended college stanislas paris well collège louise wegman beirut following earned ba management universite saint joseph beirut well masters economics sehnaoui featured guardian video series power privacy 2015 may 2017 sehnaoui went viral twitter internet tweeting getting revenge loud rude customers coffee shop customers loud rude waiters voluble conversation perfect new business name retaliation sehnaoui registered domain name tweeted according mashable twitter users praised sehnaoui act digital savagery sehnaoui also featured national geographic 2017 series breakthrough produced ron howard brian grazer season 2 episode 2 cyber-terror episode offered exclusive look inside shadowy world hackers good battles evil security world stake episode follows “ white-hat ” hackers jayson street darren kitchen khalil sehnaoui security specialists combine clever coding “ mission impossible ” -style “ social engineering. ” 2019 sehnaoui featured amongst 70 information security professionals book called tribe hackers collection industry career personal insights cybersecurity luminaries book quickly rose 1 spot new releases amazon computer security encryption category 2015 controversy sehnaoui identified silent circle warrant canary removed site sehnaoui also prominently featured video series guardian privacy risks often called upon comment recent information security news founding information security firm attempted improve patient representation lebanese insurance industry starting january 2016 reports islamic state allegedly built new android app called alrawi exchanging encrypted messages based claims online counter-terrorism firm ghost security group gsg claim quickly reprinted newsweek fortune techcrunch among others sehnaoui one security specialists helped debunk myth tool showing bad media mock-up try get attention july 2018 arrested alleged piracy several lebanese companies government institutions detention illegal legal vacuum lebanese laws cybercrime released questioned charges brought | [
2566,
1651,
3486,
1805
] | Validation |
5,203 | 9 | Array_access_analysis:array access analysis computer science array access analysis compiler analysis used decide read write access patterns elements portions arrays major data type manipulated scientific programs array define/use analysis whole array insufficient aggressive compiler optimizations auto parallelization array privatization array access analysis aims obtain knowledge portions even elements array accessed given code segment basic block loop even procedure level array access analysis largely categorized exact reference-list-based summary methods different tradeoffs accuracy complexity exact methods precise costly terms computation space storage summary methods approximate computed quickly economically typical exact array access analysis include linearization atom images summary methods divided array sections bounded regular sections using triplet notation linear-constraint methods data access descriptors array region analysis | [
5082,
2460,
1854
] | Train |
5,204 | 5 | Light_(web_browser):light web browser light formerly known firefox light free open-source web browser based firefox light available windows os x linux operating systems differs firefox built performance achieves removing several firefox built components including crash reporter safe browsing spell checker development tools support various types video audio media | [
6368,
4759,
5571,
84,
578
] | Test |
5,205 | 4 | Byzantine_Foothold:byzantine foothold byzantine foothold unclassified code name related united states department defense effort within larger cyber initiative framework specifically aimed curbing preventing foreign intrusions computer networks us federal agencies said threat related ongoing efforts chinese hackers peoples liberation army public documentation available would prove case twenty largest american military-industrial contractors also invited participate program highly potent hacker attack detected booz allen corp although us government sees largest cyber espionage effort arrests made specific cyber intruder identified public information available state on-going investigation related intrusion | [
5444,
3575
] | Validation |
5,206 | 8 | Mongrel2:mongrel2 mongrel2 open-source language agnostic web server written zed shaw successor shaw mongrel server server supports http flash xmlsockets websockets long polling connections mongrel2 described language agnostic meaning prefer specific programming language another server documentation says shaw began working server june 2010 released version 1.0 software september 1 2010 mongrel2 nothing common original mongrel webserver except using http parser | [
3168,
5369,
1349,
5820,
5214,
2646,
6270,
1834,
2291,
8182,
6536,
26,
5571,
7544,
7988,
4701,
1392,
7786,
417,
3135,
2506,
1686,
3408,
3915,
1602,
6061,
7411,
7952,
1435,
2807
] | Validation |
5,207 | 2 | Interpreter_directive:interpreter directive interpreter directive computer language construct systems better described aspect system executable file format used control interpreter parses interprets instructions computer program unix linux unix-like operating systems first two bytes file characters constitute magic number hexadecimal 23 21 ascii values often referred shebang prefix first line script remainder line command usually limited max 14 introduced usually 80 characters 2016 file system permissions script file include execute permission bit user invoking filename often found command search path used tell operating system interpreter usually program implements scripting language use execute script contents may batch commands might intended interactive use example would /bin/bash meaning run script bash shell found /bin directory systems files may use magic number interpreter directives | [
6017,
1047,
1524,
5571,
8142,
6778,
7246,
6016,
578
] | Test |
5,208 | 3 | PIC_microcontrollers:pic microcontrollers pic usually pronounced pick family microcontrollers made microchip technology derived pic1650 originally developed general instrument microelectronics division name pic initially referred peripheral interface controller currently expanded programmable intelligent computer first parts family available 1976 2013 company shipped twelve billion individual parts used wide variety embedded systems early models pic read-only memory rom field-programmable eprom program storage provision erasing memory current models use flash memory program storage newer models allow pic reprogram program memory data memory separated data memory 8-bit 16-bit latest models 32-bit wide program instructions vary bit-count family pic may 12 14 16 24 bits long instruction set also varies model powerful chips adding instructions digital signal processing functions hardware capabilities pic devices range 6-pin smd 8-pin dip chips 144-pin smd chips discrete i/o pins adc dac modules communications ports uart i2c even usb low-power high-speed variations exist many types manufacturer supplies computer software development known mplab x assemblers c/c++ compilers programmer/debugger hardware mplab pickit series third party open-source tools also available parts in-circuit programming capability low-cost development programmers available well high-production programmers pic devices popular industrial developers hobbyists due low cost wide availability large user base extensive collection application notes availability low cost free development tools serial programming re-programmable flash-memory capability original pic intended used general instrument new cp1600 16-bit central processing unit cpu whilst people considered cp1600 good cpu poor i/o performance 8-bit pic developed 1975 improve performance overall system offloading i/o tasks cpu pic used simple microcode stored rom perform tasks although term risc used time shares common features risc designs 1985 general instrument sold microelectronics division new owners cancelled almost everything time mostly out-of-date pic however upgraded internal eprom produce programmable channel controller 2001 microchip introduced flash programmable devices full production commencing 2002 today huge variety pics available various on-board peripherals serial communication modules uarts motor control kernels etc program memory 256 words 64k words word one assembly language instruction varying length 8 16 bits depending specific pic micro family pic picmicro registered trademarks microchip technology generally thought pic stands peripheral interface controller although general instruments original acronym initial pic1640 pic1650 devices programmable interface controller acronym quickly replaced programmable intelligent computer microchip 16c84 pic16x84 introduced 1993 first microchip cpu on-chip eeprom memory 2013 microchip shipping one billion pic microcontrollers every year pic micro chips designed harvard architecture offered various device families baseline mid-range families use 8-bit wide data memory high-end families use 16-bit data memory latest series pic32mz 32-bit mips-based microcontroller instruction words sizes 12-bit pic10 pic12 14-bit pic16 24-bit pic24 dspic binary representations machine instructions vary family shown pic instruction listings within families devices may designated picnncxxx cmos picnnfxxx flash c devices generally classified suitable new development actively promoted microchip program memory c devices variously described otp rom eeprom october 2016 otp product classified production pic16hv540 c devices quartz windows erasure general longer available devices feature 12-bit wide code memory 32-byte register file tiny two level deep call stack represented pic10 series well pic12 pic16 devices baseline devices available 6-pin 40-pin packages generally first 7 9 bytes register file special-purpose registers remaining bytes general purpose ram pointers implemented using register pair writing address fsr file select register indf indirect f register becomes alias addressed register banked ram implemented bank number selected high 3 bits fsr affects register numbers 16–31 registers 0–15 global affected bank select bits limited register space 5 bits 4 rarely read registers assigned addresses written special instructions codice_1 codice_2 rom address space 512 words 12 bits may extended 2048 words banking codice_3 codice_4 instructions specify low 9 bits new code location additional high-order bits taken status register note call instruction includes 8 bits address may specify addresses first half 512-word page lookup tables implemented using computed codice_4 assignment pcl register table codice_6 instructions baseline core support interrupts i/o must polled enhanced baseline variants interrupt support four-level call stack pic10f32x devices feature mid-range 14-bit wide code memory 256 512 words 64-byte sram register file 8-level deep hardware stack devices available 6-pin smd 8-pin dip packages two pins unused one input three i/o pins available complex set interrupts available clocks internal calibrated high-frequency oscillator 16 mhz choice selectable speeds via software 31 khz low-power source devices feature 14-bit wide code memory improved 8-level deep call stack instruction set differs little baseline devices two additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 first 32 bytes register space allocated special-purpose registers remaining 96 bytes used general-purpose ram banked ram used high 16 registers 0x70–0x7f global important special-purpose registers including status register holds ram bank select bits global registers fsr indf low 8 bits program counter pcl pc high preload register pclath master interrupt control register intcon pclath register supplies high-order instruction address bits 8 bits supplied write pcl register 11 bits supplied codice_4 codice_3 instruction sufficient address available rom space 17 series never became popular superseded pic18 architecture however see clones 17 series recommended new designs availability may limited users improvements earlier cores 16-bit wide opcodes allowing many new instructions 16-level deep call stack pic17 devices produced packages 40 68 pins 17 series introduced number important new features significant limitation ram space limited 256 bytes 26 bytes special function registers 232 bytes general-purpose ram awkward bank-switching models supported 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language 18 series inherits features instructions 17 series adding number important new features ram space 12 bits addressed using 4-bit bank select register 8-bit offset instruction additional access bit instruction selects bank 0 =0 bank selected bsr =1 1-level stack also available status wreg bsr registers saved every interrupt may restored return interrupts disabled may also used subroutine call/return setting bit appending fast instruction auto increment/decrement feature improved removing control bits adding four new indirect registers per fsr depending indirect file register accessed possible postdecrement postincrement preincrement fsr form effective address adding w fsr advanced pic18 devices extended mode available makes addressing even favorable compiled code pic18 devices still developed 2017 fitted cip core independent peripherals 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition although still similar earlier pic architectures significant enhancements features dspics programmed c using microchip xc16 compiler formerly called c30 variant gcc instruction rom 24 bits wide software access rom 16-bit words even words hold least significant 16 bits instruction odd words hold significant 8 bits high half odd words reads zero program counter 23 bits wide least significant bit always 0 22 modifiable bits instructions come two main varieties important operations add xor shifts etc allowing forms first like classic pic instructions operation specified f register i.e first 8k ram single accumulator w0 destination select bit selecting updated result w registers memory-mapped f operand may w register second form conventional allowing three operands may 16 w registers destination one sources also support addressing modes allowing operand memory pointed w register november 2007 microchip introduced pic32mx family 32-bit microcontrollers based mips32 m4k core device programmed using microchip mplab c compiler pic32 mcus variant gcc compiler first 18 models currently production pic32mx3xx pic32mx4xx pin pin compatible share peripherals set pic24fxxga0xx family 16-bit devices allowing use common libraries software hardware tools today starting 28 pin small qfn packages high performance devices ethernet usb otg full family range mid-range 32-bit microcontrollers available pic32 architecture brought number new features microchip portfolio including november 2013 microchip introduced pic32mz series microcontrollers based mips m14k core pic32mz series include 2015 microchip released pic32mz ef family using updated mips m5150 warrior m-class processor 2017 microchip introduced pic32mz da family featuring integrated graphics controller graphics processor 32mb ddr2 dram june 2016 microchip introduced pic32mm family specialized low-power low-cost applications pic32mm features core-independent peripherals sleep modes 500 na 4 x 4 mm packages pic32mm microcontrollers use mips technologies m4k 32-bit mips32 processor meant low power consumption limited 25 mhz key advantage support 16bits instructions mips making program size much compact 40 microchip introduced pic32mk family 2017 specialized motor control industrial control industrial internet things iiot multi-channel applications pic architecture characterized multiple attributes distinction memory space register space ram serves job memory registers ram usually referred register file simply registers pics set registers function general-purpose ram special-purpose control registers on-chip hardware resources also mapped data space addressability memory varies depending device series pic devices banking mechanism extend addressing additional memory later series devices feature move instructions cover whole addressable space independent selected bank earlier devices register move achieved accumulator implement indirect addressing file select register fsr indirect register indf used register number written fsr reads writes indf actually register pointed fsr later devices extended concept post- pre- increment/decrement greater efficiency accessing sequentially stored data also allows fsr treated almost like stack pointer sp external data memory directly addressable except pic18 devices high pin count code space generally implemented on-chip rom eprom flash rom general provision storing code external memory due lack external memory interface exceptions pic17 select high pin count pic18 devices pics handle address data 8-bit chunks however unit addressability code space generally data space example pics baseline pic12 mid-range pic16 families program memory addressable wordsize instruction width i.e 12 14 bits respectively contrast pic18 series program memory addressed 8-bit increments bytes differs instruction width 16 bits order clear program memory capacity usually stated number single-word instructions rather bytes pics hardware call stack used save return addresses hardware stack software-accessible earlier devices changed 18 series devices hardware support general-purpose parameter stack lacking early series greatly improved 18 series making 18 series architecture friendly high-level language compilers pic instructions vary 35 instructions low-end pics 80 instructions high-end pics instruction set includes instructions perform variety operations registers directly accumulator literal constant accumulator register well conditional execution program branching operations bit setting testing performed numbered register bi-operand arithmetic operations always involve w accumulator writing result back either w operand register load constant necessary load w moved another register older cores register moves needed pass w changed high-end cores pic cores skip instructions used conditional execution branching skip instructions skip bit set skip bit set cores pic18 unconditional branch instructions conditional jumps implemented conditional skip opposite condition followed unconditional branch skips also utility conditional execution immediate single following instruction possible skip instructions example instruction sequence skip skip b c execute c true b false 18 series implemented shadow registers registers save several important registers interrupt providing hardware support automatically saving processor state servicing interrupts general pic instructions fall five classes architectural decisions directed maximization speed-to-cost ratio pic architecture among first scalar cpu designs still among simplest cheapest harvard architecture instructions data come separate sources simplifies timing microcircuit design greatly benefits clock speed price power consumption pic instruction set suited implementation fast lookup tables program space lookups take one instruction two instruction cycles many functions modeled way optimization facilitated relatively large program space pic e.g 4096 × 14-bit words 16f690 design instruction set allows embedded constants example branch instruction target may indexed w execute retlw named return literal w. interrupt latency constant three instruction cycles external interrupts synchronized four-clock instruction cycle otherwise one instruction cycle jitter internal interrupts already synchronized constant interrupt latency allows pics achieve interrupt-driven low-jitter timing sequences example video sync pulse generator longer true newest pic models synchronous interrupt latency three four cycles following stack limitations addressed pic18 series still apply earlier cores paged program memory two page sizes worry one call goto another computed goto typically used table lookups example pic16 call goto 11 bits addressing page size 2048 instruction words computed gotos add pcl page size 256 instruction words cases upper address bits provided pclath register register must changed every time control transfers pages pclath must also preserved interrupt handler several commercial compilers available 2008 microchip released c compilers c18 c30 line 18f 24f 30/33f processors 2013 microchip offers xc series compilers use mplab x microchip eventually phase older compilers c18 recommends using xc series compilers new designs risc instruction set pic assembly language code make overall flow difficult comprehend judicious use simple macros increase readability pic assembly language example original parallax pic assembler spasm macros hide w make pic look like two-address machine macro instructions like codice_17 move data address address b codice_18 add data address data address b also hides skip instructions providing three-operand branch macro instructions codice_19 compare b jump dest equal pic devices generally feature within series still many device variants depending hardware resources chip features first generation pics eprom storage almost completely replaced chips flash memory likewise original 12-bit instruction set pic1650 direct descendants superseded 14-bit 16-bit instruction sets microchip still sells otp one-time-programmable windowed uv-erasable versions eprom based pics legacy support volume orders microchip website lists pics electrically erasable otp uv erasable windowed versions chips ordered f picmicro part number generally indicates picmicro uses flash memory erased electronically conversely c generally means erased exposing die ultraviolet light possible windowed package style used exception rule pic16c84 uses eeprom therefore electrically erasable l name indicates part run lower voltage often frequency limits imposed parts designed specifically low voltage operation within strict range 3 3.6 volts marked j part number parts also uniquely i/o tolerant accept 5 v inputs microchip provides freeware ide package called mplab x includes assembler linker software simulator debugger also sell c compilers pic10 pic12 pic16 pic18 pic24 pic32 dspic integrate cleanly mplab x free versions c compilers also available features free versions optimizations disabled 60 days several third parties develop c language compilers pics many integrate mplab and/or feature ide fully featured compiler picbasic language program pic microcontrollers available melabs inc. mikroelektronika offers pic compilers c basic pascal programming languages graphical programming language flowcode exists capable programming 8- 16-bit pic devices generating pic-compatible c code exists numerous versions free demonstration complete professional edition proteus design suite able simulate many popular 8 16-bit pic devices along circuitry connected pic schematic program simulated developed within proteus mplab development tool devices called programmers traditionally used get program code target pic pics microchip currently sells feature icsp circuit serial programming and/or lvp low voltage programming capabilities allowing pic programmed sitting target circuit microchip offers programmers/debuggers mplab pickit series mplab icd4 mplab real ice current programmers debuggers professional engineering pickit 3 low-cost programmer debugger line hobbyists students many higher end flash based pics also self-program write program memory process known bootloading demo boards available small bootloader factory programmed used load user programs interface rs-232 usb thus obviating need programmer device alternatively bootloader firmware available user load onto pic using icsp programming bootloader onto pic user reprogram device using rs232 usb conjunction specialized computer software advantages bootloader icsp faster programming speeds immediate program execution following programming ability debug program using cable many programmers pic microcontrollers ranging extremely simple designs rely icsp allow direct download code host computer intelligent programmers verify device several supply voltages many complex programmers use pre-programmed pic send programming commands pic programmed intelligent type programmer needed program earlier pic models mostly eprom type support in-circuit programming third party programmers range plans build self-assembly kits fully tested ready-to-go units simple designs require pc low-level programming signalling typically connect serial parallel port consist simple components others programming logic built typically use serial usb connection usually faster often built using pics control newer pic devices feature icd in-circuit debugging interface built cpu core allows interactive debugging program conjunction mplab ide mplab icd mplab real ice debuggers communicate interface using icsp interface debugging system comes price however namely limited breakpoint count 1 older devices 3 newer devices loss i/o exception surface mount 44-pin pics dedicated lines debugging loss on-chip features devices on-chip debug support due cost lack pins larger chips also debug module debug devices special -icd version chip mounted daughter board provides dedicated ports required debug chips able operate one type chip use selectable jumpers daughter board allows broadly identical architectures feature chip peripheral devices replaced single -icd chip example 12f690-icd function one six different parts features one five chip peripherals microchip offers three full in-circuit emulators mplab ice2000 parallel interface usb converter available newer mplab ice4000 usb 2.0 connection recently real ice usb 2.0 connection tools typically used conjunction mplab ide source-level interactive debugging code running target pic projects may utilize real time operating systems freertos avix rtos urtos salvo rtos similar libraries task scheduling prioritization open source project serge vakulenko adapts 2.11bsd pic32 architecture name retrobsd brings familiar unix-like operating system including onboard development environment microcontroller within constraints onboard hardware parallax produced series picmicro-like microcontrollers known parallax sx currently discontinued designed architecturally similar pic microcontrollers used original versions basic stamp sx microcontrollers replaced pic several subsequent versions product parallax sx 8-bit risc microcontrollers using 12-bit instruction word run fast 75 mhz 75 mips include 4096 12-bit words flash memory 262 bytes random access memory eight bit counter support logic software library modules emulate i²c spi interfaces uarts frequency generators measurement counters pwm sigma-delta a/d converters interfaces relatively easy write existing modules modified get new features russian pkk milandr produces microcontrollers using pic17 architecture 1886 series program memory consists 64kb flash memory 1886ve2u 8kb eeprom 1886ve5u 1886ве5у 1886ve5u 1886ве5у 1886ve7u 1886ве7у specified military temperature range -60 °c +125 °c hardware interfaces various parts include usb i2c spi well a/d d/a converters 1886ve3u 1886ве3у contains hardware accelerator cryptographic functions according gost 28147-89 even radiation-hardened chips designations 1886ve8u 1886ве8у 1886ve10u 1886ве10у elan microelectronics corp. taiwan make line microcontrollers based pic16 architecture 13-bit instructions smaller 6-bit ram address space holtek semiconductor make large number cheap microcontrollers low 8.5 cents quantity 14-bit instruction set strikingly similar pic16 many ultra-low-cost otp microcontrollers asian manufacturers found low-cost consumer electronics based pic architecture modified form clones target baseline parts pic16c5x/pic12c50x microchip attempted sue manufacturers copying particularly egregious without success | [
2903,
708,
5012,
6074,
7519,
7533,
7541,
7905,
4336,
5055,
1867,
7569,
5423,
7581,
5079,
771,
4365,
4368,
4370,
4372,
6865,
7960,
5804,
804,
2997,
809,
3365,
1556,
7990,
7654,
6919,
6583,
1237,
536,
4846,
551,
5208,
5917,
7730,
2036,
62... | Test |
5,209 | 1 | Concurrency_control:concurrency control information technology computer science especially fields computer programming operating systems multiprocessors databases concurrency control ensures correct results concurrent operations generated getting results quickly possible computer systems software hardware consist modules components component designed operate correctly i.e. obey meet certain consistency rules components operate concurrently interact messaging sharing accessed data memory storage certain component consistency may violated another component general area concurrency control provides rules methods design methodologies theories maintain consistency components operating concurrently interacting thus consistency correctness whole system introducing concurrency control system means applying operation constraints typically result performance reduction operation consistency correctness achieved good possible efficiency without reducing performance reasonable levels concurrency control require significant additional complexity overhead concurrent algorithm compared simpler sequential algorithm example failure concurrency control result data corruption torn read write operations comments concurrency control database management systems dbms e.g. bernstein et al 1987 weikum vossen 2001 transactional objects related distributed applications e.g. grid computing cloud computing ensures database transactions performed concurrently without violating data integrity respective databases thus concurrency control essential element correctness system two database transactions executed time overlap access data e.g. virtually general-purpose database system consequently vast body related research accumulated since database systems emerged early 1970s well established concurrency control theory database systems outlined references mentioned serializability theory allows effectively design analyze concurrency control methods mechanisms alternative theory concurrency control atomic transactions abstract data types presented lynch et al 1993 utilized theory refined complex wider scope less utilized database literature classical theory theory pros cons emphasis insight extent complementary merging may useful ensure correctness dbms usually guarantees serializable transaction schedules generated unless serializability intentionally relaxed increase performance cases application correctness harmed maintaining correctness cases failed aborted transactions always happen many reasons schedules also need recoverability abort property dbms also guarantees effect committed transactions lost effect aborted rolled back transactions remains related database overall transaction characterization usually summarized acid rules databases become distributed needed cooperate distributed environments e.g. federated databases early 1990 cloud computing currently effective distribution concurrency control mechanisms received special attention concept database transaction atomic transaction evolved order enable well understood database system behavior faulty environment crashes happen time recovery crash well understood database state database transaction unit work typically encapsulating number operations database e.g. reading database object writing acquiring lock etc abstraction supported database also systems transaction well defined boundaries terms program/code executions included transaction determined transaction programmer via special transaction commands every database transaction obeys following rules support database system i.e. database system designed guarantee transactions runs concept atomic transaction extended years become business transactions actually implement types workflow atomic however also enhanced transactions typically utilize atomic transactions components transactions executed serially i.e. sequentially overlap time transaction concurrency exists however concurrent transactions interleaving operations allowed uncontrolled manner unexpected undesirable results may occur high-performance transactional systems need run transactions concurrently meet performance requirements thus without concurrency control systems neither provide correct results maintain databases consistently main categories concurrency control mechanisms different categories provide different performance i.e. different average transaction completion rates throughput depending transaction types mix computing level parallelism factors selection knowledge trade-offs available category method chosen provide highest performance mutual blocking two transactions one blocks results deadlock transactions involved stalled reach completion non-optimistic mechanisms blocking prone deadlocks resolved intentional abort stalled transaction releases transactions deadlock immediate restart re-execution likelihood deadlock typically low blocking deadlocks aborts result performance reduction hence trade-offs categories many methods concurrency control exist implemented within either main category major methods many variants cases may overlap combined major concurrency control types utilized conjunction methods include common mechanism type database systems since early days 1970s strong strict two-phase locking ss2pl also called rigorous scheduling rigorous 2pl special case variant two-phase locking 2pl commitment ordering co pessimistic spite long name historical reasons idea ss2pl mechanism simple release locks applied transaction transaction ended ss2pl rigorousness also name set schedules generated mechanism i.e. ss2pl rigorous schedules ss2pl rigorousness property concurrency control mechanisms firstly need operate correctly i.e. maintain transaction integrity rules related concurrency application-specific integrity rule scope transactions running concurrently thus integrity entire transactional system correctness needs achieved good performance possible addition increasingly need exists operate effectively transactions distributed processes computers computer networks subjects may affect concurrency control recovery replication correctness common major goal concurrency control mechanisms generating schedules serializability property without serializability undesirable phenomena may occur e.g. money may disappear accounts generated nowhere serializability schedule means equivalence resulting database values serial schedule transactions i.e. transactions sequential overlap time thus completely isolated concurrent access two transactions data possible serializability considered highest level isolation among database transactions major correctness criterion concurrent transactions cases compromised relaxed forms serializability allowed better performance e.g. popular snapshot isolation mechanism meet availability requirements highly distributed systems see eventual consistency application correctness violated relaxation e.g. relaxation allowed money transactions since relaxation money disappear appear nowhere almost implemented concurrency control mechanisms achieve serializability providing conflict serializablity broad special case serializability i.e. covers enables serializable schedules impose significant additional delay-causing constraints implemented efficiently comment general area systems term recoverability may refer ability system recover failure incorrect/forbidden state within concurrency control database systems term received specific meaning concurrency control typically also ensures recoverability property schedules maintaining correctness cases aborted transactions always happen many reasons recoverability abort means committed transaction schedule read data written aborted transaction data disappear database upon abort parts incorrect database state reading data violates consistency rule acid unlike serializability recoverability compromised relaxed case since relaxation results quick database integrity violation upon aborts major methods listed provide serializability mechanisms none general form automatically provides recoverability special considerations mechanism enhancements needed support recoverability commonly utilized special case recoverability strictness allows efficient database recovery failure excludes optimistic implementations e.g. strict co sco optimistic implementation semi-optimistic ones comment note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle transaction aborts may unrelated database failure recovery fast technological development computing difference local distributed computing low latency networks buses blurring thus quite effective utilization local techniques distributed environments common e.g. computer clusters multi-core processors however local techniques limitations use multi-processes threads supported multi-processors multi-cores scale often turns transactions distributed ones need span multi-processes cases local concurrency control techniques scale well database systems become distributed started cooperate distributed environments e.g. federated databases early 1990s nowadays grid computing cloud computing networks smartphones transactions become distributed distributed transaction means transaction spans processes may span computers geographical sites generates need effective distributed concurrency control mechanisms achieving serializability property distributed system schedule see distributed serializability global serializability modular serializability effectively poses special challenges typically met regular serializability mechanisms originally designed operate locally especially due need costly distribution concurrency control information amid communication computer latency known general effective technique distribution commitment ordering disclosed publicly 1991 patented commitment ordering commit ordering co raz 1992 means transactions chronological order commit events kept compatible respective precedence order co require distribution concurrency control information provides general effective solution reliable high-performance scalable distributed global serializability also heterogeneous environment database systems transactional objects different concurrency control mechanisms co indifferent mechanism utilized since interfere transaction operation scheduling mechanisms control determines order commit events thus co enables efficient distribution mechanisms also distribution mix different local mechanisms achieving distributed global serializability existence solution considered unlikely 1991 many experts also later due misunderstanding co solution see quotations global serializability important side-benefit co automatic distributed deadlock resolution contrary co virtually techniques combined co prone distributed deadlocks also called global deadlocks need special handling co also name resulting schedule property schedule co property chronological order transactions commit events compatible respective transactions precedence partial order ss2pl mentioned variant special case co thus also effective achieve distributed global serializability also provides automatic distributed deadlock resolution fact overlooked research literature even co publication well strictness thus recoverability possessing desired properties together known efficient locking based implementations explains ss2pl popularity ss2pl utilized efficiently achieve distributed global serializability since 1980 become de facto standard however ss2pl blocking constraining pessimistic proliferation distribution utilization systems different traditional database systems e.g. cloud computing less constraining types co e.g. optimistic co may needed better performance comments unlike serializability distributed recoverability distributed strictness achieved efficiently straightforward way similarly way distributed co achieved database system applied locally employ vote ordering strategy two-phase commit protocol 2pc raz 1992 page 307 mentioned distributed ss2pl including distributed strictness recoverability distributed commitment ordering serializability automatically employs needed vote ordering strategy achieved globally employed locally local database system known utilized many years matter fact locality defined boundary 2pc participant raz 1992 design concurrency control mechanisms often influenced following subjects systems prone failures handling recovery failure must properties generated schedules dictated concurrency control mechanism may affect effectiveness efficiency recovery example strictness property mentioned section recoverability often desirable efficient recovery high availability database objects often replicated updates replicas database object need kept synchronized may affect way concurrency control done e.g. gray et al 1996 multitasking operating systems especially real-time operating systems need maintain illusion tasks running top running time even though one tasks really running given moment due limitations hardware operating system running multitasking fairly simple tasks independent however several tasks try use resource tasks try share information lead confusion inconsistency task concurrent computing solve problem solutions involve locks similar locks used databases risk causing problems deadlock solutions non-blocking algorithms read-copy-update | [
1449,
3951,
6430,
4318,
740,
6462,
1861,
6128,
7205,
5419,
2961,
7213,
6144,
1891,
4010,
5447,
784,
2265,
7248,
3005,
3011,
6543,
4798,
3041,
517,
7303,
4457,
6593,
7322,
1254,
1624,
5209,
7715,
3776,
5580,
927,
3801,
4159,
2411,
2767,
... | Test |
5,210 | 3 | Seqlock:seqlock seqlock short sequential lock special locking mechanism used linux supporting fast writes shared variables two parallel operating system routines semantics stabilized version 2.5.59 present 2.6.x stable kernel series seqlocks developed stephen hemminger originally called frlocks based earlier work andrea arcangeli first implementation x86-64 time code needed synchronize user space possible use real lock reader-writer consistent mechanism avoids problem writer starvation seqlock consists storage saving sequence number addition lock lock support synchronization two writers counter indicating consistency readers addition updating shared data writer increments sequence number acquiring lock releasing lock readers read sequence number reading shared data sequence number odd either occasion writer taken lock data read may changed sequence numbers different writer changed data read either case readers simply retry using loop read even sequence number reader never blocks may retry write progress speeds readers case data modified since acquire lock would traditional read-write lock also writers wait readers whereas traditional read-write locks leading potential resource starvation situation number readers writer must wait readers two factors seqlocks efficient traditional read-write locks situation many readers writers drawback much write activity reader slow might livelock readers may starve also noted technique work data contains pointers writer could invalidate pointer reader already followed case using read-copy-update synchronization preferred first applied system time counter updating time interrupt updates time day may many readers time operating system internal use applications writes relatively infrequent occur one time bsd timecounter code instance appears use similar technique one subtle issue using seqlocks time counter impossible step debugger retry logic trigger time debugger slow enough make read race occur always | [
5580,
5571,
578
] | Test |
5,211 | 2 | Can4linux:can4linux can4linux open source linux-kernel device driver development started mid 1990s philips 82c200 controller stand alone chip isa board at-can-mini 1995 first version created use bus linux laboratory automation project linux lab project fu berlin increasing spread field bus technology automation especially embedded devices growth linux area leads growing importance device drivers base higher layer protocols like canopen j1939 devicenet besides nxp sja1000 successor first supported controller philips 82c200 intel 82527 development powerful microcontrollers integrated controllers capable run linux operating system intensified since 2005 examples development serve freescale coldfire processors arm models atmel freescale also stand-alone controller mcp2515 connected via spi bus br list supported controllers available can4linux project site latest version virtual mode implemented allows applications communicate without hardware using device driver software layer mode already includes support new frame format called fd allows data frame length 64 byte application software opens device descriptor gets back file descriptor using file descriptor standard operating system functions like codice_1 codice_2 used exchange frames nodes bus following code example puts frame bus afterwards waits frame transmitted another node examples available can4linux project site can4linux compiled way allows one process access controller hardware reading writing frames bus beside real application processes like data loggers diagnosis processes access bus | [
3755
] | Test |
5,212 | 4 | Mixed_threat_attack:mixed threat attack mixed threat attack attack uses different tactics infiltrate computer user environment mixed threat attack might include infected file comes way spam received way internet download mixed threat attacks generally try exploit multiple vulnerabilities get system launching multiple diverse attacks parallel attacker exploit entry points single attack threats based multiple single-attacks much harder detect firewalls help types attacks configured correctly somewhat effective type attack however attack embedded inside application longer able prevent attack typical techniques employed define multiple access threat signature represents identification virus removal software types techniques need employed host machine sometimes firewall intrusion detection system able detect attack | [
429
] | Test |
5,213 | 2 | List_of_Windows_10_Mobile_devices:list windows 10 mobile devices list devices coming natively microsoft windows 10 mobile operating system list also includes devices running two additional flavours windows 10 mobile devices windows 10 mobile enterprise windows 10 iot mobile enterprise devices come sd card support processors supported qualcomm snapdragon 210 212 410 617 800 801 808 810 820 well rockchip rk3288 | [
3076,
8054,
6874,
4759,
3263,
7247,
7619,
8076,
5563,
8085,
306,
4697,
6110,
3028,
6294,
7660,
7848,
8118,
1977,
432,
6054,
7682,
5442
] | Validation |
5,214 | 8 | Boa_(web_server):boa web server boa discontinued since 2005 open-source small-footprint web server suitable embedded applications originally written paul phillips previously maintained larry doolittle jon nelson slashdot fotolog use boa serve images january 2006 boa following limitations | [
3168,
5369,
1349,
5206,
5820,
2646,
6270,
1834,
2291,
8182,
6536,
26,
5571,
7544,
7988,
4701,
1392,
7786,
417,
3135,
2506,
1686,
3408,
3915,
1602,
6061,
7411,
7952,
1435,
2807
] | Validation |
5,215 | 4 | Forensic_corporate_collections:forensic corporate collections forensic corporate collections refer type debt collection recovery tactics apply computer forensics scientific knowledge debt collection process engaging consistently updated computer software debt collection process forensic corporate collection agencies able identify retrieve protect electronic evidence fraud illegal means avoiding debt found computers use evidence case litigation order forensic collections agency used means recovering debt agency must compliant knowledgeable investigation basics federal state local policies standards laws legal processes must also working knowledge types crimes incidents debt deception fraud computing environment types evidence well investigative tools technical training use forensic recovery equipment order effectively recover locate debtors get pay owe client forensic collections agents become adept conversant evidence collection management managing incident scene investigation computer systems disks file structures extracting preserving computer electronic evidence e-mail internet investigations cell phone pda investigations digital footprints debtors invariably leave behind | [
6488
] | Test |
5,216 | 2 | UNIX_System_III:unix system iii unix system iii system 3 discontinued version unix operating system released unix support group usg announced system iii late 1981 first released outside bell labs 1982 unix system iii mix various unixes version 7 unix pwb/unix 2.0 cb unix 3.0 unix/rt unix/32v system iii supported dec pdp-11 vax computers system apparently called system iii considered outside release unix/ts 3.0.1 cb unix 3 internally supported bell labs unices manual refers unix release 3.0 unix versions called system system ii official release unix/ts 4.0 would system iv either system iii succeeded system v based unix/ts 5.0 system iii introduced new features named pipes uname system call command run queue also combined various improvements version 7 unix outside organizations however include notable additions made bsd c shell csh screen editing third-party variants system iii include early versions hp-ux irix is/3 pc/ix pc-ux pnx sinix venix xenix | [
5268,
1522,
4751,
4478,
900,
2467,
6267,
5481,
2294,
5571,
2300,
2118,
6360,
578,
6367,
4068,
1493,
8117,
4447,
6577,
5964,
6583,
5348,
1426,
443
] | Test |
5,217 | 7 | Database-centric_architecture:database-centric architecture database-centric architecture data-centric architecture several distinct meanings generally relating software architectures databases play crucial role often description meant contrast design alternative approach example characterization architecture database-centric may mean combination following | [
1710,
1905,
5014,
6604,
7330,
7341,
1730,
3951,
3776,
6345,
5561,
906,
3531,
6098,
5571,
4054,
1102,
2663,
6636,
2124,
6737,
6739,
3119,
3801,
7999,
4159,
5943,
2054,
6932,
6386,
684,
6390,
7937,
7213,
7303,
6144,
4457,
6320,
1902,
5447,
... | Test |
5,218 | 9 | Translator_(computing):translator computing translator programming language processor generic term could refer compiler assembler interpreter anything converts code one language another include translations high-level human-readable computer languages c++ java intermediate-level languages java bytecode low-level languages assembly language machine code similar levels language different computing platforms well term also used translators software implementations hardware/asic microchip implementations program software descriptions microchip logic gates needed build examples widely used types computer languages translators include interpreters compilers decompilers assemblers disassemblers | [
5012,
1718,
6982,
1361,
6002,
3623,
572,
1854,
6118,
4525,
7474,
2420,
5771,
6567,
336,
4361,
5429,
5606,
8137,
6778,
6498,
1990,
5008,
5190
] | Test |
5,219 | 3 | Tickless_kernel:tickless kernel tickless kernel operating system kernel timer interrupts occur regular intervals delivered required linux kernel s390 2.6.6 i386 release 2.6.21 configured turn timer tick tickless dynamic tick idle cpus using codice_1 3.10 codice_2 extended non-idle processors codice_3 xnu kernel mac os x 10.4 nt kernel windows 8 also tickless solaris 8 kernel introduced cyclic subsystem allows arbitrary resolution timers tickless operation freebsd 9 introduced dynamic tick mode aka tickless | [
3751,
2332,
5571
] | Test |
5,220 | 4 | Anomaly_Detection_at_Multiple_Scales:anomaly detection multiple scales anomaly detection multiple scales adams 35 million darpa project designed identify patterns anomalies large data sets darpa information innovation office began 2011 project intended detect prevent insider threats soldier good mental health becoming homicidal suicidal innocent insider becoming malicious government employee nowiki /nowiki nowiki /nowiki abuses access privileges share classified information specific cases mentioned nidal malik hasan wikileaks source chelsea manning commercial applications may include finance intended recipients system output operators counterintelligence agencies proactive discovery insider threats using graph analysis learning part adams project georgia tech team includes noted high-performance computing researcher david a. bader | [
429,
8012,
5113
] | Test |
5,221 | 4 | Astalavista.box.sk:astalavista.box.sk astalavista.box.sk founded 1994 one first search engines computer security information practice turned used search engine security exploits software hacking cracking different keygenerators software cracks site also known referencing things spyware viruses website known possibly contain data links downloadable files information users would consider spyware adware unwanted programs astalavista.box.sk hosted slovakia astalavista pun spanish phrase said terminator hasta la vista baby meaning see later baby 90 web search engine altavista note altavista 1995 astalavista 1994 astalavista also used refer computer security related websites like astalavista security group | [
5401,
3486,
1805
] | Test |
5,222 | 9 | CS-4_(programming_language):cs-4 programming language cs-4 programming language operating system interface developed early 1970s intermetrics cambridge massachusetts first published manual released december 1973 entitled cs-4 language reference manual operating system interface document three parts cs-4 base language capabilities cs-4 operating system interface overview full cs-4 capabilities little known cs-4 language developed united states navy 1970s ongoing research project continuing study extensibility abstraction techniques develop requirement language simple compact language first documented 1973 miller et al. revised 1975 allow data abstractions powerful extension facilities | [] | Test |
5,223 | 4 | Open_Vulnerability_and_Assessment_Language:open vulnerability assessment language open vulnerability assessment language oval international information security community standard promote open publicly available security content standardize transfer information across entire spectrum security tools services oval includes language used encode system details assortment content repositories held throughout community language standardizes three main steps assessment process repositories collections publicly available open content utilize language oval community developed three schemas written extensible markup language xml serve framework vocabulary oval language schemas correspond three steps assessment process oval system characteristics schema representing system information oval definition schema expressing specific machine state oval results schema reporting results assessment content written oval language located one many repositories found within community one repository known oval repository hosted mitre corporation central meeting place oval community discuss analyze store disseminate oval definitions definition oval repository determines whether specified software vulnerability configuration issue program patch present system information security community contributes development oval participating creation oval language oval developers forum writing definitions oval repository oval community forum oval board consisting representatives broad spectrum industry academia government organizations around world oversees approves oval language monitors posting definitions hosted oval web site means oval funded us-cert u.s. department homeland security benefit community reflects insights combined expertise broadest possible collection security system administration professionals worldwide oval used security content automation protocol scap oval language standardizes three main steps assessment process representing configuration information systems testing analyzing system presence specified machine state vulnerability configuration patch state etc reporting results assessment oval interpreter freely available reference implementation created show data collected computer testing based set oval definitions evaluated determine results definition oval interpreter demonstrates usability oval definitions used definition writers ensure correct syntax adherence oval language development draft definitions fully functional scanning tool simplistic user interface running oval interpreter provide list result values evaluated definition oval repository central meeting place oval community discuss analyze store disseminate oval definitions repositories community also host oval content include oval system characteristics files oval results files well definitions oval repository contains community-developed oval vulnerability compliance inventory patch definitions supported operating systems definitions free use implement information security products services oval repository top contributor award program grants awards quarterly basis top contributors oval repository repository community effort contributions new content modifications instrumental success awards serve public recognition organization ’ support oval repository incentive others contribute organizations receiving award also receive oval repository top contributor logo indicating quarter award e.g. 1st quarter 2007 may used see fit awards granted organizations made significant contribution new modified content quarter oval board advisory body provides valuable input oval moderator currently mitre important organizational support oval individuals sit oval board input activity truly make difference board ’ primary responsibilities work moderator community define oval provide input oval ’ strategic direction advocate oval community | [
2185,
2891
] | Validation |
5,224 | 9 | Divergence_(computer_science):divergence computer science computer science computation said diverge terminate terminates unobservable exceptional state otherwise said converge domains computations expected infinite process calculi computation said diverge fails productive always produces action within finite amount time various subfields computer science use varying mathematically precise definitions means computation converge diverge abstract rewriting abstract rewriting system called convergent confluent terminating notation ↓ n means reduces normal form n zero reductions ↓ means reduces normal form zero reductions ↑ means reduce normal form latter impossible terminating rewriting system lambda calculus expression divergent normal form denotational semantics object function f → b modelled mathematical function formula_1 ⊥ bottom indicates object function argument diverges calculus communicating sequential processes divergence drastic situation process performs endless series hidden actions example consider following process defined csp notation traces process defined consider following process conceals tick event clock process definition p called divergent process | [
1348,
5224
] | Test |
5,225 | 3 | MMIX:mmix mmix pronounced em-mix 64-bit reduced instruction set computing risc architecture designed donald knuth significant contributions john l. hennessy contributed design mips architecture richard l. sites architect alpha architecture knuth said mmix computer intended illustrate machine-level aspects programming books art computer programming replaces mix 1960s-style machine formerly played role… strove design mmix machine language would simple elegant easy learn time careful include complexities needed achieve high performance practice mmix could principle built even perhaps competitive fastest general-purpose computers marketplace mmix big-endian 64-bit reduced instruction set computer risc 256 64-bit general-purpose registers 32 64-bit special-purpose registers fixed-length 32-bit instructions 64-bit virtual address space mmix instruction set comprises 256 opcodes one reserved future expansion mmix uses ieee 754 floating-point numbers instructions associated mnemonic example instruction 20 32 associated add instructions symbolic form op x z op specifies sort instruction x specifies register used store result instruction rest specify operands instruction fields eight bits wide example add 0 1,3 means set 0 sum 1 3 instructions take either immediate values register contents thus single instruction mnemonic may correspond one two opcodes mmix programs typically constructed using mmixal assembly language simple mmixal program prints string hello world 256 directly addressable general-purpose architectural registers mmix chip designated 0 255 32 special-purpose architectural registers special-purpose registers accessed get put instructions two special registers rl rg determine general registers local global registers 0 ... local registers represent window internal stack registers registers rl ... marginal registers always return 0 used source operation using marginal register destination operation cause machine automatically increase rl include register registers rg ... 255 called global registers part register stack local register stack provides subroutine rl local registers designated 0 whenever subroutine called number local registers pushed stack shifting start window arguments called subroutine left remaining local registers subroutine finishes pops previously pushed registers internal stack contain finite number registers may necessary store part stack memory implemented special registers ro rs record part local register stack memory part still local physical registers register stack provides fast subroutine linkage 32 special physical architectural registers follows like programs running almost cpus mmix programs interrupted several ways external hardware timers common source preemption computing interrupts many instructions cause interrupts certain exceptional cases memory protection page fault exceptions used implement virtual memory floating point exception handling mmix 2 kinds interrupts trips traps main difference trips traps traps send control trap handler program operating system trapping trips send control trip handler program user application tripping users also force interrupt handler run explicit software interrupt instructions trip trap similar kinds trap computer systems particular system call user program operating system uses trap instruction known hardware implementations mmix instruction set architecture exist however fpgammix project implements mmix verilog making possible implement using field-programmable gate array mmix instruction set architecture supported number software tools computer architecture research software development gnu compiler collection includes mmix back-end c/c++ compilers contributed hans-peter nilsson part main gcc distribution since late 2001. mmix back-end gcc continues actively developed maintained volunteers tools could theoretically used compile build bootstrap entire freebsd linux similar operating system kernel onto mmix hardware hardware exist | [
622,
5893,
1252,
7533,
7541,
578,
5055,
2226,
4254,
3557,
6922,
3219,
2266,
154,
1880,
336,
5962,
7777,
1435
] | Validation |
5,226 | 4 | GadgetTrak:gadgettrak gadgettrak company based portland oregon develops theft recovery data protection software name company founded february 2007 ken westin launch first theft recovery product usb mass storage devices tracked stolen devices including ipods flash drives digital cameras devices connected computer company issued patent technology february 24 2009 gadgettrak technology featured special segment dateline ipod theft tracked stolen ipods confronted thieves customized version technology embedded flir thermal imaging cameras part exclusive licensing agreement name thermatrak utilized theft recovery well export controls company issued two patents groundbreaking technologies patent 9,083,624 applies process tracking lost stolen computing devices use wi-fi and/or gps and/or cellular triangulation patent 7,496,201 applies process tracking recovering devices ipods flash drives digital cameras windows blackberry october 2008 company launched gadgettrak mobile security app blackberry windows mobile devices apple iphones november 4 2008 company launched first mobile security software app apple iphone year half apple launched find iphone android devices ces 2012 company launched version gadgettrak mobile security android devices along android release upgrades added including web based control panel activate tracking remotely wipe data device encrypt backup data well enterprise group management console launch application put test chain sprint stores installed software demo units one store tigard oregon several devices stolen help gadgettrak mobile security app able recover devices apprehend thieves mac laptops november 12 2008 company launched mac laptop version software utilizes web camera capture photo thief well utilization wi-fi positioning provide location within 10–20 meters shortly product launch number stolen laptop recoveries using software first brooklyn new york stolen imac tracked tattoo parlor police recovered stolen computer along stolen property windows laptops april 2009 company launched windows version laptop software expanding product offering gadgettrak claims many firsts regards devices recovered methods used | [
4759,
5571,
578
] | Test |
5,227 | 4 | MSAV:msav microsoft anti-virus msav antivirus program introduced microsoft ms-dos operating system program first appeared ms-dos version 6.0 last appeared ms-dos 6.22 first version antivirus program basic inbuilt update facility updates obtained bbs manually installed user could scan 1,234 different viruses microsoft anti-virus windows mwav included part package front end allowed msav run properly windows 3.1x microsoft anti-virus supplied central point software inc. later acquired symantec 1994 integrated symantec norton antivirus product stripped version central point anti-virus cpav product central point software inc. licensed carmel software engineering haifa israel carmel software sold product turbo anti-virus domestically abroad microsoft anti-virus windows also provided central point software msav featured detect clean strategy detection boot sector trojan horse-type viruses typical virus problems time program also anti-stealth check sum feature could used detect changes normal files technology intended make unavailability regular update packages final update msav released june 1996 symantec update added ability detect polymorphic viruses virus definitions updated scan total 2,371 viruses vsafe terminate stay resident component msav provided real-time virus protection default vsafe following features enabled vsafe vsafe number virus definitions embedded within executable capable loading additional signatures updates external definition file | [
1620,
1721,
3962,
2746,
5571,
3551,
7564,
6380,
6762,
2784,
7867,
4645
] | Test |
5,228 | 8 | DataNucleus:datanucleus datanucleus formerly known java persistent objects jpox open source project apache 2 license provides software products around data management java datanucleus project started 2008 jpox project started 2003 relaunched datanucleus 2008 broader scope datanucleus access platform fully compliant implementation java data objects jdo 1.0 2.0 2.1 2.2 3.0 3.1 3.2 specifications jsr 0012 jsr 0243 java persistence api jpa 1.0 2.0 2.1 2.2 specifications jsr 0220 jsr 0317 jsr 0338 providing transparent persistence java objects supports persistence widest range datastores java persistence software supporting main object-relational mapping orm patterns allows querying using either jdoql jpql sql comes byte-code enhancer allows persistence relational datastores rdbms object-based datastores db4o neodatis odb document-based storage xml excel opendocument spreadsheets web-based storage json google storage amazon simple storage service map-based datastores hbase google bigtable apache cassandra graph-based datastores neo4j document stores mongodb well types datastores e.g ldap plugins osgi-compliant used equally osgi environment datanucleus access platform also utilised persistence layer behind google app engine java vmforce cloud offering salesforce.com vmware | [
4185,
840,
2180,
5455,
7037,
7109,
2660,
3542,
6594,
2623
] | Test |
5,229 | 4 | KidGuard:kidguard kidguard parental monitoring application ios android mobile phones application uses proprietary software help parents monitor children ’ text messages browser history social media activity stored videos photos emails phone gps location kidguard developed los angeles-based team officially released 2016 kidguard launch application received coverage abc news inc. magazine 2017 kidguard partnered startup incubator onramp lab located taipei taiwan year international security consultant gene yu joined kidguard advisory board aid kidnapping response prevention measures following software service model kidguard run web application allows parent view activity child phone including kidguard also includes feature calls situation 360 report application automatically creates report aid law enforcement event child disappearance report includes full profile child recent locations behavior message history critics raised concerns potential capability kidguard competitors violate privacy laws used tool stalkers abusers may 2018 kidguard featured new york times article criticized application developers running advertisements aimed adults attempting spy spouses discover infidelity kidguard contacted comment spokesman responded advertisements developed marketing partner content relating infidelity subsequently removed kidguard website kidguard maintains annual kidguard education essay scholarship high school students united states scholarship awarded undisclosed number participants based results essay content whose topics concern online safety cyberbullying 2017 kidguard donated 25,000 grants 18 non-profit organizations focused child safety online threat prevention largest grant 5,000 awarded megan meier foundation | [
330,
5571
] | Train |
5,230 | 2 | Opaque_binary_blob:opaque binary blob opaque binary blob obb term used network engineering computer science refer sizeable piece data looks like binary garbage outside entities know blob denotes carries make sense entities access permission access functions also pejorative term compiled code without source code made available see binary blob least one network protocol advanced message queuing protocol uses terminology obb android operating systems starting version 2.3 code named gingerbread use obbs refer one blob multiple files maybe even file system whole file system one file obbs available storage manager interface android done means abstraction multiple applications running operating system easily access obb example map database map obb multiple applications running android 2.3 access maps eliminates need maintain different map data different applications similar functions features many hd games android platform use obb files allow storage large files device external sd card tuxedo middleware also uses obbs mention c c++ arrays typed data buffers probably input needed experts oldest reference obbs used computer system vendor distributes software object binary form without mention inner workings code called 'proprietary obb 'proprietary blob binary blob practice protect company intellectual property probably keep competitive edge see proprietary software also prevents hackers improving system subverting example nvidia tegra 'proprietary obb | [
1361,
1864,
1435,
5571
] | Test |
5,231 | 4 | HoneyMonkey:honeymonkey honeymonkey short strider honeymonkey exploit detection system microsoft research honeypot implementation uses network computers crawl world wide web searching websites use browser exploits install malware honeymonkey computer snapshot memory executables registry honeypot computer recorded crawling site visiting site state memory executables registry recorded compared previous snapshot changes analyzed determine visited site installed malware onto client honeypot computer honeymonkey based honeypot concept difference actively seeks websites try exploit term coined microsoft research 2005 honeymonkeys possible find open security holes yet publicly known exploited attackers single honeymonkey automated program tries mimic action user surfing net series honeymonkeys run virtual machines running windows xp various levels patching — fully patched fully vulnerable others two extremes honeymonkey program records every read write file system registry thus keeping log data collected web-site software installed program leaves site log analyzed determine malware loaded cases log actions sent manual analysis external controller program logs exploit data restarts virtual machine allow crawl sites starting known uninfected state 10 billion plus web pages many legitimate sites use exploit browser vulnerabilities start crawling sites would waste resources initial list therefore manually created listed sites known use browser vulnerabilities compromise visiting systems malware honeymonkey system follows links exploit sites higher probability leading exploit sites honeymonkey system also records many links point exploit site thereby giving statistical indication easily exploit site reached honeymonkey uses black box system detect exploits i.e. use signature browser exploits detect exploits monkey program single instance honeymonkey project launches internet explorer visit site also records registry file read write operations monkey allow pop-ups allow installation software read write happens internet explorer temporary folder therefore must used browser exploits analyzed malware detection programs manually analyzed monkey program restarts virtual machine crawl another site fresh state | [
4135,
4159,
5571,
80,
2772,
1649,
84,
4858
] | Validation |
5,232 | 3 | Monolithic_kernel:monolithic kernel monolithic kernel operating system architecture entire operating system working kernel space monolithic model differs operating system architectures microkernel architecture alone defines high-level virtual interface computer hardware set primitives system calls implement operating system services process management concurrency memory management device drivers added kernel modules modular operating systems os-9 modern monolithic operating systems openvms linux bsd sunos aix multics dynamically load unload executable modules runtime modularity operating system binary image level architecture level modular monolithic operating systems confused architectural level modularity inherent server-client operating systems derivatives sometimes marketed hybrid kernel use microkernels servers mistaken modules daemons practically speaking dynamically loading modules simply flexible way handling operating system image runtime—as opposed rebooting different operating system image modules allow easy extension operating systems capabilities required dynamically loadable modules incur small overhead compared building module operating system image however cases loading modules dynamically as-needed helps keep amount code running kernel space minimum example minimize operating system footprint embedded devices limited hardware resources namely unloaded module need stored scarce random access memory | [
4291,
4297,
4300,
2909,
5724,
13,
7172,
2933,
2935,
42,
4347,
58,
65,
5783,
1521,
1522,
7242,
4397,
7251,
4400,
126,
3023,
4423,
1574,
3041,
4441,
5865,
4453,
7325,
190,
1629,
204,
4496,
1648,
7378,
1663,
1668,
4534,
7396,
5962,
4549,
... | Test |
5,233 | 2 | NTLMSSP:ntlmssp ntlmssp nt lan manager ntlm security support provider binary messaging protocol used microsoft security support provider interface sspi facilitate ntlm challenge-response authentication negotiate integrity confidentiality options ntlmssp used wherever sspi authentication used including server message block cifs extended security authentication http negotiate authentication e.g iis iwa turned msrpc services ntlmssp ntlm challenge-response protocol documented microsoft open protocol specification | [
1460,
3135
] | Test |
5,234 | 9 | QBasic:qbasic qbasic short form quick beginners purpose symbolic instruction code integrated development environment interpreter variety basic programming languages based quickbasic code entered ide integrated development environment compiled intermediate representation ir ir immediately interpreted demand within ide run nearly versions dos 32-bit versions windows emulation via dosbox/dosemu linux freebsd 64-bit versions windows qbasic dos program requires dos dos emulator windows xp comes emulator called dos virtual machine subsequent versions windows require emulator dosbox time qbasic provided state-of-the-art ide including debugger features on-the-fly expression evaluation code modification supports various inbuilt functions like quickbasic unlike earlier versions microsoft basic qbasic structured programming language supporting constructs subroutines line numbers concept often associated basic supported compatibility considered good form replaced descriptive line labels qbasic limited support user-defined data types structures several primitive types used contain strings text numeric data qbasic intended replacement gw-basic based earlier quickbasic 4.5 compiler without quickbasic compiler linker elements version 1.0 shipped together ms-dos 5.0 higher well windows 95 windows nt 3.x windows nt 4.0 ibm recompiled qbasic included pc dos 5.x well os/2 2.0 onwards ecomstation descended os/2 code includes qbasic 1.0 qbasic 1.1 included ms-dos 6.x without codice_1 windows 95 windows 98 windows starting windows 2000 microsoft longer includes qbasic operating systems still obtained use newer versions windows qbasic well built-in ms-dos editor backwards-compatible dos releases prior 5.0 least dos 3.20 however used 8088/8086 computers 80286 computers qbasic program may run slowly perhaps due dos memory size limits ms-dos 7 ms-dos editor help required qbasic codice_2 codice_3 programs simply started qbasic editor help mode also entered running codice_4 codice_5 codice_6 switches i.e. command lines codice_7 codice_8 qbasic came complete four pre-written example programs nibbles variant snake game gorillas artillery game money manager personal finance manager remline q-basic code line-number-removing program qbasic easter egg see press hold screenprint seen easter egg archive qbasic page | [
4291,
1812,
4296,
5367,
12,
6088,
2925,
7906,
4697,
2941,
3303,
53,
61,
425,
4003,
5784,
1140,
4012,
4745,
447,
6507,
4387,
4759,
7246,
7619,
7621,
7971,
2283,
2999,
6891,
5480,
5129,
6907,
5137,
5138,
7272,
1213,
2341,
5877,
7308,
4464... | Test |
5,235 | 9 | The_Computer_Language_Benchmarks_Game:computer language benchmarks game computer language benchmarks game formerly called great computer language shootout free software project comparing given subset simple algorithms implemented various popular programming languages project consists due resource constraints small subset common programming languages supported discretion game operator following aspects given implementation measured common see multiple solutions programming language problem highlights within bounds given language solution given either high abstraction memory efficiency fast parallelizes better design choice start include simple toy problems providing different kind programming challenge provides users benchmark game opportunity scrutinize various implementations project known great computer language shootout 2007 port windows maintained separately 2002 2003 sources archived gitlab also older forks github project continuously evolving list supported programming languages updated approximately per annum following market trends users also submit improved solutions problems suggest testing methodology refinement developers highlight fact research exercise caution using microbenchmarks benchmark results uncovered various compiler issues sometimes given compiler failed process unusual otherwise grammatically valid constructs times runtime performance shown expectations prompted compiler developers revise optimization capabilities various research articles based benchmarks results methodology | [
2740,
5983,
1445,
3219,
3753,
7848,
3879
] | Test |
5,236 | 2 | List_of_open-source_mobile_phones:list open-source mobile phones list mobile phones open-source operating systems available mobile phones proprietary baseband chip gsm module open-source baseband project osmocombb project based illicit leaked source code calypso modem called freecalypso android-based devices appear list heavy use proprietary components particularly drivers applications numerous versions android lineageos successor now-defunct cyanogenmod freedom-respecting replicant installed large number phones after-market webos initially available proprietary license source code later released free license hp still open webos run webos devices sailfish os proprietary user interface atop mer software distribution main components make open mobile phone postmarketos ubports kde neon open-source distributions running existing smartphones originally running android maemo leste available nokia n900 motorola droid 4 possible home-build phone partially open hardware software arduinophone touchscreen mit diy cellphone segmented display use arduino open-hardware single-board computer added components piphone zerophone similar based raspberry pi | [
1066,
2538,
3933,
2,
5718,
6788,
3081,
6515,
2187,
1167,
289,
3524,
4400,
3097,
474,
4317,
2564,
7049,
5391,
2300,
5486,
6443,
5579,
1284,
740,
1202,
1108,
1957,
7919,
5062,
1399,
3039,
1582,
5068,
2503,
2240,
3734,
424,
1973,
7030,
233... | Validation |
5,237 | 8 | Optimizely:optimizely optimizely american company makes customer experience optimization software companies optimizely platform technology provides a/b testing tools two versions web page compared performance multivariate testing optimizely also enables personalization may used making data-driven decisions personalization capability used serving online advertising company headquarters san francisco california offices amsterdam netherlands cologne germany london united kingdom sydney australia optimizely founded 2010 dan siroker pete koomen formerly google optimizely completed combinator program winter 2010 november 2010 optimizely closed us 1.2 million funding round angel investors company became cash flow positive 2011 may 2012 optimizely announced raised new funding battery ventures google ventures interwest partners april 2013 optimizely raised 28 million series round funding round led benchmark participation bain capital ventures optimizely existing investors battery ventures interwest partners google ventures benchmark peter fenton joined optimizely board directors part larger international expansion plan optimizely announced april 2013 launch platform nine additional languages danish dutch french german italian japanese portuguese spanish swedish april 17 optimizely held first opticon user conference announced launch new mobile app a/b testing software may 2014 optimizely raised 57 million series b funding round led andreessen horowitz participation benchmark bain capital ventures part round scott weiss general partner andreessen horowitz joined optimizely board directors october 2015 company released second product mobile website personalization month optimizely raised 58 million series c funding led index ventures participation firms andreessen horowitz bain capital ventures battery ventures benchmark capital citi ventures danhua capital salesforce ventures tenaya capital part round ilya fushman index joined optimizely board directors march 10 2016 optimizely laid 40 employees 10 workforce september 2016 company released optimizely x expanded solutions web experimentation personalization recommendations mobile full stack ott july 2017 jay larson replaced dan siroker company ceo pete koomen company cto 2012 co-founder dan joseph siroker became company executive chairman july 2017 optimizely experimentation platform called optimizely x tools web experimentation personalization recommendations mobile full stack over-the-top content optimization delivered software service saas model opticon user conference organized optimizely focused web experience optimization first opticon conference held april 17 2014 san francisco optimizely announced mobile a/b testing product second opticon conference held june 17 18 2015 also san francisco announced new personalization product marc andreessen keynote speaker | [
7037,
330,
5237,
479
] | Validation |
5,238 | 2 | Outline_of_iOS:outline ios following outline provided overview topical guide ios ios – mobile operating system developed distributed apple inc originally released 2007 iphone ipod touch since extended support apple devices ipad apple tv unlike windows ce mobile phone android apple license ios installation non-apple hardware history iphone | [
6788,
3940,
7890,
4320,
2926,
4690,
734,
5752,
6125,
2954,
1123,
6847,
6142,
1895,
4749,
7601,
2284,
1940,
2300,
3025,
2665,
1582,
2327,
6565,
2331,
3050,
4820,
1599,
6582,
1234,
5189,
889,
6971,
552,
7335,
3445,
3107,
5579,
1654,
1656,
... | Test |
5,239 | 3 | Paxos_(computer_science):paxos computer science paxos family protocols solving consensus network unreliable processors processors may fail consensus process agreeing one result among group participants problem becomes difficult participants communication medium may experience failures consensus protocols basis state machine replication approach distributed computing suggested leslie lamport surveyed fred schneider state machine replication technique converting algorithm fault-tolerant distributed implementation ad-hoc techniques may leave important cases failures unresolved principled approach proposed lamport et al ensures cases handled safely paxos protocol first published 1989 named fictional legislative consensus system used paxos island greece later published journal article 1998 paxos family protocols includes spectrum trade-offs number processors number message delays learning agreed value activity level individual participants number messages sent types failures although deterministic fault-tolerant consensus protocol guarantee progress asynchronous network result proved paper fischer lynch paterson paxos guarantees safety consistency conditions could prevent making progress difficult provoke paxos usually used durability required example replicate file database amount durable state could large protocol attempts make progress even periods bounded number replicas unresponsive also mechanism drop permanently failed replica add new replica topic predates protocol 1988 lynch dwork stockmeyer demonstrated solvability consensus broad family partially synchronous systems paxos strong similarities protocol used agreement viewstamped replication first published oki liskov 1988 context distributed transactions notwithstanding prior work paxos offered particularly elegant formalism included one earliest proofs safety fault-tolerant distributed consensus protocol reconfigurable state machines strong ties prior work reliable group multicast protocols support dynamic group membership example birman work 1985 1987 virtually synchronous gbcast protocol however noted gbcast unusual supporting durability addressing partitioning failures reliable multicast protocols lack properties required implementations state machine replication model point elaborated paper lamport malkhi zhou paxos protocols members theoretical class solutions problem formalized uniform agreement crash failures lower bounds problem proved keidar shraer derecho c++ software library cloud-scale state machine replication offers paxos protocol integrated self-managed virtually synchronous membership protocol matches keidar shraer optimality bounds maps efficiently modern remote dma rdma datacenter hardware uses tcp rdma available order simplify presentation paxos following assumptions definitions made explicit techniques broaden applicability known literature covered article general consensus algorithm make progress using formula_1 processors despite simultaneous failure formula_2 processors words number non-faulty processes must strictly greater number faulty processes however using reconfiguration protocol may employed survives number total failures long f fail simultaneously paxos describes actions processors roles protocol client acceptor proposer learner leader typical implementations single processor may play one roles time affect correctness protocol—it usual coalesce roles improve latency and/or number messages protocol quorums express safety consistency properties paxos ensuring least surviving processor retains knowledge results quorums defined subsets set acceptors two subsets two quorums share least one member typically quorum majority participating acceptors example given set acceptors b c majority quorum would three acceptors b c c b b c generally arbitrary positive weights assigned acceptors case quorum defined subset acceptors summary weight greater half total weight acceptors attempt define agreed value v performed proposals may may accepted acceptors proposal uniquely numbered given proposer e.g. proposal may form n v n unique identifier proposal v actual proposed value value corresponding numbered proposal computed part running paxos protocol need order guarantee safety also called consistency paxos defines three properties ensures always held regardless pattern failures deployments paxos participating process acts three roles proposer acceptor learner reduces message complexity significantly without sacrificing correctness merging roles protocol collapses efficient client-master-replica style deployment typical database community benefit paxos protocols including implementations merged roles guarantee safety properties typical implementation message flow covered section multi-paxos protocol basic paxos family instance execution basic paxos protocol decides single output value protocol proceeds several rounds successful round 2 phases phase 1 divided parts b phase 2 divided parts b see description phases remember assume asynchronous model e.g processor may one phase another processor may another accept message interpreted request accept proposal please note acceptor accept multiple proposals happen another proposer unaware new value decided starts new round higher identification number n case acceptor promise later accept new proposed value even though accepted another one earlier proposals may even different values presence certain failures however paxos protocol guarantee acceptors ultimately agree single value following diagrams represent several cases/situations application basic paxos protocol cases show basic paxos protocol copes failure certain redundant components distributed system note values returned promise message null first time proposal made since acceptor accepted value round diagram 1 client 1 proposer 3 acceptors i.e quorum size 3 2 learners represented 2 vertical lines diagram represents case first round successful i.e process network fails v last va vb vc simplest error cases failure acceptor quorum acceptors remains alive failure redundant learner cases protocol requires recovery i.e still succeeds additional rounds messages required shown next two diagrams/cases following diagram one acceptors quorum fails quorum size becomes 2 case basic paxos protocol still succeeds following case one redundant learners fails basic paxos protocol still succeeds case proposer fails proposing value agreement reached specifically fails middle accept message one acceptor quorum receives value meanwhile new leader proposer elected shown detail note 2 rounds case rounds proceed vertically top bottom complex case multiple proposers believe leaders instance current leader may fail later recover proposers already re-selected new leader recovered leader learned yet attempts begin one round conflict current leader diagram 4 unsuccessful rounds shown could suggested bottom diagram typical deployment paxos requires continuous stream agreed values acting commands distributed state machine command result single instance basic paxos protocol significant amount overhead would result leader relatively stable phase 1 becomes unnecessary thus possible skip phase 1 future instances protocol leader achieve round number included along value incremented round leader multi-paxos reduces failure-free message delay proposal learning 4 delays 2 delays following diagram one instance execution basic paxos protocol initial leader proposer shown note multi-paxos consists several instances basic paxos protocol v last va vb vc case subsequence instances basic paxos protocol represented i+1 use leader phase 1 subsequent instances basic paxos protocol consist prepare promise sub-phases skipped note leader stable i.e crash change common deployment multi-paxos consists collapsing role proposers acceptors learners servers end clients servers following diagram represents first instance basic paxos protocol roles proposer acceptor learner collapsed single role called server subsequent instances basic paxos protocol leader previous instances basic paxos protocol phase 1 skipped number optimisations performed reduce number exchanged messages improve performance protocol etc optimisations reported cheap paxos extends basic paxos tolerate f failures f+1 main processors f auxiliary processors dynamically reconfiguring failure reduction processor requirements comes expense liveness many main processors fail short time system must halt auxiliary processors reconfigure system stable periods auxiliary processors take part protocol two processors p q one processor distinguish failure processor failure communication medium third processor needed however third processor participate choosing sequence commands must take action case p q fails nothing either p q continues operate system third processor therefore small/slow/cheap one processor primarily devoted tasks example involving three main acceptors one auxiliary acceptor quorum size three showing failure one main processor subsequent reconfiguration fast paxos generalizes basic paxos reduce end-to-end message delays basic paxos message delay client request learning 3 message delays fast paxos allows 2 message delays requires 1 system comprised 3f+ 1 acceptors tolerate f faults instead classic 2f+1 2 client send request multiple destinations intuitively leader value propose client could send accept message acceptors directly acceptors would respond basic paxos sending accepted messages leader every learner achieving two message delays client learner leader detects collision resolves collision sending accept messages new round accepted usual coordinated recovery technique requires four message delays client learner final optimization occurs leader specifies recovery technique advance allowing acceptors perform collision recovery thus uncoordinated collision recovery occur three message delays two message delays learners also acceptors generalized consensus explores relationship operations replicated state machine consensus protocol implements main discovery involves optimizations paxos conflicting proposals could applied order i.e. proposed operations commutative operations state machine cases conflicting operations accepted avoiding delays required resolving conflicts re-proposing rejected operations concept generalized ever-growing sequences commutative operations known stable thus may executed protocol tracks sequences ensuring proposed operations one sequence stabilized allowing operation non-commuting become stable order illustrate generalized paxos example shows message flow two concurrently executing clients replicated state machine implementing read/write operations two distinct registers b note table indicates operations non-commutative possible sequence operations since codice_1 commutes codice_2 codice_3 one possible permutation equivalent previous order following practice commute occurs operations proposed concurrently message flow shows us generalized paxos leverage operation semantics avoid collisions spontaneous ordering network fails allows protocol practice quicker fast paxos however collision occurs generalized paxos needs two additional round trips recover situation illustrated operations writeb readb schema general case round trips unavoidable come fact multiple commands accepted round makes protocol expensive paxos conflicts frequent hopefully two possible refinements generalized paxos possible improve recovery time paxos may also extended support arbitrary failures participants including lying fabrication messages collusion participants selective non-participation etc types failures called byzantine failures solution popularized lamport byzantine paxos introduced castro liskov adds extra message verify acts distribute knowledge verify actions processors fast byzantine paxos introduced martin alvisi removes extra delay since client sends commands directly acceptors note accepted message fast byzantine paxos sent acceptors learners fast paxos sends accepted messages learners failure scenario protocols learner waits receive f+1 identical messages different acceptors occur acceptors also aware since exchanged messages broadcast round correct acceptors re-broadcast agreed value emergence high speed reliable datacenter networks support remote dma rdma substantial interest optimizing paxos leverage hardware offloading network interface card network routers provide reliability network-layer congestion control freeing host cpu tasks derecho c++ paxos library open-source paxos implementation explores option derecho offers classic paxos data durability across full shutdown/restart sequences vertical paxos atomic multicast in-memory replication state-machine synchronization paxos protocols employed derecho needed adapted maximize asynchronous data streaming remove sources delay leader critical path enables derecho sustain full bidirectional rdma data rate contrast although traditional paxos protocols migrated rdma network simply mapping message send operations native rdma operations leaves round-trip delays critical path high-speed rdma networks even small delays large enough prevent utilization full potential bandwidth | [
1906,
5455,
5106,
5476,
3101,
1550,
3542,
43,
5408,
5602,
8124,
2359,
2701,
86,
2536
] | Train |
5,240 | 5 | LysKOM:lyskom lyskom kom-based conferencing system developed lysator academic computer society linköping university linköping institute technology seen cross news e-mail presence speed irc im-networks common client lyskom emacs lisp client among others www-based client also exists server clients released terms gnu general public license thus free software lyskom protocol uses port 4894 protocol implementations exist python perl pike based frameworks number programs bridging lyskom systems written notable among python software importing exporting e-mail used whole enables lyskom system act primitive list manager configuring exporter reexport imported e-mail also possible use lyskom like multi-user e-mail client posting mailing lists lyskom also refers specific installation hosted lysator kom.lysator.liu.se | [
5983,
5965,
2281,
2600
] | Test |
5,241 | 3 | XLink_Kai:xlink kai xlink kai method developed team-xlink online play video games support lan multiplayer modes enables players nintendo gamecube nintendo switch playstation 2 playstation 3 playstation 4 playstation portable playstation vita xbox xbox 360 xbox one play games across internet using network configuration simulates local area network lan notably also allows original xbox games played online following xbox live shutdown april 21 2010 similar save nintendo wi-fi wii certain gamespy titles saints row 2 played online gamespy network shutdown may 31 2014 purpose software allow consoles network internet via consoles local network play capabilities xlink kai acts tunneling software installed compatible microsoft windows macos linux computer network console upon console initiating game network play feature console requests routed computer xlink listening requests allows consoles found internet search making appear player console consoles simply connected local network modified modded xbox consoles much functionality provided directly within xbox media center xbmc xbox gui kai client still required running computer user network players control connections directly console also possible run kai client linux-based devices wireless routers nas devices running third party firmware replacements dd-wrt slugos users log onto xlink servers using xtag username similar gamertag xbox live xlink arenas compatible system link game popular games halo 2 sub-arenas based regions within attempt minimize lag players arenas automatically synced simulating lan connection thus able play games normally using system link functions addition game arenas kai general chat room quarantine arena moderators isolate abusive players xlink also lets players create self-moderated private arenas xlink kai supports nintendo gamecube playstation 2 nintendo switch playstation 3 playstation 4 playstation portable playstation vita xbox xbox 360 xbox one lan enabled games features integrated chat lobbies players meet converse prior starting game session clan tournament ladder lobbies also integrated games list compatible games found team-xlink website special considerations made xbox 360 designed microsoft incompatible kind software console automatically drop connections ping 30 milliseconds system link connection however patch released bypass limit modified consoles one point support nintendo ds planned never completed xbmc microsoft xbox console control client xlink kai allows control xlink kai software program user xbox via xbmc gui mc360 skin xbmc blackbolt gives xlink kai client xbmc-live familiar interface resembling xbox 360 factory dashboard xbox live connectivity friends arenas etc xlink kai removed xbmc builds 14099 later | [
7534,
5876,
4759,
6879,
5571,
5488,
578,
7049
] | Test |
5,242 | 4 | Data_Security_Council_of_India:data security council india data security council india dsci premier industry body data protection india setup nasscom® committed making cyberspace safe secure trusted establishing best practices standards initiatives cyber security privacy dsci brings together national governments agencies industry sectors including it-bpm bfsi telecom industry associations data protection authorities think tanks public advocacy thought leadership capacity building outreach initiatives dsci engages governments regulators industry associations think tanks policy matters strengthen thought leadership cyber security privacy dsci develops best practices frameworks publishes studies surveys papers builds capacity security privacy cyber forensics training certification program professionals law enforcement agencies engages stakeholders various outreach initiatives including events awards chapters consultations membership programs dsci also endeavors increase india ’ share global security product services market global trade development initiatives aim strengthen security privacy culture india dsci certified privacy professional dcpp© | [
1613,
1805
] | Test |
5,243 | 3 | Pipeline_stall:pipeline stall design pipelined computer processors pipeline stall delay execution instruction order resolve hazard decoding stage control unit determine decoded instruction reads register instruction currently execution stage writes condition holds control unit stall instruction one clock cycle also stalls instruction fetch stage prevent instruction stage overwritten next instruction program prevent new instructions fetched instruction decoding stage stalled value pc register instruction fetch stage preserved prevent changes values preserved instruction causing conflict passed execution stage event often called bubble analogy air bubble fluid pipe architectures execution stage pipeline must always performing action every cycle case bubble implemented feeding nop operation instructions execution stage bubble flushed past following two executions four instructions 4-stage pipeline whatever reason delay fetching purple instruction cycle 2 leads bubble created delaying instructions well example shows bubble inserted classic risc pipeline five stages instruction fetch id instruction decode ex execute mem memory access wb register write back example data available mem stage 4th stage first instruction required input ex stage 3rd stage second instruction without bubble ex stage 3rd stage access output previous ex stage thus adding bubble resolves time dependence without needing propagate data backwards time impossible | [
5012,
1447,
5371,
3948,
7527,
7529,
7533,
5737,
2567,
4694,
5042,
1854,
1481,
5055,
2226,
1867,
2248,
6148,
441,
2266,
4047,
5483,
1556,
5487,
1947,
6198,
1568,
1570,
6922,
7666,
515,
8024,
5521,
3747,
1237,
6236,
534,
2351,
7314,
1252,
... | Validation |
5,244 | 2 | CP/CMS:cp/cms cp/cms control program/cambridge monitor system discontinued time-sharing operating system late 60s early 70s known excellent performance advanced features three distinct versions implementation substantial redesign predecessor evolutionary step forward cp-67/cms first widely available virtual machine architecture ibm pioneered idea research systems m44/44x used partial virtualization cp-40 used full virtualization addition role predecessor vm family cp/cms played important role development operating system os theory design ibm system/370 time-sharing industry creation self-supporting user community anticipated today free software movement cp/cms built ibm cambridge scientific center csc research development lab ties mit leadership robert creasy system goals development process release legacy breakthrough technology set system apart oses day large ibm projects open-source system made available source code form ibm customers charge – part unsupported ibm type-iii library cp/cms users supported unusual circumstances described history section led situation cp/cms consisted two main components cp/cms virtual machine concept important step forward operating system design ibm reimplemented cp/cms vm/370 product line released 1972 virtual memory added s/370 series vm/370 successors z/vm remain wide use today important note ibm reimplemented cp-67 cp-40 simply rename repackage vm coexisted cp/cms successors many years thus appropriate view cp/cms independent os distinct vm family cp/cms distributed source code form many cp/cms users actively involved studying modifying source code direct user involvement vendor-supplied operating system unusual cp/cms era many vendors distributed operating systems machine-readable source code possible os/360 dos/360 number later mainstream ibm operating systems distributed way systems awareness system source code also involved sysgen process comparable kernel build modern systems also installing starter set forty years later hercules emulator used run fossilized versions systems based source code treated part public domain importance operating system source code changed time 1969 os software included cost hardware vendor complete responsibility entire system hardware software made distribution medium relatively unimportant ibm unbundling os software delivered ibm system control program scp software eventually object code form still additional charge complicated reasons cp/cms released normal way supported ibm made part unsupported ibm type-iii library collection software contributed ibm personnel similarly software contributed customers formed type-iv library ibm distributed library customers use 'as lack direct ibm support products forced active users support encouraged modifications mutual support cp/cms type-iii products early forms free software source code distribution ibm operating systems may continued time e.g os/360 dos/360 dos/vse mvs even tss/370 today generally considered public domain since arguably published without copyright notice 1978 however unsupported status cp/cms placed different pressures user community created need source code distribution curiously cp/cms contributed type-iii library mit lincoln laboratory ibm despite fact system built ibm cambridge scientific center surprising decision described form collusion outmaneuver ibm political forces opposed time-sharing may also reflect amount formal informal input mit union carbide contributed design implementation cp-40 s/360-67 cp-67 cms see history cp/cms historical notes insights references topic many cp/cms users made extensive modifications copies source code much work shared among sites important changes found way back core system users national css academic sites continued independent development cp/cms rather switching vm/370 became available efforts diverged community today would termed software fork ibm released vm/370 source code distribution vm continued several releases vm project adopt use pl/s internal systems programming language mandated use within ibm many comparable projects use pl/s would made source code distribution impossible ibm attempted turn away assembly language higher level languages early 1965 making substantial use pl/s 1969 e.g mvs pl/s considered trade secret time available customers ibm apparently made exceptions policy much later vm user community continued make important contributions software cp/cms type-iii period os dos sites exhibited active user involvement deep operating system internals found many vm sites reverse support helped cp/cms concepts survive evolve despite vm second class citizen status ibm fundamental cp/cms architectural strategic parameters established cp-40 began production use ibm cambridge scientific center early 1967 effort occurred complex political technical milieu discussed length supported first-hand quotes wikipedia article history cp/cms nutshell cp/cms architecture revolutionary time system consisted virtualizing control program cp created multiple independent virtual machines vms platform virtualization possible two elements ibm system/360-67 program running 'problem state using privileged instruction invalid memory address would cause hardware raise exception condition trapping conditions cp could simulate appropriate behavior e.g performing i/o paging operations guest operating system would run 'supervisor state bare machine run 'problem state cp result fully virtualized environment virtual machine set virtual devices mapped system real hardware environment thus given dial-up teletype presented vm instance virtual console note cp-67 certain model-dependent diagnostic instructions virtualized notably diag instruction ultimately later development ibm elsewhere diag instructions used create non-virtualized interface became called hypervisor client operating systems could use mechanism communicate directly control program offered dramatic performance improvements s/360 operating system could fact run cp normal users ran cambridge monitor system cms simple single-user operating system cms allowed users run programs manage virtual devices cp-67 versions 1 2 support virtual memory inside virtual machine added version 3 point testing development cp could done running full copy cp/cms inside single virtual machine cp/cms operating system work cp-370 development mvs testing ran four- five-level deep stacks hardware os simulations cp/cms design different ibm previous monolithic operating systems separates complex big system dispatching hardware management mass storage little system application program execution file i/o console input/output re-categorization systems entities prevents bug one users system affecting model feature microkernel operating systems ibm decision implement virtualization virtual memory features subsequent s/370 design although missing initial s/370 series reflects least part success cp/cms approach turn survival success ibm vm operating system family virtualization technology general owe much s/360-67 many respects ibm cp-67 cp/cms products anticipated heavily influenced contemporary virtualization software vmware workstation xen microsoft virtual pc | [
4293,
4295,
2182,
4670,
5021,
13,
3271,
3626,
5041,
7546,
5396,
7550,
402,
405,
3978,
5064,
65,
6849,
4366,
5783,
5088,
6500,
785,
1516,
2266,
788,
1522,
7605,
4759,
6518,
4397,
5116,
1547,
2300,
4786,
839,
4428,
6922,
850,
5161,
5865,
... | Test |
5,245 | 3 | Model-specific_register:model-specific register model-specific register msr various control registers x86 instruction set used debugging program execution tracing computer performance monitoring toggling certain cpu features introduction 80386 processor intel began introducing experimental features would necessarily present future versions processor first two test registers t6 t7 allowed 80386 speed virtual-to-physical address conversions three additional test registers followed 80486 tr3–tr5 enabled testing processor caches code data none five registers implemented subsequent pentium processor introduction pentium processor intel provided pair instructions codice_1 codice_2 access current future model-specific registers well cpuid instruction determine features present particular model many registers proven useful enough retained intel classified architectural model-specific registers committed inclusion future product lines reading writing registers handled codice_1 codice_2 instructions respectively privileged instructions executed operating system use linux msr kernel module creates pseudo file /dev/cpu/ x /msr unique x processor processor core user permissions read and/or write file use file i/o api access registers msr-tools package provides reference implementation documentation regarding msrs certain processor implementation supports usually found processor documentation cpu vendor examples rather well-known msrs memory type range registers mtrrs address-range registers arrs | [
4845,
2989,
5988,
352,
4810,
1335,
2014
] | Test |
5,246 | 2 | Usage_share_of_desktop_operating_systems:usage share desktop operating systems usage share desktop operating systems percentage operating systems os used computers approximately market share so-called retronym desktop operating system also run e.g laptops originally computers running operating systems desktop computers introduction so-called new class mobile operating systems desktop got part name former class oses computers running oses desktop metaphor style gui unlike mobile oses see also usage share operating systems breakdown share desktop mobile styles operating systems separately share operating systems part across classes three main divisions desktop computer operating systems microsoft windows apple macos linux variants section complete section complete section complete | [
1522,
7325,
7605,
280,
2818,
4759,
190,
4670,
5021,
8066,
8167,
4397,
13,
5644,
3271,
5116,
6984,
299,
3626,
7142,
5571,
2300,
5041,
7827,
4786,
578,
7550,
4244,
5232,
1992,
405,
6367,
6922,
8115,
1582,
5161,
5865,
7396,
65,
861,
5962,
... | Train |
5,247 | 9 | Trace_tree:trace tree trace tree data structure used runtime compilation programming code trace trees used type 'just time compiler traces code executing hotspots compiles hotspots entered compiled code run instead traces statement executed including within function calls entire execution path compiled different compiling individual functions compiler gain information optimizer operate remove overhead calls anytime compiled code makes call code jitted interpreter called continue | [
1854
] | Test |
5,248 | 1 | DBIx::Class:dbix :class dbix :class often abbreviated dbic object-relational mapper perl used map relational database table rows perl objects generates sql queries transparently application developer also implements active record pattern popular web application frameworks catalyst dancer | [
3683,
5983,
2180,
1277,
3106,
2660,
3031,
6462,
5416,
8122,
8029,
1598,
6233,
6594,
2713
] | Validation |
5,249 | 4 | Elie_Bursztein:elie bursztein elie bursztein born 1 june 1980 leads anti-abuse research team google best known research anti-fraud abuse novel attacks web service video games work applied cryptography prior google bursztein post-doctoral fellow computer science stanford university focused captchas security usability elie bursztein obtained computer engineering degree epita 2004 master degree computer science paris 7/ ens 2004 supervision patrick cousot phd computer science école normale supérieure de cachan 2008 supervision jean goubault-larrecq phd thesis tilted anticipation games théorie des jeux appliqués à la sécurité réseau anticipation game game theory applied network security showed combine model-checking temporal logic game theory find optimal responses network attacks stanford university post-doctoral fellow stanford security laboratory unit computer science department focuses network computer security 2014 bursztein published first study account manual hijackers kurt thomas et al published google attempt reduce phone verified account fraud 2015 kurt thomas et al received p best practical award study malicious ads injectors joseph bonneau et al got www'15 best student paper award publishing first practical study secret questions security usability using google data 2009 bursztein presented first complete analysis microsoft dpapi data protection application programming interface jean michel picod 2011 j. lagarenne m. hamburg d. boneh used private set intersection protocols defend game map hacking 2014 adam langley made chrome mobile roughly three times faster implementing new tls cipher suite uses algorithms chacha20 poly1305 bursztein research captchas aims make puzzles easier humans solve harder computers crack main contributions easier captcha human used recaptcha generic algorithm break text-based captcha 2009 bursztein showed steven bethard ebay audio captchas broken 2010 studied s. bethard c. fabry d. jurafsky j. c. mitchell humans perform real world captchas running large-scale study 2011 demonstrated r. beauxis h. paskov d. perito c. fabry j. mitchell non-continuous audio captcha ineffective bursztein part team stanford researchers broke nucaptcha security despite company claims next generation video-based captcha security told cnet news 2012 able break nucaptcha video scheme 90 percent success 2010 defcon showed build generic map hack software 2012 defcon demonstrated fuzz online games including diablo 3 league legend 2014 defcon showed use machine learning predict opponent play card based game hearthstone blizzard request tool never made public notable achievements web mobile security include notable awards | [
4176,
1805
] | Test |
5,250 | 2 | Moused:moused moused mouse daemon freebsd systems works console driver support mouse operations text console user programs first appeared freebsd 2.2 currently located codice_1 mouse daemon listens mouse port default codice_2 supplies mouse data virtual mouse driver sysmouse 4 user process wants use mouse simply opens codice_3 reads like normal file makes possible console user processes x window system share mouse | [
1523,
1341,
1254,
7514,
191,
6711,
1356,
1547,
4498,
7355,
481,
3457,
732,
2300,
6278,
8194,
8096,
1193,
1013,
3636,
4059,
8001,
6918,
5760,
6211,
3986,
4806,
5065,
594,
4441,
5865,
4534,
6477,
424,
2512,
1315,
1133,
689,
6149,
1793,
21... | Test |
5,251 | 4 | Group-IB:group-ib group-ib develops software hardware proactive cyber defence 2015 gartner agency included group-ib top 7 global vendors threat intelligence 2017 company became leader russia threat intelligence security services market analysis conducted idc became one top-5 threat intelligence vendors forrester vendor landscape external threat intelligence 2017 report group-ib global hq located singapore group-ib founded 2003 group students bauman moscow state technical university headed ilya konstantinovich sachkov acting agency investigating cyber-attacks since group-ib involved range incident response investigations across world actively cooperating international partners detect perpetrators bring justice group-ib participated first successful cybercrime case russia organizers criminal groups identified arrested criminals involved financial theft bank accounts using malware pcs mobile devices phishing attacks targeted attacks financial institutions russia company generally involved series international operations leverages close cooperation international law enforcement agencies get criminals wherever hide according group-ib 80 high-profile investigation cases field high-tech crime russia supported group-ib experts 2010 group-ib established largest computer forensics laboratory eastern europe 2011 company established computer emergency response team cert —the first round-the-clock computer security incident response team eastern europe called cert-gib status competent security organization recognized coordination center tld ru administrator national top-level domains .ru .рф collaboration certs worldwide company developed series effective intellectual property protection services group-ib successfully protected sochi 2014 olympic brand products ticket sales blocked pirated links tv series movies owned sony pictures paramount pictures fox tv series discovery channel amedia exclusive rights hbo tv series russia well fraudulent websites abusing brands popular banks payment systems since 2012 group-iв developing early warning system provide cyber defence companies around world 2015 gartner included group-ib core product—group-ib intelligence—in top 7 global threat intelligence solutions along products developed ibm fireeye rsa check point since 2007 group-ib cooperating microsoft 2015 two companies presented joint research economic impact cyber-attacks group-ib resident moscow-based skolkovo foundation dubbed russian silicon valley part skolkovo innovative projects group-ib created so-called cybercop global counter-cybercrime system company also established additional office innopolis—a science park tatarstan russia 2010 leta group investment management company information technology acquired 50 group-ib assets 2013 group-ib management bought leta group share mid-2016 russian-founded altera capital run capital bought 10 percent stake group-ib according company announcement group-ib leverage investments develop products create r hubs middle east southeast asia latin america well hire local forensic specialists improve sales performance american european asian markets according gartner involved high-profile investigations allows group-ib get information cybercriminals relationships intelligence addition investigation materials forensics expertise gib threat data collection based high-tech infrastructure includes gib intelligence service uses personalized information security strategy planning making time-sensitive decisions tweaking protection tools gives time incidents prevention allowing urgently discover theft clients employees identifiers track modifications tactics tools used criminal groups potentially interested company prioritize threats based expert forecasts tds hardware software unit preventing infection vulnerabilities usage corporate networks tds sensors track suspicious activities corporate network cert-gib experts reveal critical threats immediately inform information security service help put stop incident evolving tds polygon allows start isolated environ suspicious files downloaded users received mail obtain objective conclusion degree harmfulness based classification formed computerized training pattern secure bank deletes blind spots online-payments security diagnosing signs infection remote controlling client machine identifiers compromised authorization secure portal prevents unauthorized access personal accounts personal data web users bonus accounts various fraudulent scenarios using bots competitor offers displays portal site may 2017 group-ib issued report proved connection lazarus group stole 18 mln bangladesh central bank conducted number attacks polish banks well attempted infect hundreds financial organizations 30 countries around globe including european central bank central banks russia brazil venezuela – north korea company experts made research complex technological infrastructure communications channels concealment techniques presented new evidence lazarus attribution north korea revealed details attack july 2016 group masked cyber-criminals jackpotted 34 atms operated first bank one taiwan largest banks perpetrators stole 83.27 2m usd according cctv footage thieves used cellphones trigger atms automatically dispense money group-ib experts first discover jackpotting attack tactics used cobalt gang force atms spit cash using malware group-ib released report cobalt logical attacks atms provided detailed analysis attack scheme get bank internal network hackers used spear phishing emails malicious attachment emails purported come european central bank atm maker wincor nixdorf local banks establishing control bank internal network criminals searched network segments could gain access atms workstations bank employees control atms access atms obtained uploaded specific software allowing criminals control cash dispensers february 2016 group-ib published report titled analysis attacks trading bank card systems first major successful attack trading system provoking major exchange volatility february 2015 corkow criminal group infected trading system terminal kazan-based energobank using specialized trojan software resulting trades 400 million hackers moved ruble-dollar rate 15 percent minutes moscow exchange bank claimed losses 244 million rubles 3.2 million due trades march 2016 group-ib published report activity buhtrap criminal group managed conduct 13 successful attacks russian banks total amount 1.8 billion rubles 25.7 million august 2015 february 2016 high effectiveness attacks achieved due spear phishing mailouts including sent acting central bank russia used criminals gain access corporate network criminals obtained access computers running automated working station central bank client aws cbc free software delivers payment documents behalf central bank performed fraudulent transactions acting bank attack scheme outlined report published group-ib later used perform thefts via swift buhtrap first hacker group using network worm infect overall bank infrastructure significantly increased difficulty removing malicious functions network result banks shut whole infrastructure worm able gain full control network using single infected machine late 2014 fox-it group-ib jointly released report anunak aka carbanak hacker group stolen 1 billion rubles 50 russian banks europe anunak attacked pos terminals large retail store chains data several million clients infected group performed successful thefts since early 2015 autumn 2015 novel technique targeted attacks called reverse atm attack allowed criminals steal money atms money mules criminal payment agents would deposit small sums unembossed cards legitimate accounts immediately withdrawing 'd put also took receipt atm contained payment reference number amount withdrawn information sent hackers would use data access thousands point sale terminals primarily based us czech republic create reversal operation terminal tricked bank believing withdrawal funds cancelled point sale terminal looked though goods returned payment declined whilst banks appeared atm withdrawal cancelled funds returned account though perpetrators already taken cash process repeated money remaining target atm attacks criminals managed steal 252 million rubles 3.8 million five large russian banks fraud longer perpetrated due additional security systems implemented banks assistance visa mastercard according report released group-ib march 2015 hackers self-proclaimed islamic state iraq levant isis attacked 600 russian internet resources 2014 criminals primarily defaced websites placing pictures video isis propaganda hackers believed attacked government organizations banks popular resources also galleries schools attacks chaotic massive researchers believe aimed gain experience perform reconnaissance russian internet according group-ib report attacks performed isis cyber division cyber caliphate 3 criminal groups called team system dz fallaga team global islamic caliphate totalling 40 members autumn 2013 group-ib supported investigative activity resulted arrest dmitry fedotov known nickname paunch author infamous blackhole exploit pack time used conduct 40 infections worldwide criminal sentenced 7 years prison according national legislation april 2016 2012 law enforcement agencies assistance sberbank group-ib arrested largest criminal gang russia two years group managed infect 1.5 million computers worldwide steal approximately 250 million bank accounts total 100 banks suffered attacks throughout world group-ib engaged partners netherlands canada investigation enabled company identify full chain actors including organizer owned botnet operators cashers money mules first case russia members criminal group arrested leaders sentenced 5 8 years prison year members criminal groups used carberp modifications attack individuals companies arrested summer 2012 hacker known germes aka arashi arrested creator one largest global botnets infected 6 million computers following 7 members hodprot criminal group detained one oldest russian hacker gangs known stolen approximately 125 million rubles russian bank accounts members criminal group arrested even though known used control servers located abroad – netherlands germany france usa april 2015 members hacker group infected 340,000 android-based devices steal money bank accounts arrested assistance group-ib sberbank hackers dubbed malware fifth reich used nazi symbols control system hackers distributed malware via sms messages containing link download program masked adobe flash player trojan enabled hackers intercept sms notifications banks furtively confirm money transfer hackers accounts attack scheme similar used waplook first criminal group members arrested money theft individuals using malicious mobile apps russia group leaders arrested september 2014 assistance group-ib may 2017 russian ministry internal affairs announced arrest cron gang infected 1 mln smartphones group-ib provided expert support investigation cron banking trojan spread two ways—via sms user clicked link message installed malicious application disguised legitimate application navitel framaroot pornhub avito etc hackers infected 3,500 smartphones daily managed steal 1 mln total june 2015 twin brother hackers reportedly arrested st. petersburg russia part police operation assisted group-ib 4 years popelysh brothers stolen money client accounts vtb24 online banking using fake bank page grab client data first case russia legal proceedings taken criminals using phishing schemes | [
1710,
1505,
7106,
3480,
2727,
2893,
3498,
3875,
8014,
5187,
6043
] | Test |
5,252 | 1 | Microsoft_Access:microsoft access microsoft access database management system dbms microsoft combines relational microsoft jet database engine graphical user interface software-development tools member microsoft office suite applications included professional higher editions sold separately microsoft access stores data format based access jet database engine also import link directly data stored applications databases software developers data architects power users use microsoft access develop application software like microsoft office applications access supported visual basic applications vba object-based programming language reference variety objects including legacy dao data access objects activex data objects many activex components visual objects used forms reports expose methods properties vba programming environment vba code modules may declare call windows operating system operations prior introduction access borland paradox dbase fox foxpro dominated desktop database market microsoft access first mass-market database program windows microsoft purchase foxpro 1992 incorporation fox rushmore query optimization routines access microsoft access quickly became dominant database windows effectively eliminating competition failed transition ms-dos world microsoft first attempt sell relational database product mid 1980s microsoft obtained license sell late 1980s microsoft developed solution codenamed omega confirmed 1988 database product windows os/2 development going include eb embedded basic language going language writing macros microsoft applications unification macro languages happen introduction visual basic applications vba omega also expected provide front end microsoft sql server application resource-hungry reports working slowly 386 processors available time scheduled released 1st quarter 1990 1989 development product reset rescheduled delivered sooner january 1991 parts project later used microsoft projects cirrus codename access thunder codename visual basic embedded basic engine used access premiere omega project demonstrated 1992 several journalists included features available access omega project scrapped developers assigned cirrus project assigned team created visual basic goal create competitor applications like paradox dbase would work windows microsoft acquired foxpro rumors microsoft project might get replaced company decided develop parallel assumed project would make use extensible storage engine jet blue end support microsoft jet database engine jet red provided project used code omega project pre-release version visual basic july 1992 betas cirrus shipped developers name access became official name product access originally used older terminal emulation program microsoft years program abandoned decided reuse name 1992 microsoft released access version 1.0 november 13 1992 access 1.1 release may 1993 improve compatibility microsoft products include access basic programming language 1994 microsoft specified minimum hardware requirements access v2.0 microsoft windows v3.1 4 mb ram required 6 mb ram recommended 8 mb available hard disk space required 14 mb hard disk space recommended product shipped seven 1.44 mb diskettes manual shows 1994 copyright date office 95 microsoft access 7.0 a.k.a access 95 became part microsoft office professional suite joining microsoft excel word powerpoint transitioning access basic vba since microsoft released new versions microsoft access release microsoft office includes access 97 version 8.0 access 2000 version 9.0 access 2002 version 10.0 access 2003 version 11.5 access 2007 version 12.0 access 2010 version 14.0 access 2013 version 15.0 versions 3.0 3.5 microsoft jet database engine used access 7.0 later-released access 97 respectively critical issue made versions access unusable computer 1 gb memory microsoft fixed problem jet 3.5/access 97 post-release never fixed issue jet 3.0/access 95 native access database format jet mdb database also evolved years formats include access 1.0 1.1 2.0 7.0 97 2000 2002 2007 significant transition access 97 access 2000 format backward compatible earlier versions access newer versions access support access 2000 format new features added access 2002 format used access 2002 2003 2007 2010 microsoft access 2000 increased maximum database size 2gb 1gb access 97 microsoft access 2007 introduced new database format accdb supports links sharepoint lists complex data types multivalue attachment fields new field types essentially recordsets fields allow storage multiple values files one field microsoft access 2007 also introduced file attachment field stored data efficiently ole object linking embedding field microsoft access 2010 introduced new version accdb format supported hosting access web solutions sharepoint 2010 server first time allowed access solutions run without install access pc first support mac users user sharepoint site sufficient rights could use access web solution copy access still required developer create access web solution desktop version access remained part access 2010 access web solutions desktop solutions automation macro language vba access automatically converted javascript data longer access database sharepoint lists access desktop database could link sharepoint data hybrid applications possible sharepoint users needing basic views edits could supported sophisticated traditional solutions could remain desktop access database microsoft access 2013 offers traditional access desktop solutions plus significantly updated sharepoint 2013 web solution access web model access 2010 replaced new architecture stores data actual sql server databases unlike sharepoint lists offers true relational database design referential integrity scalability extensibility performance one would expect sql server database solutions created sharepoint 2013 offer modern user interface designed display multiple levels relationships viewed edited along resizing different devices support touch access 2013 desktop similar access 2010 several features discontinued including support access data projects adps pivot tables pivot charts access data collections source code control replication legacy features access desktop database maximum size remained 2gb since 2000 version addition using database storage file microsoft access also may used 'front-end program products act 'back-end tables microsoft sql server non-microsoft products oracle sybase multiple backend sources used microsoft access jet database accdb mdb formats similarly applications visual basic asp.net visual studio .net use microsoft access database format tables queries microsoft access may also part complex solution may integrated technologies microsoft excel microsoft outlook microsoft word microsoft powerpoint activex controls access tables support variety standard field types indices referential integrity including cascading updates deletes access also includes query interface forms display enter data reports printing underlying jet database contains objects multi-user handles record-locking repetitive tasks automated macros point-and-click options also easy place database network multiple users share update data without overwriting work data locked record level significantly different excel locks entire spreadsheet template databases within program download microsoft website options available upon starting access allow users enhance database predefined tables queries forms reports macros database templates support vba code microsoft templates include vba code programmers create solutions using vba similar visual basic 6.0 vb6 used throughout microsoft office programs excel word outlook powerpoint vb6 code including use windows api calls used vba power users developers extend basic end-user solutions professional solution advanced automation data validation error trapping multi-user support number simultaneous users supported depends amount data tasks performed level use application design generally accepted limits solutions 1 gb less data access supports 2 gb performs quite well 100 fewer simultaneous connections 255 concurrent users supported capability often good fit department solutions using access database solution multi-user scenario application split means tables one file called back end typically stored shared network folder application components forms reports queries code macros linked tables another file called front end linked tables front end point back end file user access application would receive copy front end file applications run complex queries analysis across large datasets would naturally require greater bandwidth memory microsoft access designed scale support data users linking multiple access databases using back-end database like microsoft sql server latter design amount data users scale enterprise-level solutions microsoft access role web development prior version 2010 limited user interface features access forms reports work windows versions 2000 2003 access object type called data access pages created publishable web pages data access pages longer supported microsoft jet database engine core access accessed technologies odbc ole db data i.e. tables queries accessed web-based applications developed asp.net php java use microsoft terminal services remote desktop application windows server 2008 r2 organizations host access applications run web technique scale way web application would appropriate limited number users depending configuration host access 2010 allows databases published sharepoint 2010 web sites running access services web-based forms reports run modern web browser resulting web forms reports accessed via web browser n't require add-ins extensions e.g activex silverlight access 2013 create web applications directly sharepoint 2013 sites running access services access 2013 web solutions store data underlying sql server database much scalable robust access 2010 version used sharepoint lists store data access services sharepoint since retired compiled version access database file extensions .mde /accde .ade accde works access 2007 later created prevent user accessing design surfaces modify module code forms reports mde ade file microsoft access database file modules compiled editable source code removed .mde .ade versions access database used end-user modifications allowed application ’ source code kept confidential microsoft also offers developer extensions download help distribute access 2007 applications create database templates integrate source code control microsoft visual sourcesafe users create tables queries forms reports connect together macros advanced users use vba write rich solutions advanced data manipulation user control access also report creation features work data source access access original concept access end users able access data source features include import export data many formats including excel outlook ascii dbase paradox foxpro sql server oracle also ability link data existing location use viewing querying editing reporting allows existing data change ensuring access uses latest data perform heterogeneous joins data sets stored across different platforms access often used people downloading data enterprise level databases manipulation analysis reporting locally also jet database format mdb accdb access 2007 contain application data one file makes convenient distribute entire application another user run disconnected environments one benefits access programmer perspective relative compatibility sql structured query language — queries viewed graphically edited sql statements sql statements used directly macros vba modules manipulate access tables users mix use vba macros programming forms logic offers object-oriented possibilities vba also included queries microsoft access offers parameterized queries queries access tables referenced programs like vb6 .net dao ado microsoft access vba reference parameterized stored procedures via ado desktop editions microsoft sql server used access alternative jet database engine support started msde microsoft sql server desktop engine scaled version microsoft sql server 2000 continues sql server express versions sql server 2005 2008 microsoft access file server-based database unlike client–server relational database management systems rdbms microsoft access implement database triggers stored procedures transaction logging access 2010 includes table-level triggers stored procedures built ace data engine thus client-server database system requirement using stored procedures table triggers access 2010 tables queries forms reports macros developed specifically web based applications access 2010 integration microsoft sharepoint 2010 also highly improved 2013 edition microsoft access introduced mostly flat design ability install apps office store introduce new features theme partially updated 2016 dark theme created access asp.net web forms query microsoft access database retrieve records display browser sharepoint server 2010 via access services allows access 2010 databases published sharepoint thus enabling multiple users interact database application standards-compliant web browser access web databases published sharepoint server use standard objects tables queries forms macros reports access services stores objects sharepoint access 2013 offers ability publish access web solutions sharepoint 2013 rather using sharepoint lists data source access 2013 uses actual sql server database hosted sharepoint sql azure offers true relational database referential integrity scalability maintainability extensibility compared sharepoint views access 2010 used macro language enhanced support sophisticated programming logic database level automation microsoft access also import link directly data stored applications databases microsoft office access 2007 newer import link microsoft offers free runtime versions microsoft access allow users run access desktop application without needing purchase install retail version microsoft access allows access developers create databases freely distributed unlimited number end-users runtime versions access 2007 later downloaded free microsoft runtime versions access 2003 earlier part office developer extensions/toolkit required separate purchase runtime version allows users view edit delete data along running queries forms reports macros vba module code runtime version allow users change design microsoft access tables queries forms reports macros module code runtime versions similar corresponding full version access usually compatible earlier versions example access runtime 2010 allows user run access application made 2010 version well 2007 2000 due deprecated features access 2013 runtime version also unable support older features development one simulate runtime environment fully functional version using codice_1 command line option access stores database tables queries forms reports macros modules access jet database single file query development access offers query designer graphical user interface allows users build queries without knowledge structured query language query designer users show datasources query tables queries select fields want returned clicking dragging grid one set joins clicking dragging fields tables fields tables access allows users view manipulate sql code desired access table including linked tables different data sources used query access also supports creation pass-through queries snippets sql code address external data sources use odbc connections local machine enables users interact data stored outside access program without using linked tables jet users construct pass-through queries using sql syntax supported external data source developing reports design view additions changes controls cause linked queries execute background designer forced wait records returned able make another change feature turned non-programmers use macro feature automate simple tasks series drop-down selections macros allow users easily chain commands together running queries importing exporting data opening closing forms previewing printing reports etc macros support basic logic if-conditions ability call macros macros also contain sub-macros similar subroutines access 2007 enhanced macros included error-handling support temporary variables access 2007 also introduced embedded macros essentially properties object event eliminated need store macros individual objects however macros limited functionality lack programming loops advanced coding logic access 2013 significant enhancements introduced access 2013 capabilities macros became fully comparable vba made feature rich web-based application deployments practical via greatly enhanced microsoft sharepoint interface tools well traditional windows desktops common products microsoft office suite programming language used access microsoft vba similar visual basic 6.0 vb6 code stored modules classes code behind forms reports create richer efficient maintainable finished product good error handling professional access applications developed using vba programming language rather macros except web deployment business requirement manipulate data tables queries vba macros microsoft provides two database access libraries com components well dao ado developers also use ole db odbc developing native c/c++ programs access adps direct manipulation sql server data ado required dao appropriate managing data access/jet databases way manipulate complex field types accdb tables database container navigation pane access 2007 later versions system automatically categorizes object type e.g. table query macro many access developers use leszynski naming convention though universal programming convention dbms-enforced rule particularly helpful vba references object names may indicate data type e.g tbl tables qry queries developers deploy microsoft access often individual workgroup projects access 97 speed characterization done 32 users since access 97 access 2003 2007 microsoft access hardware evolved significantly databases 1 gb size fit entirely ram 200 simultaneous users well within capabilities microsoft access course performance depends database design tasks disk-intensive work complex searching querying take time data microsoft access database cached ram processing speed may substantially improve single user data changing past effect packet latency record-locking system caused access databases run slowly virtual private network vpn wide area network wan jet database broadband connections mitigated issue performance also enhanced continuous connection maintained back-end database throughout session rather opening closing table access access database performance vpn wan suffers client using remote desktop protocol microsoft terminal services provide effective solution access databases linked sql server access data projects work well vpns wans july 2011 microsoft acknowledged intermittent query performance problem versions access windows 7 windows server 2008 r2 due nature resource management vastly different newer operating systems issue severely affects query performance access 2003 earlier jet database engine code well access 2007 later access database engine ace microsoft issued hotfixes kb2553029 access 2007 kb2553116 access 2010 fix issue jet 4.0 mainstream support earlier versions microsoft access ability distribute applications required purchase developer toolkit access 2007 2010 access 2013 runtime version offered free download making distribution royalty-free applications possible windows xp vista 7 windows 8.x microsoft access applications adopt split-database architecture single database divided separate back-end file contains data tables shared file server front-end containing application objects queries forms reports macros modules front-end access application distributed user desktop linked shared database using approach user copy microsoft access runtime version installed machine along application database reduces network traffic since application retrieved use front-end database still contain local tables storing user settings temporary data split-database design also allows development application independent data one disadvantage users may make various changes local copy application makes hard manage version control new version ready front-end database replaced without impacting data database microsoft access two built-in utilities database splitter linked table manager facilitate architecture linked tables access use absolute paths rather relative paths development environment either path production environment dynamic-linker routine written vba large access databases may performance issues sql backend considered circumstances less issue entire database fit pc ram since access caches data indexes scale access applications enterprise web solutions one possible technique involves migrating microsoft sql server equivalent server database client–server design significantly reduces maintenance increases security availability stability transaction logging access 2000 access 2010 included feature called upsizing wizard allowed users upgrade databases microsoft sql server odbc client–server database feature removed access 2013 additional solution sql server migration assistant access ssma continues available free download microsoft variety upgrading options available migrating data queries sql server access database linked sql database however certain data types problematic notably yes/no microsoft access three states yes/no true/false data type empty no/false zero yes/true -1 corresponding sql server data type binary two states permissible values zero 1 regardless sql server still easiest migration retrieving data linked tables optimized records needed scenario may operate less efficiently would otherwise optimal sql server example instances multi-table joins still require copying whole table across network previous versions access including access 2010 databases also converted access data projects adp tied directly one sql server database feature removed access 2013 adp support ability directly create modify sql server objects tables views stored procedures sql server constraints views stored procedures significantly reduce network traffic multi-table joins sql server supports temporary tables links data sources beyond single sql server database finally access databases completely replaced another technology asp.net java data converted however migration may dictate major effort since access sql language powerful superset standard sql access application procedures whether vba macros written relatively higher level versus currently available alternatives robust comprehensive note access macro language allowing even higher level abstraction vba significantly enhanced access 2010 access 2013 many cases developers build direct web-to-data interfaces using asp.net keeping major business automation processes administrative reporting functions n't need distributed everyone access information workers maintain access data migrate sql server directly queries migrate successfully situations may need translate vba functions user defined functions t–sql .net functions procedures crosstab queries migrated sql server using pivot command microsoft access applications made secure various methods basic password access control relatively weak form protection higher level protection use workgroup security requiring user name password users groups specified along rights object type individual object level used specify people read-only data entry rights may challenging specify separate workgroup security file contains settings used manage multiple databases workgroup security supported access 2007 access 2010 accdb database format although access 2007 access 2010 still support mdb databases databases also encrypted accdb format offers significantly advanced encryption previous versions additionally database design needs secured prevent changes access databases locked/protected source code compiled converting database .mde file changes vba project modules forms reports need made original mdb reconverted mde access 2007 access 2010 accdb database converted accde file tools available unlocking decompiling although certain elements including original vba comments formatting normally irretrievable microsoft access saves information following file formats access versions 2.0 7.0 office 95 version launched word 7 office 95 products ole 2 capabilities access 7 shows compatible word 7 version number 13 skipped | [
3255,
367,
4306,
3961,
5736,
3280,
4697,
3975,
6462,
1861,
3307,
53,
425,
7579,
6141,
7213,
7215,
6144,
6495,
4014,
7227,
1902,
448,
1526,
4759,
7618,
7619,
7248,
7621,
7971,
2283,
7978,
5852,
519,
2341,
5882,
8045,
5898,
7715,
3776,
80... | Test |
5,253 | 2 | Visual_Basic_Extension:visual basic extension computer programming visual basic extension commonly abbreviated vbx custom control component model used microsoft visual basic versions 1.0 3.0 still supported 16-bit version version 4.0 made obsolete ocxs vbx also supported first 16-bit version borland delphi vbx specification created developers could extend visual basic since time visual basic interpreted language limited speed vbxs often written c c++ provided ability create powerful efficient user interface sub-components could assembled applications using visual basic glue visual basic 4.0 added support newer ole controls ocxs became activex controls implicitly deprecating vbx controls ocxs based component object model version visual basic come many controls incorporating vbx controls visual basic microsoft spawned first commercially viable market reusable software components third parties created large market custom controls resale vbx components called custom controls microsoft development team envisioned visual control components like toggle switch button enterprising third party software component developers saw opportunities use vbx specification non-visual components components creating zip files manipulating low-level system settings communicating tcp/ip | [
3772
] | Test |
5,254 | 4 | Forensic_Toolkit:forensic toolkit forensic toolkit ftk computer forensics software made accessdata scans hard drive looking various information example locate deleted emails scan disk text strings use password dictionary crack encryption toolkit also includes standalone disk imaging program called ftk imager tool saves image hard disk one file segments may later reconstructed calculates md5 hash values confirms integrity data closing files result image file saved several formats including dd raw accessdata forensic toolkit version 5.5 | [
1715,
5272,
1254,
4759,
3517,
3179,
2195,
5561,
4316,
907,
3700,
7825,
5571,
7181,
6020,
1756,
5150,
4523,
7105,
3823,
6488,
8148
] | Test |
5,255 | 4 | Committee_on_National_Security_Systems:committee national security systems committee national security systems cnss united states intergovernmental organization sets policy security us security systems national security telecommunications information systems security committee nstissc established national security directive 42 national policy security national security telecommunications information systems dated 5 july 1990 october 16 2001 president george w. bush signed executive order 13231 critical infrastructure protection information age re-designating national security telecommunications information systems security committee nstissc committee national security systems cnss holds discussions policy issues sets national policy directions operational procedures guidance information systems operated u.s. government contractors agents either contain classified information involve intelligence activities involve cryptographic activities related national security involve command control military forces involve equipment integral part weapon weapons system critical direct fulfillment military intelligence missions department defense chairs committee membership consists representatives 21 u.s. government departments agencies voting privileges include cia dia dod doj fbi nsa national security council united states military services members voting committee include disa nga nist nro operating agency cnss appears national security agency serves primary contact public inquiries cnss defines several standards include standards training security current certifications include | [
2513,
3932,
690,
6189,
5166,
4036,
943,
7090,
221,
1805
] | Test |
5,256 | 6 | WinAce:winace winace archiving program windows ace compressed archive format built-in support common archive formats types zip rar cab also offer freeware free software command-line interface decompression including listing testing program called unace macos linux beginning version 2.65 winace bundled whenu savenow adware program bundle removed current version 2.69 replaced opt-in sponsorship deal via trialpay application seems discontinued since n't seen updates since 2007 august 2017 also official website www.winace.com went offline web.archive.org snapshots july 2017 last ones show domain parked message text-based version dos called commandline ace addition ace format built-in support common archive format types arj rar zip partially lzh program distribution contains commandline ace unace decompressor programs versions dos os/2 windows support long file names despite name commandline ace contains full-fledged norton commander-like interface run commandline fullscreen mode unace run commandline mode commandline ace used file manipulation similar existing norton commander | [
4213,
7058,
985,
4759,
1352,
6992,
5571,
658,
578,
4700,
1955,
7746,
3032,
7201,
7387,
3219,
510,
8126,
1127,
2334,
6940,
4732,
3152,
169,
1139,
5349,
4461,
2897,
619
] | Test |
5,257 | 4 | XSA:xsa computer science xsa better known cross-server attack networking security intrusion method allows malicious client compromise security website service server using implemented services server may secure general xsa demonstrated websites yet sometimes used conjunction services located server xsa method allows malicious client use services remote server implements order attack another service server network website hosting companies offer hosting large even little amounts separate websites vulnerable method attack amount access services php webserver give client allows client access website configurations files passwords like term 'xsa first coined deadlydata prominent computer hacker early 2000s voice communications software teamspeak invented pioneered method intrusion coined shortened term describe act performing cross-server attacks xsas used community supports methods subsets method give computer hacker malicious individuals terminology attack websites using software located server | [
6029
] | Test |
5,258 | 7 | ZipBooks:zipbooks zipbooks accounting software company based american fork utah produces software name zipbooks founded tim chaves june 2015 backed venture capital firm peak ventures company secured additional 2 million funding july 2016 2017 awarded 100,000 economic grant utah governor office economic development technology commercialization innovation program zipbooks core modules invoicing transactions bills reporting time tracking contacts payroll accrual accounting added 2017 application available g suite ios slack web application computerworld compared zipbooks favorably accounting software pc magazine praised user experience stated lacked lot features competing sites offer | [
3668,
7766,
7332,
5571,
696,
1165,
330
] | Train |
5,259 | 2 | CRUX:crux crux lightweight x86-64-optimized linux distribution targeted experienced linux users delivered tar.gz-based package system bsd-style initscripts based linux distribution also utilizes ports system install upgrade applications although crux latin word cross choice name crux meaning per lidén chose sounded cool ends x puts line various unix flavors irix ultrix mac os x ibm aix crux include gui installation program instead user boots kernel stored either cd diskette partitions hard disk drive operating system installed using program fdisk cfdisk creates appropriate file systems various partitions mounts cd nfs share along partitions made previously use package installation script compiles new kernel installs bootloader via shell commands crux implements infrastructure similar bsd-based operating systems package management packages consist pkgfile shell script patches required adjust program work md5sum hashes used verify integrity downloaded files footprint file listing files included packages files downloaded crux software repository compiled installed using prt-get frontend pkgutils software sources downloaded websites respective upstream address specified pkgfile simone rota reviewed crux osnews blog named reviewr reviewed crux 2.2 | [
2179,
2187,
2909,
5724,
6086,
2193,
7894,
2935,
6453,
2585,
2228,
1487,
58,
3996,
7587,
4008,
1893,
7954,
1909,
6884,
7969,
7246,
6175,
7251,
4400,
7253,
3696,
474,
1179,
3012,
7635,
6902,
2297,
1941,
3023,
6549,
1960,
6209,
2680,
4435,
... | Train |
5,260 | 9 | Real-time_Cmix:real-time cmix real-time cmix rtcmix one music-n family computer music programming languages rtcmix descended mix program developed paul lansky princeton university 1978 perform algorithmic composition using digital audio soundfiles ibm 3031 mainframe computer synthesis functions added program renamed cmix 1980s real-time capability added brad garton david topper mid-1990s support tcp socket connectivity interactive control scheduler object-oriented embedding synthesis engine fully featured applications years cmix/rtcmix run variety computer platforms operating systems including next sun microsystems irix linux mac os x always open source project differentiating commercial synthesizers music software currently developed group computer music researchers princeton columbia university university virginia rtcmix number unique highly unusual features compared synthesis signal processing languages one built-in minc parser enables user write c-style code within score file extending innate capability algorithmic composition making closer respects later music software supercollider max/msp uses single-script instruction file score file synthesis signal processing routines called instruments exist compile shared libraries different music-n languages csound instruments exist second file written specification language builds routines simple building blocks organized opcodes unit generators rtcmix similar functionality csound computer music languages however shared lineage means scripts written one language extremely familiar-looking immediately comprehensible users language | [
6245,
5282,
4853,
7637,
3534,
578,
6287,
2592,
5420,
5266,
263,
6408,
1435,
5450
] | Validation |
5,261 | 3 | Intel_8253:intel 8253 intel 8253 8254 programmable interval timers pits perform timing counting functions using three 16-bit counters 825x family primarily designed intel 8080/8085-processors later used x86 compatible systems 825x chips equivalent circuit embedded larger chip found ibm pc compatibles pc compatibles timer channel 0 assigned irq-0 highest priority hardware interrupt timer channel 1 assigned dram refresh least early models 80386 timer channel 2 assigned pc speaker intel 82c54 c cmos logic variant handles 10 mhz clock signals 8253 described 1980 intel component data catalog publication 8254 described superset 8253 higher clock speed ratings preliminary data sheet 1982 intel component data catalog 8254 implemented hmos read back command available 8253 permits reading writing counter interleaved modern pc compatibles either using system chip cpus discrete chipsets typically implement full 8254 compatibility backward compatibility interoperability read back command vital i/o feature interoperability multicore cpus gpus timer three counters numbered 0 2 channel programmed operate one six modes programmed channels operate independently counter two input pins – clk clock input gate – one pin data output three counters 16-bit counters independent easily read cpu operation mode pit changed setting hardware signals example write control word register one needs set =0 =1 =0 a1=a0=1 initialize counters microprocessor must write control word cw register done setting proper values pins read/write logic block sending control word data/bus buffer block control word register contains 8 bits labeled d7..d0 d7 msb decoding somewhat complex values set parameters one three counters however two forms setting pit microprocessor first sends control message count message pit counting process start pit received messages cases detects rising edge gate input signal status byte format bit 7 allows software monitor current state pin bit 6 indicates count read bit 1 counting element yet loaded read back processor bits 5 0 last bits written control register d3 d2 d1 bits control word set operating mode timer 6 modes total modes 2 3 d3 bit ignored missing modes 6 7 aliases modes 2 3 modes sensitive gate input gate high causing normal operation effects gate low depend mode mode 0 used generation accurate time delay software control mode counter start counting initial count value loaded 0 counting rate equal input clock frequency pin set low control word written counting starts one clock cycle count programmed remains low counter reaches 0 point set high counter reloaded control word written counter wraps around codice_1 internally continues counting pin never changes gate signal remain active high normal counting gate goes low counting suspended resumes goes high first byte new count loaded count register stops previous count mode 8253 used monostable multivibrator gate input used trigger input initially high go low clock pulse following trigger begin one-shot pulse remain low counter reaches zero go high remain high clk pulse next trigger writing control word initial count counter armed trigger results loading counter setting low next clk pulse thus starting one-shot pulse initial count n result one-shot pulse n clk cycles duration one-shot retriggerable hence remain low n clk pulses trigger one-shot pulse repeated without rewriting count counter gate effect new count written counter oneshot pulse current one-shot affected unless counter retriggered case counter loaded new count oneshot pulse continues new count expires mode device acts divide-by-n counter commonly used generate real-time clock interrupt like modes counting process start next clock cycle count sent remain high counter reaches 1 go low one clock pulse following cycle count reloaded goes high whole process repeats time high pulses depends preset count counter register calculated using following formula value loaded counter formula_1 note values count register range formula_2 1 register never reaches zero mode similar mode 2 however duration high low clock pulses output different mode 2 suppose formula_2 number loaded counter count message output high formula_4 counts low formula_5 counts thus period formula_2 counts formula_2 odd extra half-cycle spent high control word count loaded output remain high counter reaches zero counter generate low pulse 1 clock cycle strobe – output become high gate low suspends count resumes gate goes high mode similar mode 4 however counting process triggered gate input receiving control word count output set high device detects rising edge gate input start counting counter reaches 0 output go low one clock cycle – become high repeat cycle next rising edge gate 8253 used ibm pc compatibles since introduction 1981 modern times pit included separate chip x86 pc rather functionality included part motherboard chipset southbridge modern chipset change may show form noticeably faster access pit registers x86 i/o address space pc compatibles operate pit clock rate 105/88 1.193 mhz ntsc colorburst frequency frequency divided 2 largest divisor 8253 capable produces ≈18.2 hz timer interrupt used ms-dos related operating systems original ibm pcs counter 0 used generate timekeeping interrupt counter 1 a1=0 a0=1 used trigger refresh dram memory last counter a1=1 a0=0 used generate tones via pc speaker newer motherboards include additional counters advanced configuration power interface acpi counter local advanced programmable interrupt controller local apic high precision event timer cpu also provides time stamp counter tsc facility pcs address timer0 chip port 40h..43h second timer1 chip 50h..53h x86 pcs many video card bios system bios reprogram second counter use reprogramming typically happens video mode changes video bios may executed system management mode power saving state changes system bios may executed prevents serious alternative uses timer second counter many x86 systems timer used system x86 pcs channel 0 clock ticks theoretical value 1193181.8181 ... hz i.e one third ntsc color subcarrier frequency comes dividing system clock 14.31818 mhz 12 holdover first cga pcs – derived necessary frequencies single quartz crystal make tv output possible oscillator run multiple ntsc color subcarrier frequency stated channel 0 implemented counter typically initial value counter set sending bytes control data i/o port registers value 36h sent port 43h low byte port 40h port 40h high byte counter counts zero sends hardware interrupt irq 0 int 8 cpu counter resets initial value begins count fastest possible interrupt frequency little half megahertz slowest possible frequency also one normally used computers running ms-dos compatible operating systems 18.2 hz real mode operating systems bios accumulates number int 8 calls receives real mode address 0040:006c read program timer counts value also read directly reading i/o port twice first low byte high byte however free-running counter applications x86 pc necessary first write latch command desired channel control register bytes read belong one value according 2002 microsoft document reads writes hardware 8254 require communication io port programming takes several cycles prohibitively expensive os aperiodic functionality used practice | [
4137,
3741,
6872,
2023,
6380,
1237,
4277,
352
] | Test |
5,262 | 4 | Scott_Vanstone:scott vanstone scott a. vanstone mathematician cryptographer university waterloo faculty mathematics member school centre applied cryptographic research also founder cybersecurity company certicom received phd 1974 university waterloo decade worked principally combinatorial design theory finite geometry finite fields 1980s started working cryptography early result vanstone joint ian blake r. fuji-hara ron mullin improved algorithm computing discrete logarithms binary fields inspired coppersmith develop famous exp n^ 1/3+ε algorithm n degree field vanstone one first see commercial potential elliptic curve cryptography ecc much subsequent work devoted developing ecc algorithms protocols standards 1985 co-founded certicom later became chief developer promoter ecc vanstone authored coauthored five widely-used books almost two hundred research articles held several patents fellow royal society canada fellow international association cryptologic research 2001 rsa award excellence mathematics 2009 received ontario premier catalyst award lifetime achievement innovation died march 2 2014 shortly cancer diagnosis notes | [
1455,
6049,
1821,
1243
] | Test |
5,263 | 9 | Mozilla_Raindrop:mozilla raindrop raindrop messaging application building apache couchdb used web interface raindrop works collecting messages currently emails tweets available addons storing json optionally attachments couchdb served users couchdb webserver users view web browsers december 2009 prototype testers official stable release raindrop introduced mozilla foundation thursday october 22 2009 exploration messaging innovation led team responsible thunderbird explore new ways use open web technologies create useful compelling messaging experiences february 2014 mozilla raindrop project considered inactive | [
1152,
4755,
893,
5549,
7975,
6802,
562,
5571,
1190,
3548,
6368,
6458,
7015,
2049,
5506,
4352,
7028,
340,
5699,
3915,
7587,
5887,
445,
4287
] | Train |
5,264 | 2 | Services_menu:services menu services menu simply services user interface element computer operating system services programs accept input user selection process optionally put result back clipboard concept originated nextstep operating system carried macos gnustep similar features emulated operating systems apple advertises services menu connection features operating system example possible desktop search piece text selecting mouse using service spotlight central services grab taking screenshots system spell checker concept similar gui equivalent unix pipe allowing arbitrary data processed passed programs services implemented application services expose portion functionality application operate selected data usually without displaying interface developer documentation apple recommends applications use services provide features generally useful giving example usenet client providing rot13 encryption service standalone services may also created without host application simple one-purpose nature fact n't require gui designed makes writing standalone services popular beginner macos programming projects since many applications install entries without asking user macos services menu tends clog dozens entries quickly users ever use small subset possible options therefore cutting customizing menu makes faster pleasant use prior mac os x snow leopard third party software required snow leopard services menu customized keyboard pane system preferences point view software services menu means inter-process communication user interface executing actions selected data emulation services menu based fact several ways achieved operating system even macos alternative system called context menu handler carried classic mac os x window system data selected application available programs thus services menu application retrieves current selection lets user choose action missing part returning processed data back originating application instead service open new window show results alternatively service could replace current cut buffer results operation leaving user perform paste since different toolkits implement copy/select paste commands differently probably external program control | [
405,
6272,
2627,
6295,
5571,
5787,
5931,
2379,
5450
] | Test |
5,265 | 3 | PowerBook_500_series:powerbook 500 series powerbook 500 series codenamed blackbird shared older macintosh iifx range apple macintosh powerbook portable computers first introduced apple computer 540c model may 16 1994 first stereo speakers trackpad ethernet networking built-in first powerbook series use motorola 68lc040 cpu simultaneous duo 280 upgradeable powerpc architecture via swap-out cpu daughter card powerpc 68040 upgrades sale use 9.5-inch dual scan passive color/b w displays 16-bit stereo sound stereo speakers expansion bay pc card capability two battery bays ten-minute sleep/clock battery allowed main batteries swapped sleep mode full-size keyboard f1–f12 function keys able sleep connected external monitor battery contact cover included actual batteries included single serial port could connect serial printer network via apple localtalk another first also included aaui port connecting ethernet networks 500 series discontinued completely introduction ill-fated powerbook 5300 powerbook 190 de facto successor 500 continued 68lc040 processor offering low end powerpc-based powerbook family survey taken november 2000 insanely great macintosh ranked 540c 2 list all-time best powerbook models made powerbook 500 series introduced may 16 1994 high-end active matrix lcd powerbook 540c 540 passive matrix 520c 520 soon one marketing highlights promise powerpc upgrade cpu pc card pcmcia expansion introduction model came time apple changeover new powerpc chip 68k line cpus apple advertising promise powerpc cause headaches company strong demand ground-breaking design apple incorrect market prediction customers would wait fully powerpc powerbooks resulted shortages early due course 540 dropped line 8 mb additional memory modem offered installed factory hard drive capacity increased 160 240 320 500 mb installed system upped system 7.1.1 7.5 pc card cage also released allowing macintosh users add pcmcia capability laptops first time 1995 apple gave permission apple japan introduce updated version called 550c bigger display 10.4 inches cpu fpu 68040 bigger hard drive japanese keyboard black case sold japan never received fcc certification delays new powerpc powerbook 5300 demand ppc upgrade mounted newer technology began market upgrade apple although produced upgrade modules apple first offered 117 mhz versions apple 100 actually 99 mhz offering soon thereafter newer technology introduced 167 mhz model outperformed fastest powerbook 5300 6,800 5300ce time problems line became real issue apple time apple introduced powerbook 1400 newer technology introduced 183 mhz upgrade 128 kb l2 cache kept ahead power curve performance newer technology stated could produce 183 mhz upgrades supply connectors exhausted laptop first industry include among apple powerbook line first although 500 blackbird prototypes black one five production models completely black 550c sold japan 550c differed four two-tone grey models key respects well including larger active-matrix color screen combined roman/kanji keyboard full 68040 processor models charcoal grey darker grey trim came variety displays active/passive matrix color greyscale used 68lc040 processor low-cost variant without math co-processor full-sized keyboard 12 function keys 640×480 resolution display consistent across family modem developed global village unique two-part design transceiver modem connector installed back modem located next cpu daughter card v.32 terbo top rate 19.2 kbit/s v.32 terbo modems official standard otherwise would drop 14.4 kbit/s due bug new combined printer/modem port driver upgraded 2.5.5 chooser replaced gv install 500 series powerbooks included ability use two batteries time allowing 4 hours battery life two installed charged batteries however left battery also internal pds slot allowed custom modules installed despite prototypes made two devices reached market one pcmcia module three versions reva revb revc revc useful take 16bit wifi cards allowing possibility get powerbook 5xx connected online home network using technology developed powerbook 5xxs discontinued apple different revisions pcmcia module released apple accommodate developing pcmcia standard modules difficult find revc module particular demand alone works 16-bit wifi cards br pc card pcmcia cage 16-bit 2 type i/ii 1 type iii cards using 68000 cpu convert pc card protocol pds fpu co-processor make lack one powerbook 68lc040 cpu fpu module uses 68882 fpu co-processor made sonnet total almost 600,000 powerbook 500 series units produced compared 300,000 powerbook 5300 units laptops grayscale displays mono speakers 8-bit audio insufficient battery life side-mounted snap-on track balls built-in ethernet via versatile aaui transceiver scsi port forerunner today ’ firewire adb similar usb features desktops time making first viable desktop replacement laptops | [
7890,
5732,
722,
1094,
2926,
5037,
5752,
2954,
7572,
6482,
6142,
4373,
7226,
2978,
7601,
4749,
3346,
5100,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
6200,
6202,
3387,
3390,
1216,
2331,
4820,
1234,
7311,
889,
550,
552,
5916,
3459,
7... | Validation |
5,266 | 9 | MUSIC-N:music-n music-n refers family computer music programs programming languages descended influenced music program written max mathews 1957 bell labs music first computer program generating digital audio waveforms direct synthesis one first programs making music actuality sound digital computer certainly first program gain wide acceptance music research community viable task world first computer-controlled music generated australia programmer geoff hill csirac computer designed built trevor pearcey maston beard however csirac produced sound sending raw pulses speaker produce standard digital audio pcm samples like music-series programs music-n derivative programs more-or-less common design made library functions built around simple signal-processing synthesis routines written opcodes unit generators simple opcodes constructed user instrument usually text-based instruction file increasingly graphical interface defines sound played second file called score specifies notes durations pitches amplitudes parameters relevant musical informatics piece variants language merge instrument score though still distinguish control-level functions operate music functions run sampling rate audio generated operate sound notable exception chuck unifies audio-rate control-rate timing single framework allowing arbitrarily fine time granularity also one mechanism manage advantage flexible readable code well drawbacks reduced system performance music-n derived software mostly available complete self-contained programs different types user-interfaces text- gui-based ones aspect csound rtcmix since evolved work effectively software libraries accessed variety frontends programming languages c c++ java python tcl lua lisp scheme etc. well music systems pure data max/msp plugin frameworks ladspa vst number highly original day largely unchallenged assumptions implemented music descendants best way create sound computer many mathew implementations using pre-calculated arrays waveform envelope storage use scheduler runs musical time rather audio rate norm hardware software synthesis audio dsp systems today music included number variants e.g structured audio orchestra language saol imperative music-n programming language part mpeg-4 audio standard eric scheirer less obviously music seen parent program music iv computer music synthesis software package written max mathews program expansion earlier packages written mathews produce music direct digital computation could heard converting samples audible sound using digital-to-analog converter dac music iv expanded godfrey winham hubert howe music ivb music ivbf portable version written fortran precursor csound music iv allows programmer enter musical score text file note played particular musical instrument software algorithm instruments supplied package programmer supply new instruments form fortran code compiled called music iv package generate output designed package intended real-time generation music done modern portable electronic keyboard instrument instead entire songs musical pieces encoded processed digital file disk tape containing stream samples prior advent low-cost digital audio gear late 1980s samples typically sent dac recorded analog tape | [
185,
7331,
5282,
4853,
556,
5911,
1361,
3368,
3370,
3534,
486,
6287,
4970,
2592,
5420,
7032,
4543,
5965,
5260,
6238,
263,
1989,
6408,
1435,
6245
] | Validation |
5,267 | 5 | MSN_Direct:msn direct msn direct fm radio-based digital service allowed 'spot portable devices receive information msn services devices supported msn direct included wristwatches desktop clocks in-car gps satellite navigation units even small appliances coffee makers information available paid channels included weather horoscopes stocks news sports results calendar notifications service also allowed users receive short messages windows live messenger garmin gps units nüvi 680 allowed traffic notifications weather forecasts movie schedules local gas prices received msn direct radio-based service msn direct universal coverage available populated parts united states canada launched areas microsoft latest expansion msn direct windows mobile platform msn direct windows mobile took advantage cellular wi-fi connections allowed microsoft devices better compete information services available mobile phone platforms three versions msn direct software garmin nüvi gps receivers version 1 available nüvis allowed users receive local gas prices movie times weather forecasts current conditions version 2 available nüvi 700- 800-series receivers offered enhanced movie listings local events news stock prices ability send microsoft ’ live search maps data nüvi version 3 offered general airport delays incoming outgoing flights individual flight delays doppler radar map viewing weather service shut january 1 2012 originally announced october 2009 | [
2555
] | Test |
5,268 | 2 | List_of_BSD_operating_systems:list bsd operating systems number unix-like operating systems active development descended berkeley software distribution bsd series unix variants developed originally bill joy university california berkeley electrical engineering computer science department four major bsd operating systems increasing number oss derived add remove certain features generally remain compatible originating os—and really forks list active since 2014 websites freebsd free unix-like operating system descended unix via berkeley software distribution bsd freebsd currently 200 active developers thousands contributors notable derivatives include dragonfly bsd forked freebsd 4.8 apple inc. mac os x darwin base including large amount code derived freebsd netbsd freely redistributable open source version unix-derivative berkeley software distribution bsd computer operating system second open source bsd descendant formally released 386bsd continues actively developed noted portability quality design implementation often used embedded systems starting point porting operating systems new computer architectures openbsd unix-like computer operating system descended berkeley software distribution bsd unix derivative developed university california berkeley forked netbsd 1995 openbsd includes number security features absent optional operating systems tradition developers auditing source code software bugs security problems bsd originally derived unix using complete source code sixth edition unix pdp-11 bell labs starting point first berkeley software distribution 1bsd series updated versions pdp-11 followed 2.xbsd releases 32-bit version vax platform released 3bsd 4.xbsd series added many new features including tcp/ip networking many years primary developer project leader bill joy graduate student time funding project provided darpa darpa interested obtaining programming platform programmer interface would provide robust general purpose time-sharing computing platform would become obsolete every time computing hardware replaced operating system would allow us department defense software especially intricate long-term finance logistics operations quickly ported new hardware became available time went code later ported unix system iii still later unix system v. unix system v revision 4 svr4 released circa 1992 contained much code ported bsd version including 4.3bsd | [
3838,
1523,
1341,
7514,
6794,
6085,
6711,
3856,
908,
5216,
1092,
8186,
481,
3457,
6011,
1279,
5571,
2118,
1193,
738,
3636,
6367,
6369,
2583,
6918,
5065,
594,
8117,
4441,
4534,
6477,
2512,
424,
689,
6489,
6583,
2161,
4910,
6860,
443
] | Test |
5,269 | 4 | Malumpos_Malware:malumpos malware malumpos point sale malware designed steal scrape customer ’ credit debit card detail point sale system designed way records point sale ’ data running oracle micros payment system restaurant collected data used 333,000 customer sites around world malumpos malware targets hotels us businesses put retail customers risk pos ram scraper written delphi programming language malumpos monitors processes scrapes stolen data infected pos system ram first stores stolen credit debit card details customer infected point sale system swiped sends data cybercriminal empty customer bank balance details sold black market much like point sale malware malumpos get computer unknowingly conceals identity nvidia display driver nvidia display driv3r malware appears legitimate software victims peripherals function correctly malware infects oracle micros oracle forms shift4 systems systems accessed via internet explorer | [
7194,
4256,
1670,
3480,
4440
] | Test |
5,270 | 6 | NetWare_Core_Protocol:netware core protocol netware core protocol ncp network protocol used products novell inc usually associated client-server operating system novell netware originally supported primarily ms-dos client stations later support platforms microsoft windows classic mac os linux windows nt mac os x various flavors unix added ncp used access file print directory clock synchronization messaging remote command execution network service functions originally took advantage easy network configuration little memory footprint ipx/spx protocol stack since mid-1990s tcp/ip implementation available novell edirectory uses ncp synchronizing data changes servers directory service tree original ipx/spx implementation provided novell netware platform obsolete tcp/ip implementation uses tcp/udp port 524 relies slp name resolution ncp operation ipx/spx networks bare ipx protocol used packet type field set 17 workstation client station side ipx socket number 0x4003 used server side socket number 0x0451 ncp pdu following structure ncp type field determines type operation individual requests identified sequence number modulo 256 connection number identifies individual client station connection server novell netware servers version 2.x supported 255 connections connection number occupied 1 octet later extended 2 octets task number value 3 requests 1 replies data field starts ncp function number octet distinguishes individual services contents length rest data field depends ncp function | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
405,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
4759,
460,
1534,
7976,
4406,
821,
7258,
7637,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
271... | Test |
5,271 | 2 | Diskless_Remote_Boot_in_Linux:diskless remote boot linux drbl diskless remote boot linux nfs-/nis server providing diskless systemless environment client machines could used providing drbl-server installation possible machine debian ubuntu mandriva red hat linux fedora centos suse already installed unlike ltsp uses distributed hardware resources makes possible clients fully access local hardware thus making feasible use server machines less power also includes clonezilla partitioning disk cloning utility similar symantec ghost drbl comes terms gnu gpl license providing user ability customize drbl excels two main categories disk cloning clonezilla packaged drbl uses partimage avoid copying free space gzip compress hard disk images stored image restored multiple machines simultaneously using multicast packets thus greatly reducing time takes image large numbers computers drbl live cd allows without actually installing anything machines simply booting one machine server cd pxe booting rest machines hybrid client hybrid client excellent way make use old hardware using old hardware thin clients good solution disadvantages hybrid client make drbl allows one set multiple hybrid clients relative ease client computer set boot network card using pxe etherboot client requests ip address tftp image boot provided drbl server client boots initial ram disk provided drbl server via tftp proceeds mount nfs share also provided drbl server root partition client boots either linux distribution drbl server installed clonezilla installer various linux distributions depending particular client configured drbl server system resources reside local machine except storage resides drbl server main bottleneck drbl installation storage drbl server client workstation fast storage server raid fast network gigabit ethernet ideal type environment | [
5540,
5453,
5803,
3174,
1535,
1260,
7528,
1176,
2559,
976,
6725,
5571,
7639,
578,
6736,
5753,
7555,
3559,
7108,
3219,
1227,
6051,
788
] | Test |
5,272 | 4 | Dictionary_attack:dictionary attack cryptanalysis computer security dictionary attack form brute force attack technique defeating cipher authentication mechanism trying determine decryption key passphrase trying hundreds sometimes millions likely possibilities words dictionary dictionary attack based trying strings pre-arranged listing typically derived list words dictionary hence phrase dictionary attack contrast brute force attack large proportion key space searched systematically dictionary attack tries possibilities deemed likely succeed dictionary attacks often succeed many people tendency choose short passwords ordinary words common passwords simple variants obtained example appending digit punctuation character dictionary attacks relatively easy defeat e.g using passphrase otherwise choosing password simple variant word found dictionary listing commonly used passwords possible achieve time–space tradeoff pre-computing list hashes dictionary words storing database using hash key requires considerable amount preparation time allows actual attack executed faster storage requirements pre-computed tables major cost less issue today low cost disk storage pre-computed dictionary attacks particularly effective large number passwords cracked pre-computed dictionary need generated completed password hashes looked almost instantly time find corresponding password refined approach involves use rainbow tables reduce storage requirements cost slightly longer lookup-times see lm hash example authentication system compromised attack pre-computed dictionary attacks rainbow table attacks thwarted use salt technique forces hash dictionary recomputed password sought making precomputation infeasible provided number possible salt values large enough | [
5194,
2626,
7793,
2823,
1353,
376,
3088,
1928,
7630,
3364,
2399,
4699,
6018,
2219,
1708,
4517,
4986,
1593,
5254,
6157,
1805
] | Test |
5,273 | 9 | Charity_(programming_language):charity programming language charity experimental purely functional programming language developed university calgary supervision robin cockett based ideas hagino tatsuya completely grounded category theory disregarding interactions outside world charity programs guaranteed terminate stay productive “ charity interesting exercise non-turing-complete programming languages capable expressing ackermann function alas seems active last 10 years though would interest anyone interested seeing far one take non-tc language ” links added shown examples include also solving tower hanoi problem source charity also related total functional programming languages language allows ordinary recursive data types might found ml required finite corecursive data types allowed potentially infinite control structure operating recursive data types primitive recursion paramorphism control structure corecursive data types primitive co-recursion apomorphism neither control structure operate kind data paramorphisms terminate apomorphisms productive | [
6507,
7658,
7,
5571,
6256,
578,
5164
] | Test |
5,274 | 4 | Malware_analysis:malware analysis malware analysis study process determining functionality origin potential impact given malware sample virus worm trojan horse rootkit backdoor malware malicious software computer software intended harm host operating system steal sensitive data users organizations companies malware may include software gathers user information without permission three typical use cases drive need malware analysis method malware analysis performed typically falls one two types examining malicious software involves several stages including limited following note hosted sandboxes malwr use one products hood malwr uses cuckoo | [
5561,
860,
3823,
4115,
5982,
6488,
1319,
3137,
7125,
3495,
4391,
1122,
7093
] | Test |
5,275 | 3 | Mach_(kernel):mach kernel mach kernel developed carnegie mellon university support operating system research primarily distributed parallel computing mach often mentioned one earliest examples microkernel however versions mach microkernels mach derivatives basis modern operating system kernels gnu hurd apple operating systems macos ios ipados tvos watchos project carnegie mellon ran 1985 1994 ending mach 3.0 true microkernel mach developed replacement kernel bsd version unix new operating system would designed around mach derivatives exist within number commercial operating systems include using xnu operating system kernel incorporates earlier non-microkernel mach major component mach virtual memory management system also adopted 4.4bsd bsd developers csrg appears modern bsd-derived unix systems freebsd mach logical successor carnegie mellon accent kernel lead developer mach project richard rashid working microsoft since 1991 various top-level positions revolving around microsoft research division another original mach developers avie tevanian formerly head software next chief software technology officer apple inc. march 2006 mach name mach evolved euphemization spiral developers naming phase bike lunch rainy pittsburgh mud puddles tevanian joked word muck could serve backronym multi-user multiprocessor universal communication kernel italian cmu engineer dario giuse later asked project leader rick rashid project current title received muck answer though spelled pronounced according italian alphabet wrote mach rashid liked giuse spelling mach much prevailed key concept original unix operating system idea pipe pipe abstraction allowed data moved unstructured stream bytes program program using pipes users programmers could link together multiple programs complete tasks feeding data several small programs turn contrasted typical operating systems era required single large program could handle entire task alternately used files pass data resource expensive time consuming pipes built underlying input/output system system turn based model drivers expected periodically block waited tasks complete instance printer driver might send line text line printer nothing printer completed printing line case driver would indicate blocked operating system would allow program run printer indicated ready data pipes system limited resource memory one program filled memory assigned pipe would naturally block normally would cause consuming program run emptying pipe contrast file entire file read written next program use pipes made movement data across multiple programs occur piecemeal fashion without programmer intervention however implementation pipes memory buffers meant data copied program program time consuming resource intensive operation made pipe concept unsuitable tasks quick turnaround low latency needed case device drivers operating system kernel core functionality instead written single large program operating system added new functionality computer networking instance size complexity kernel grew unix pipes offered conceptual system could used build arbitrarily complex solutions small interacting programs smaller programs easy program maintain well defined interfaces simplified programming debugging qualities even valuable device drivers small size bug-free performance extremely important strong desire model kernel basis small interacting programs one first systems use pipe-like system basis operating system aleph kernel developed university rochester introduced concept ports essentially shared memory implementation aleph kernel reduced providing access hardware including memory ports conventional programs using ports system implemented behavior device drivers user programs concept greatly reduced size kernel allowed users experiment different drivers simply loading connecting together runtime greatly eased problems developing new operating system code otherwise generally required machine restarted general concept small kernel external drivers became known microkernel aleph implemented data general eclipse minicomputers tightly bound machine far ideal required memory copied programs involved considerable performance overhead also quite expensive nevertheless aleph proved basis system sound went demonstrate computer clustering copying memory early ethernet interface around time new generation central processors cpus coming market offering 32-bit address spaces initially optional support memory management unit mmu mmu handled instructions needed implement virtual memory vm system keeping track pages memory use various programs offered new solution port concept using copy write mechanism used vm instead copying data programs sent data needed instruct mmu provide access memory system would implement interprocess communications system dramatically higher performance concept picked carnegie-mellon adapted aleph perq workstation implemented using copy-on-write port successful resulting accent kernel limited practical use run existing software moreover accent tightly tied perq aleph eclipse major change experimental kernels mach decision make version existing 4.2bsd kernel re-implemented accent message-passing concepts kernel would binary compatible existing bsd software making system immediately useful everyday use still useful experimental platform additionally new kernel would designed start support multiple processor architectures even allowing heterogeneous clusters constructed order bring system quickly possible system would implemented starting existing bsd code re-implementing bit bit inter-process communication-based ipc-based programs thus mach would begin monolithic system similar existing unix systems evolve toward microkernel concept time mach started largely effort produce cleanly defined unix-based highly portable accent result short list generic concepts mach developed accent ipc concepts made system much unix-like nature even able run unix programs little modification mach introduced concept port representing endpoint two-way ipc ports security rights like files unix allowing unix-like model protection applied additionally mach allowed program handle privileges would normally given operating system order allow user space programs handle things like interacting hardware mach like unix operating system becomes primarily collection utilities unix mach keeps concept driver handling hardware therefore drivers present hardware included microkernel architectures based hardware abstraction layer exokernels could move drivers microkernel main difference unix instead utilities handling files handle task operating system code moved kernel user space resulting much smaller kernel rise term microkernel unlike traditional systems mach process task consist number threads common modern systems mach first system define tasks threads way kernel job reduced essentially operating system maintaining utilities scheduling access hardware existence ports use ipc perhaps fundamental difference mach traditional kernels unix calling kernel consists operation known system call trap program uses library place data well known location memory causes fault type error system first started kernel set handler faults program causes fault kernel takes examines information passed carries instructions mach ipc system used role instead order call system functionality program would ask kernel access port use ipc system send messages port although messages triggered system calls would kernels mach pretty much kernel did—handling actual request would program thread concurrency support benefited message passing ipc mechanisms since tasks consisted multiple code threads mach could freeze unfreeze message handling allowed system distributed multiple processors either using shared memory directly mach messages adding code copy message another processor needed traditional kernel difficult implement system sure different programs n't try write memory different processors however mach ports process memory access make well defined easy implement made first-class citizen system ipc system initially performance problems strategies developed minimize impact like predecessor accent mach used single shared-memory mechanism physically passing message one program another physically copying message would slow mach relies machine memory management unit mmu quickly map data one program another data written would physically copied process called copy-on-write messages also checked validity kernel avoid bad data crashing one many programs making system ports deliberately modeled unix file system concepts allowed user find ports using existing file system navigation concepts well assigning rights permissions would file system development system would easier would code worked exist traditional program could built using existing tools could also started debugged killed using tools monokernel bug new code would take entire machine require reboot whereas mach would require program restarted additionally user could tailor system include exclude whatever features required since operating system simply collection programs could add remove parts simply running killing would program finally mach features deliberately designed extremely platform neutral quote one text mach number disadvantages however relatively mundane one clear find ports unix problem solved time programmers agreed number well known locations file system serve various duties approach worked mach ports well mach operating system assumed much fluid ports appearing disappearing time without mechanism find ports services represented much flexibility would lost mach initially hosted additional code written directly existing 4.2bsd kernel allowing team work system long complete work started already functional accent ipc/port system moved key portions os tasks threads virtual memory portions completed various parts bsd system re-written call mach change 4.3bsd also made process 1986 system complete point able run dec vax although little practical value goal making microkernel realized soon followed versions ibm rt pc sun microsystems 68030-based workstations proving system portability 1987 list included encore multimax sequent balance machines testing mach ability run multiprocessor systems public release 1 made year release 2 followed next year throughout time promise true microkernel yet delivered early mach versions included majority 4.3bsd kernel system known poe server resulting kernel actually larger unix based idea however move unix layer kernel user-space could easily worked even replaced outright unfortunately performance proved major problem number architectural changes made order solve problem unwieldy unix licensing issues also plaguing researchers early effort provide non-licensed unix-like system environment continued find use well development mach resulting mach 3 released 1990 generated intense interest small team built mach ported number platforms including complex multiprocessor systems causing serious problems older-style kernels generated considerable interest commercial market number companies midst considering changing hardware platforms existing system could ported run mach would seem would easy change platform underneath mach received major boost visibility open software foundation osf announced would hosting future versions osf/1 mach 2.5 investigating mach 3 well mach 2.5 also selected nextstep system number commercial multiprocessor vendors mach 3 led number efforts port operating systems parts microkernel including ibm workplace os several efforts apple build cross-platform version classic mac os mach originally intended replacement classical monolithic unix reason contained many unix-like ideas instance mach used permissioning security system patterned unix file system since kernel privileged running kernel-space os servers software possible malfunctioning malicious programs send commands would cause damage system reason kernel checked every message validity additionally operating system functionality located user-space programs meant needed way kernel grant programs additional privileges operate hardware instance mach esoteric features also based ipc mechanism instance mach able support multi-processor machines ease traditional kernel extensive work needs carried make reentrant interruptible programs running different processors could call kernel time mach bits operating system isolated servers able run like program processor although theory mach kernel would also reentrant practice n't issue response times fast simply wait serve requests turn mach also included server could forward messages programs even network area intense development late 1980s early 1990s unfortunately use ipc almost tasks turned serious performance impact benchmarks 1997 hardware showed mach 3.0-based unix single-server implementations 50 slower native unix study exact nature performance problems turned number interesting facts one ipc problem overhead associated memory mapping needed support added small amount time making call rest 80 time spent due additional tasks kernel running messages primary among port rights checking message validity benchmarks 486dx-50 standard unix system call took average 21μs complete equivalent operation mach ipc averaged 114μs 18μs hardware related rest mach kernel running various routines message given syscall nothing full round-trip bsd would require 40μs whereas user-space mach system would take 500μs mach first seriously used 2.x versions performance slower traditional monolithic operating systems perhaps much 25 cost considered particularly worrying however system also offering multi-processor support easy portability many felt expected acceptable cost pay mach 3 attempted move operating system user-space overhead became higher still benchmarks mach ultrix mips r3000 showed performance hit great 67 workloads example getting system time involves ipc call user-space server maintaining system clock caller first traps kernel causing context switch memory mapping kernel checks caller required access rights message valid another context switch memory mapping complete call user-space server process must repeated return results adding total four context switches memory mappings plus two message verifications overhead rapidly compounds complex services often code paths passing many servers source performance problems another centered problems trying handle memory properly physical memory ran low paging occur traditional monolithic operating systems authors direct experience parts kernel called others allowing fine-tune pager avoid paging code used mach n't possible kernel real idea operating system consisted instead use single one-size-fits-all solution added performance problems mach 3 attempted address problem providing simple pager relying user-space pagers better specialization turned little effect practice benefits wiped expensive ipc needed call performance problems related mach support multiprocessor systems mid-1980s early 1990s commodity cpus grew performance rate 60 year speed memory access grew 7 year meant cost accessing memory grew tremendously period since mach based mapping memory around programs cache miss made ipc calls slow ipc overhead major issue mach 3 systems however concept multi-server operating system still promising though still requires research developers careful isolate code modules call server server instance majority networking code would placed single server thereby minimizing ipc normal networking tasks developers instead stuck original poe concept single large server providing operating system functionality order ease development allowed operating system server run either user-space kernel-space allowed develop user-space advantages original mach idea move debugged server kernel-space order get better performance several operating systems since constructed using method known co-location among lites mklinux osf/1 nextstep/openstep/macos chorus microkernel made feature basic system allowing servers raised kernel space using built-in mechanisms mach 4 attempted address problems time radical set upgrades particular found program code typically writable potential hits due copy-on-write rare thus made sense map memory programs ipc instead migrate program code used local space program led concept shuttles seemed performance improved developers moved system semi-usable state mach 4 also introduced built-in co-location primitives making part kernel mid-1990s work microkernel systems largely stagnant although market generally believed modern operating systems would microkernel based 1990s primary remaining widespread uses mach kernel apple macos sibling ios run atop heavily modified hybrid open software foundation mach kernel osfmk 7.3 called xnu also used osf/1 xnu file systems networking stacks process memory management functions implemented kernel file system networking process memory management functions invoked user mode via ordinary system calls rather message passing xnu mach messages used communication user-mode processes requests user-mode code kernel kernel user-mode servers analysis demonstrated ipc performance problem obvious seemed recall single-side syscall took 20μs bsd 114μs mach running system 114 11 due context switch identical bsd additional 18 used mmu map message user-space kernel space adds 29μs longer traditional syscall much rest majority actual problem due kernel performing tasks checking message port access rights would seem important security concern fact makes sense unix-like system instance single-user operating system running cell phone robot might need features exactly sort system mach pick-and-choose operating system would valuable likewise mach caused problems memory moved operating system another task really makes sense system one address space dos early mac os single large address space shared programs systems mapping provide benefits realizations led series second generation microkernels reduced complexity system placed almost functionality user space instance l4 kernel version 2 includes seven system calls uses 12k memory whereas mach 3 includes 140 functions uses 330k memory ipc calls l4 486dx-50 take 5μs faster unix syscall system 20 times fast mach course ignores fact l4 handling permissioning security leaving user-space programs select much little overhead require potential performance gains l4 tempered fact user-space applications often provide many functions formerly supported kernel order test end-to-end performance mklinux co-located mode compared l4 port running user-space l4 added 5 –10 overhead compared mach 29 newer microkernels revitalized industry whole projects gnu hurd received new attention result following list operating system kernels derived mach operating systems kernels derived mach | [
3599,
2182,
5021,
7550,
7554,
405,
753,
7581,
6489,
4368,
2900,
2266,
5450,
1522,
4030,
5101,
3001,
4399,
6525,
5125,
6188,
2300,
1959,
6921,
6211,
2327,
7669,
4087,
6583,
1237,
3751,
1989,
4113,
6256,
8066,
6984,
1279,
2026,
5571,
1654,
... | Train |
5,276 | 7 | HyTrust:hytrust hytrust american company specialising security compliance control software virtualization information technology infrastructure company founded 2007 based mountain view california hytrust founded 2009 partnered vmware symantec cisco systems citrix systems backed 5.5 million funding trident capital epic ventures 10.5 million funding raised granite ventures cisco systems 2010 summer 2013 company raised 18.5 million oversubscribed c round investments intel capital in-q-tel carahsoft fortinet previous investors web site also mentions mcafee trend micro ca technologies rsa vce hytrust founded company president eric chiu vice president renata budko vice president boris strongin engineer boris belov hytrust chiu budko worked cemaphore systems – company specialising disaster recovery microsoft exchange hytrust ceo chairman john de santis – formerly vice president cloud services vmware chairman ceo tricipher software security infrastructure company november 2013 hytrust acquired highcloud security cloud encryption management software provider acquisition added encryption key management hytrust products spring 2015 company raised 33 million series funding hytrust products based company patented intelligent security control system virtualized ecosystems hytrust cloudcontrol vmware vsphere-compatible virtual appliance sits virtual infrastructure administrators whenever administrative request submitted infrastructure appliance determines whether request complies organization security policies permitting denying accordingly logging requests records produced used regulatory compliance auditing troubleshooting forensic analysis company also provides private cloud logging active directory root access two-factor authentication vi segmentation host hardening multi-tenant policy enforcement secondary approval services encryption key management advises organizations manage virtualized cloud computing environments hytrust partnered intel 2014 create hytrust boundarycontrol technology lets companies set policies control access cloud virtualized data stored boundarycountrol designed work intel txt technology company released hytrust datacontrol 3.0 2015 technology encrypts data virtual machines rest keeps data secure used | [
496,
2961,
7856,
4295,
1505,
4783,
3756,
88
] | Validation |
5,277 | 4 | United_States_v._Ancheta:united states v. ancheta united states america v. ancheta u.s. vs. ancheta 06-051 c.d cal name lawsuit jeanson james ancheta downey california u.s. government handled united states district court central district california first botnet related prosecution u.s history ancheta violated prohibited acts accessing transmitting malware intent consequence disrupting interstate foreign commerce case first prosecution united states america individual sentenced prison profiting use botnets used maliciously launch destructive denial service attacks sending large quantities spam across internet 57-month prison sentence ancheta longest history defendant spread malware ancheta pleaded guilty conspiring violate computer fraud abuse act causing damage computers used federal government united states national defence accessing protected computer without authorization purpose commit various types fraud dates june 25 2004 september 15 2004 los angeles county ancheta others knowingly conspired violate us code refers knowingly causing transmission program information code command result conduct cause damage without authorization computer used interstate foreign commerce communication cause loss one-year period aggregating least 5000 value secondly acheta others conspired violate us code refers access without authorization computer used interstate foreign commerce communication intentionally intimate transmission computer multiple commercial electronic email messages affect interstate foreign commerce finally ancheta charged laundering monetary instruments faced criminal forfeiture jeanson james ancheta time crime 20-year-old high school drop-out found rxbot software online decided going use create botnet army established set website would rent computer zombies hackers could employ fulfill whatever malicious job planned ancheta used least one computer system place residence accessed internet dial telephone line configure command botnet conduct business communication co-conspirator residing boca raton florida referred sobe also involved previous experience launching computer attacks internet bot program infects computer enables remote control computer security vulnerability computer system exploited hacker order install run malware case worm program installs set run background process daemon remains undetectable computer user infected computer often referred zombie computer ancheta depended building block botnet army ancheta engaged computers function unison network formation referred botnet controller called bot herder ancheta primary purpose engaging large numbers computers amplify attack reduce time taken execute greatest value provide relatively high level anonymity 2005 federal trade commission conjunction 35 government agencies organized initiative encourage internet service providers actively monitor identify quarantine customers whose computers appeared compromised transformed zombies appear remote control hackers one largest botnet implementations around time 2005 found dutch police botnet 1.5 million computers crime ring control zombie computers often employed response anti-spam laws spam filtering spammers started hiring virus writers hackers help architect armies zombie computers send spam email unsuspecting users computers around world february 2012 federal communications commission unveiled yet another plan calls internet service providers take specific steps combat online threats botnets july 2004 ancheta obtained access server internet hosting company set irc server utilizing ircd program created channel irc controlled remotely ancheta developed computer worm installed executed would report back irc channel controlled scan computers similar vulnerabilities leave open future unauthorized control ancheta initially developed worm modifying existing trojan called rxbot ddos attacks one use case botnets another major purpose use proxy server email spam propagation 2004 reported unsolicited email doubled late 2003 rising 310 billion message 700 billion messages worms like conficker originally found 2008 still remain threat significantly sophisticated disallowing updates communicated encrypted channels ancheta advertised sale bots purpose launching distributed denial-of-service ddos attacks send spam sold access bots clusters usually 10,000 time ancheta acted consultant advised buyer exact number bots would need successfully accomplish designated attack would offer separate channels additional cost assist control direction bots providing temporary control channel buyer around time crime estimated average botnet 20,000 computers size also profited sale developed worm would configure best propagation buyers also option using malware launch attack use worm offering ancheta accepted payments paypal would misleadingly describe nature transaction hosting web hosting dedicated box services total 17 different counts case count 1 violation refers conspiracy ancheta others commit offense defraud us agency violated us code counts 2 11 violation counts 2 3 4 involved intentionally causing damage accessing unauthorized computer belonging king pao electronic co sanyo electric software completed would caused damage exceeding 5000 launching distributed denial service ddos attack company whose name remains confidential completed would caused damage exceeding 5000 furtherance conspiracy ancheta committed various overt acts including payments accomplices directing numerous computers adware servers controlled ancheta servers unsuspecting users would redirected download malware counts 5 6 included knowingly causing transmission malicious code protected computers belonging naval air weapons station china lake us defense information systems agency used justice national defence national security naws china lake major navy research testing evaluation facility disa provides communication support president top executive staff us government count 7 11 violation ancheta knowingly accessed without authorization computers involved interstate foreign commerce installing adware without notice consent sole intent defraud 8,744 53,321 computers different count accessed without authorization monetary amounts 1306.52 7966.10 different count accepted payment services counts 12 16 violation knowing property involved financial transaction represents proceeds unlawful activity ancheta conducted financial transactions involved proceeds specified unlawful activity proceeds used intent promote unlawful activity proceeds selling worms rental botnet passed legitimate online transactions payments web hosting dedicated box services anchta also transferring payments internet hosting companies additional access servers used commit fraud november 2004 may 2005 varying amounts funds transferred wells fargo bank fdcservers sago networks count 17 violation ancheta required forfeit property involved offence included 2998.81 generated sale internet bots proxies deposited wells fargo account approximately 58,357.86 proceeds generated surreptitious install adware protected computers linked paypal account owned ancheta 1993 bmw 325 property used commit facilitate commission violations including desktop computers laptops hard drives | [
1691,
3338
] | Test |
5,278 | 6 | Davfs2:davfs2 computer networking davfs2 linux tool connecting webdav shares though local disks open-source gpl-licensed file system mounting webdav servers communicating kernel davfs2 either use fuse file system api coda network file system protocol sockets davfs2 uses neon webdav library communicating web server davfs2 e.g used apache web server subversion installations | [
3599,
2547,
7161,
4672,
3626,
6117,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
4855,
7718,
200,
12... | Test |
5,279 | 2 | IGUANA_Computing:iguana computing independent group unix-alikes networking activists iguana developers wombat system iguana also operating system os personality provides set services memory management process protection iguana designed base provision operating system services embedded systems among others provides underlying os wombat version paravirtualised linux designed provide legacy support embedded systems wombat works combination kenge iguana also used along create qualcomm rex os designed cell phones | [
4751,
6874,
4478,
900,
2467,
2294,
5571,
2300,
2118,
6360,
578,
7554,
6367,
4447,
443
] | Validation |
5,280 | 4 | Outbound_content_compliance:outbound content compliance outbound content compliance outbound content security relatively new segment computer security field aims detect prevent outbound content violates policy organization and/or government regulations deals internal threats opposite traditional security solutions firewall anti-virus anti-spam etc dealing external threats therefore sometimes called inside-out security business environment purpose prevent confidential and/or private data leaks protected information may belong company customers us canada european countries enacted laws mandating protection types computer-based information us laws including related provisions sarbanes-oxley hipaa gramm-leach-bliley act interest segment heated string high-profile data breaches personal information millions people stolen endangered | [
1805,
5908
] | Validation |
5,281 | 5 | GENA:gena gena stands general event notification architecture gena base defines http notification architecture transmits notifications http resources http resource could object might need send receive notification example distribution list buddy list print job etc defined internet-draft draft-cohen-gena-p-base-01.txt expired gena base client arbiter provides ability send receive notifications using http tcp/ip administratively scoped unreliable multicast udp provisions made use intermediary arbiters called subscription arbiters handle routing notifications intended destination july 13–14 1998 university california irvine convened wisen workshop internet-scale event notification event brought together number experts various fields included presentation gena josh cohen microsoft delegates showcased event notification architectures haggled requirements josh final slide includes bullet points gena implemented microsoft products wish collaborate agree standard gena comply interest event notification appears waned 1998 participants unable come common definitions required definition notification services protocols gena briefly considered use internet printing protocol found niche part universal plug play upnp architecture gena base client arbiter | [
84
] | Test |
5,282 | 9 | Max_(software):max software max also known max/msp/jitter visual programming language music multimedia developed maintained san francisco-based software company cycling '74 thirty-year history used composers performers software designers researchers artists create recordings performances installations max program modular routines existing shared libraries application programming interface api allows third-party development new routines named external objects thus max large user base programmers unaffiliated cycling '74 enhance software commercial non-commercial extensions program extensible design simultaneously represents program structure graphical user interface gui max described lingua franca developing interactive music performance software 1980s miller puckette began work max 1985 institut de recherche et coordination acoustique/musique ircam paris originally called patcher first version provided composers graphical interface creating interactive computer music scores macintosh point development max could n't perform real-time sound synthesis software instead sent control messages external hardware synthesizers samplers using midi similar protocol earliest widely recognized use composition pluton 1988 piano computer piece philippe manoury software synchronized computer piano controlled sogitec 4x audio processing 1989 ircam developed max/fts faster sound version max ported ircam signal processing workstation ispw next also known audio max would prove forerunner max msp audio extensions adding ability real-time synthesis using internal hardware digital signal processor dsp board year ircam licensed software opcode systems 1990s opcode launched commercial version named max 1990 developed extended david zicarelli however 1997 opcode considering cancelling instead zicarelli acquired publishing rights founded new company cycling '74 continue commercial development timing fortunate opcode acquired gibson guitar 1998 ended operations 1999 ircam in-house max development also winding last version produced jmax direct descendant max/fts developed 1998 silicon graphics sgi later linux systems used java graphical interface c real-time backend eventually released open-source software meanwhile puckette independently released fully redesigned open-source composition tool named pure data pd 1996 despite underlying engineering differences ircam versions continued tradition cycling '74 first max release 1997 derived partly puckette work pure data called max/msp max signal processing initials miller smith puckette remains notable max many extensions incarnations made max capable manipulating real-time digital audio signals without dedicated dsp hardware meant composers could create complex synthesizers effects processors using general-purpose computer like macintosh powerbook g3 1999 netochka nezvanova collective released nato.0+55 suite externals added extensive real-time video control max 2000s though nato became increasingly popular among multimedia artists development stopped 2001 softvns another set extensions visual processing max released 2002 canadian media artist david rokeby cycling '74 released set video extensions jitter alongside max 4 2003 adding real-time video opengl graphics matrix processing capabilities max 4 also first version run windows max 5 released 2008 redesigned patching gui first time max commercial history 2010s 2011 max 6 added new audio engine compatible 64-bit operating systems integration ableton live sequencer software extension called gen compile optimized max patches higher performance max 7 released 2014 focused 3d rendering improvements september 25 2018 max 8 recent major version software released new features include mc new way work multiple channels javascript support node max vizzie 2 june 6 2017 ableton announced purchase cycling '74 max continuing published cycling '74 david zicarelli remaining company programs sharing max visual programming concepts commonly used real-time audio video synthesis processing max named composer max mathews considered descendant music language though graphical nature disguises fact like music-n languages max distinguishes two levels time event scheduler dsp corresponds distinction k-rate a-rate processes csound control rate vs. audio rate supercollider basic language max sibling programs data-flow system max programs named patches made arranging connecting building-blocks objects within patcher visual canvas objects act self-contained programs reality dynamically linked libraries may receive input one visual inlets generate output visual outlets objects pass messages outlets inlets connected objects max supports six basic atomic data types transmitted messages object object int float list symbol bang signal msp audio connections several complex data structures exist within program handling numeric arrays table data hash tables coll data xml information pattr data json-based dictionaries dict data msp data structure buffer~ hold digital audio information within program memory addition jitter package adds scalable multi-dimensional data structure handling large sets numbers storing video datasets matrix data max typically learned acquiring vocabulary objects function within patcher example metro object functions simple metronome random object generates random integers objects non-graphical consisting object name several arguments-attributes essence class properties typed object box objects graphical including sliders number boxes dials table editors pull-down menus buttons objects running program interactively max/msp/jitter comes 600 objects standard package extensions program written third-party developers max patchers e.g encapsulating functionality patcher sub-program max patch objects written c c++ java javascript order execution messages traversing graph objects defined visual organization objects patcher result organizing principle max unusual program logic interface presented user typically related though newer versions max provide several technologies standard gui design max documents named patchers bundled stand-alone applications distributed free sold commercially addition max used author audio midi plugin software ableton live max live extension increased integration laptop computers live music performance electronic music elsewhere max/msp max/jitter received attention development environment available serious laptop music/video performance | [
6507,
1908,
2451,
4759,
6245,
4853,
3534,
5571,
578,
7010,
2592,
4981,
5420,
5266,
3915,
5260,
1435,
5450
] | Test |
5,283 | 5 | HTTP/3:http/3 http/3 h3 upcoming third major version hypertext transfer protocol used exchange binary information world wide web http/3 draft based previous rfc draft named hypertext transfer protocol http quic quic transport layer network protocol initially developed google user space congestion control used user datagram protocol udp 28 october 2018 mailing list discussion mark nottingham chair ietf http quic working groups made official request rename http-over-quic http/3 clearly identify another binding http semantics wire protocol ... people understand separation quic pass development quic working group http working group finalizing publishing draft subsequent discussions followed stretched several days nottingham proposal accepted fellow ietf members november 2018 gave official seal approval http-over-quic become http/3 | [
4655,
6802,
5378,
7537,
6809,
393,
3291,
2574,
2577,
6452,
4352,
4725,
1136,
6858,
84,
445,
1152,
1525,
7628,
5821,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
5887,
6966,
5542,
6984,
1276,
7015,
7749,
2049,
4565,
2812,
2... | Test |
5,284 | 2 | Larry_McVoy:larry mcvoy larry mcvoy born 1962 concord massachusetts united states ceo bitmover company makes bitkeeper version control system used february 2002 early 2005 manage source code linux kernel earned bs ms degrees computer science 1985 1987 respectively university wisconsin–madison work generally included performance enhancements various unix operating systems developed employers mcvoy worked sun worked peer-to-peer scm system named teamware would form basis later bitkeeper product mcvoy started working linux kernel around 0.9.7 version developed lmbench kernel benchmark lmbench maintained 2009 carl staelin bitkeeper source control system also developed integrated linux development process 2002 mcvoy decided charge use bitkeeper linux development community prompted development git tool began serving source control system linux kernel 2005 working sun early 1990s mcvoy number high-profile unix community members urged company open-source flagship unix product sunos compete microsoft new windows nt operating system proposal would created copyleft version sunos time linux reached 1.0 version | [
2559,
7010,
5571,
6256
] | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.