node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,385
7
CallidusCloud:calliduscloud calliduscloud global enterprise software saas company headquartered dublin california company best known cloud-based solutions sales effectiveness sales performance management sales execution cpq clm software services callidus software inc. incorporated delaware september 6 1996 founders andrew swett scott kitayama company specializing providing enterprise incentive management eim application systems initial funding came onset ventures first hire former chief architect greg holmberg followed former president ceo reed d. taussig november 2003 company went public nasdaq national market stock symbol cald raising us 70 million following list acquisitions calliduscloud.com calliduscloud formerly callidus software 200m revenue 200m cash grows around 30 2014 total revenue 136.6 million increase 24.3 million 22 2013 2015 total revenue increased 27 173.1 million 2015 company added 900 customers take total number companies using one software products 4,600 report 5000 january 30 2018 announced sap company acquired calliduscloud 2.4 billion calliduscloud provides software service saas solutions marketing sales effectiveness suite solutions includes applications identify right leads ensure proper territory quota distribution enable sales forces automate quote proposal generation streamline sales compensation additionally offer applications customer experience monitoring sales gamification learning management including content authoring calliduscloud global alliance partners providing integrated solution complement calliduscloud products system integrators partners providing user companies wide range selections support different sales methodologies drive revenue technology partners provide functionality complements calliduscloud product capabilities partner companies include adobe accenture canidium llc deloitte lanshore llc netsuite opensymmetry oracle salesforce.com sap
[ 2961, 7037, 330 ]
Test
5,386
2
F-Droid:f-droid f-droid community-maintained software repository android similar google play store main repository hosted project contains free libre software apps applications browsed installed f-droid website client app without need register account anti-features advertising user tracking dependence nonfree software flagged app descriptions website also offers source code applications hosts well software running f-droid server allowing anyone set app repository f-droid founded ciaran gultnieks 2010 client forked aptoide source code project run english nonprofit f-droid limited replicant fully free software android operating system uses f-droid default recommended app store guardian project suite free secure android applications started running f-droid repository early 2012 2012 free software foundation europe featured f-droid free android campaign raise awareness privacy security risks proprietary software f-droid chosen part gnu project gnu day initiative 30th anniversary encourage use free software march 2016 f-droid partnered guardian project copperheados goal creating solution verifiably trusted operating system network network services way app stores apps f-droid repository contains growing number 2,600 apps compared 1.43 million google play store project incorporates several software sub-projects f-droid builds apps publicly available freely licensed source code project run entirely volunteers formal app review process new apps contributed user submissions developers requirement free proprietary software install f-droid client user allow installation unknown sources android settings retrieve apk installable file official site installation available google play store due non-compete clause google play developer distribution agreement client designed resilient surveillance censorship unreliable internet connections promote anonymity supports http proxies repositories hosted tor hidden services client devices function impromptu app stores distributing downloaded apps devices local wi-fi bluetooth android beam f-droid client app automatically offer updates installed f-droid apps f-droid privileged extension installed updates also conducted app background extension installed via rooting flashing zip file device android operating system checks updates signed key preventing others distributing updates signed different key originally google play store required applications signed developer application f-droid allowed signing keys apps previously installed another source reinstalled receive updates 2017 google play encourages developers let google play manage signing keys offering similar service f-droid offered since 2011 f-droid lets developers use keys via reproducible build process 2012 security researcher developer moxie marlinspike discouraged use f-droid particular criticised distributing outdated version textsecure contained known bug fixed recent version application f-droid announced removal textsecure repository noting removal requested marlinspike also pointing source code official textsecure binary bug question fixed published marlinspike later criticised project handling issue stating mischaracterized scope bug incredibly immature post announcing removal received email users view misled f-droid announcement
[ 7232, 3933, 6609, 1260, 5726, 6521, 7619, 5912, 7169, 8180, 474, 6621, 3366, 4778, 6440, 5571, 578, 740, 4059, 6916, 6743, 3559, 3310, 2771, 326, 2233, 1399, 2594, 4441, 1406, 2876, 1684, 952, 523, 163, 6312, 5965, 3583, 5092 ]
Validation
5,387
5
Space-division_multiple_access:space-division multiple access space-division multiple access sdma channel access method based creating parallel spatial pipes next higher capacity pipes spatial multiplexing and/or diversity able offer superior performance radio multiple access communication systems traditional mobile cellular network systems base station information position mobile units within cell radiates signal directions within cell order provide radio coverage method results wasting power transmissions mobile units reach addition causing interference adjacent cells using frequency called co-channel cells likewise reception antenna receives signals coming directions including noise interference signals using smart antenna technology differing spatial locations mobile units within cell space-division multiple access techniques offer attractive performance enhancements radiation pattern base station transmission reception adapted user obtain highest gain direction user often done using phased array techniques gsm cellular networks base station aware distance direction mobile phone use technique called timing advance ta base transceiver station bts determine far mobile station ms interpreting reported ta information along parameters used power bts ms power control feature implemented network power control either bts ms implemented modern networks especially ms ensures better battery life ms also bts close user results less exposure electromagnetic radiation manner 5th generation mobile networks focused using given position ms relation bts order focus ms radio frequency power bts direction vice versa thus enabling power savings mobile operator reducing ms sar index reducing em field around base stations since beam forming concentrate rf power used rather spread uniformly around bts reducing health safety concerns enhancing spectral efficiency decreased ms battery consumption
[ 7052, 1618, 6071, 1443, 3956, 823, 7824, 1375, 2117, 740, 320, 4970, 8108, 3724, 6468, 2061, 768, 1974, 2880, 4093, 5175, 1142, 1988, 84 ]
Test
5,388
0
Association_for_Computational_Linguistics:association computational linguistics association computational linguistics acl international scientific professional society people working problems involving natural language computation annual meeting held summer locations significant computational linguistics research carried founded 1962 originally named association machine translation computational linguistics amtcl became acl 1968 acl european eacl north american naacl chapter acl journal computational linguistics primary forum research computational linguistics natural language processing since 1988 journal published acl mit press acl large number special interest groups sigs focusing specific areas natural language processing current sigs within acl year acl elects distinguished computational linguist becomes vice-president organization next calendar year president one year later recent acl presidents
[ 706, 4660, 1444, 4037, 1633, 3183, 2921, 7900, 6632, 7909, 2215, 5838, 7372, 2863, 1209, 2595, 1773, 7293, 1314, 5429, 5971 ]
Validation
5,389
4
Tarah_Wheeler:tarah wheeler tarah marie wheeler born february 12 1979 american technology cybersecurity executive author currently cybersecurity policy fellow d.c. policy think-tank new america former cybersecurity czar symantec author women tech founder infosec unlocked wheeler received bachelor degree carroll college master degree political science portland state university 2004 named national science foundation-funded fellow center study complex systems university michigan 2012 founded cloud computing company fizzmint 2014 wheeler founded infosec unlocked diversity non-profit whose goal help bring diverse voices infosec conferences across united states paper writing events scholarships extension youtube series discussed diversity topics def con unlocked series mostly covered topics relating diversity def con one world largest hacker conferences 2016 wheeler named cybersecurity passcode influencer christian science monitor 2016 spoke federal trade commission information security tech startups published women tech book dedicated teaching women succeed tech careers gave advice women technologists interview techniques salary negotiation systems architect mobile encryption firm silent circle fall 2016 university california berkeley taught class wheeler book necessities overcoming barriers entry technology industry requirements success woman trying enter field kickstarter campaign wheeler published women tech several contributors including esther dyson brianna wu one targets gamergate controversy experienced threats including wu retained coauthor due wu experience gaming industry wheeler experienced multiple death rape threats online activism august 2017 wheeler announced twitter left symantec work several books october awarded inaugural women leaders cybersecurity award nyu senior director data trust threat vulnerability management splunk currently cybersecurity policy fellow d.c. policy think-tank new america wheeler cited national media expert issues relating cybersecurity cyberterrorism malware data breaches written cyberwar policy wheeler plays poker competed world series poker
[ 7984, 2566 ]
Train
5,390
4
Sequence-related_amplified_polymorphism:sequence-related amplified polymorphism sequence related amplified polymorphism srap molecular technique developed g. li c. f. quiros 2001 detecting genetic variation open reading frames orfs genomes plants related organisms
[ 1098 ]
Test
5,391
2
Magic_Cap:magic cap magic cap short magic communicating applications platform discontinued object-oriented operating system pdas developed general magic tony fadell contributor platform darin adler architect magic cap incorporates room metaphor user navigates room room perform various tasks going home office perform word processing file room clean system files automation based mobile agents office assistant several electronic companies came market magic cap devices notable sony magic link motorola envoy released 1994 none devices commercial successes magic cap operating system includes new mobile agent technology named telescript conceptually agents would carry work orders travel place outside handheld device complete work return device results magic cap devices delivered place agents travel personalink service provided agents little access functionality since agent strictly authorized scope inquiry limited software modules installed personalink servers payload carried agents also hampered slow baud rate modems devices 2400 bit/s authentication/authorization system mobile agents telescript created high coupling device target place result deployment agent-based technology incredibly difficult never reached fruition personalink service shut
[ 1522, 3081, 2187, 4400, 3097, 474, 2564, 2300, 5486, 5579, 740, 5236, 5062, 1399, 3039, 1582, 5068, 2503, 2240, 424, 7030, 5872, 7126, 2520, 4549, 2071, 349, 1509, 5794, 6158, 7956 ]
Test
5,392
4
Web_access_management:web access management web access management wam form identity management controls access web resources providing authentication management policy-based authorizations audit reporting services optional single sign-on convenience authentication management process determining user ’ application ’ identity normally done prompting user name password additional methods authentication also include access tokens generate one-time passwords digital certificates user process identity confirmed policy-based authorization comes play web resource one policies attached say e.g allow internal employees access resource and/or allow members admin group access resource requested resource used look policy policy evaluated user ’ identity user passes policy evaluation she/he granted access resource user fails evaluation access denied authentication authorization policy decision made outcome recorded auditing purposes benefit end user web access management product tie security together benefit administrative staff offer single sign process user logs web resource automatically logged related resources users inconvenienced attempting get authenticated multiple websites throughout course day potentially different user names passwords web access management product record initial authentication provide user cookie acts temporary token authentication protected resources thereby requiring user log web access management products originated late 1990s known single sign five original products hewlett-packard hp icewall sso ca technologies siteminder oblix access manager magnaquest technologies limited iam identity access management novell ichain products simple functional capabilities solved important issue time – share user credentials across multiple domains without forcing user log challenge stemmed fact cookies domain-specific simple way seamlessly transfer user one website another new term became known web access management products added functionality controlling resources web pages user could access addition authenticating three different types architectures comes web access management architectures plug-in web agent proxy tokenization plugins programs installed every web/application server register servers called every request web page intercept request communicate external policy server make policy decisions one benefits plugin agent based architecture highly customized unique needs particular web server one drawbacks different plugin required every web server every platform potentially every version every server technology evolves upgrades agents must distributed compatible evolving host software proxy-based architectures differ web requests routed proxy server back-end web/application servers provide universal integration web servers since common standard protocol http used instead vendor-specific application programming interfaces apis one drawbacks additional hardware usually required run proxy servers tokenization differs user receives token used directly access back-end web/application servers architecture authentication occurs web access management tool data flows around removes network bottlenecks caused proxy-based architectures one drawbacks back-end web/application server must able accept token otherwise web access management tool must designed use common standard protocols solutions like ca siteminder known ca single sign-on offer agent proxy based options including standards based federation maxecurity p2 security employs proxy approach netiq access manager offers hybrid solution consists proxy j2ee agent approaches telegrid smrte employs tokenization approach cases annual maintenance costs dwarf purchase price example policy servers used plugin proxy-based architectures high-end hardware needed order handle workload required run web access management infrastructure centralized administration additional hidden cost customers need hire train staff exclusively manage policy entitlements underlying web applications final hidden cost relates regulatory compliance since web access management similar concept firewall closely aligned application-layer firewall must able handle major audit requirements especially public companies subject sarbanes-oxley act mention bound health insurance portability accountability act pci cpni larger companies spend tremendous amounts time money auditing web access management infrastructures since enforcement points many internal external applications
[ 2489, 3764, 5149, 7451, 3338, 5908, 3794 ]
Test
5,393
4
Phone_hacking:phone hacking phone hacking practice manipulating gaining unauthorized access mobile phones intercepting telephone calls accessing voicemail messages unauthorized access phone user conversation commonly referred phone tapping term came prominence news international phone hacking scandal alleged cases proved court british tabloid newspaper news world involved interception voicemail messages british royal family public figures murdered schoolgirl named milly dowler although mobile phone users may targeted famous rich powerful whose prize important enough whatever reason devote time resources make concerted attack usually common real risks face unauthorised remote access voicemail systems exposed news international phone hacking scandal possible weaknesses implementations systems telcos pabx systems distant voicemail feature accessed entering password initial greeting played hacker call direct dial number voicemail try use default password guess select call back function enter premium rate number call back pabx calls back premium rate line confirming password hacker stop form hacking call back feature pabx turned strong password used mobile phone voicemail messages may accessed landline telephone entry personal identification number pin service provider commonly sets four digit default pin rarely changed phone owner hacker knows phone number default pin access voicemail messages associated service even default pin known social engineering used reset voicemail pin code default impersonating owner phone call call centre many people also use weak pins easy guess prevent subscribers choosing pins weak password strength mobile phone companies disallow use consecutive repeat digits voicemail pin codes mid-2000s discovered calls emanating handset registered voicemail account would put straight voicemail without need pin hacker could use caller id spoofing impersonate target handset caller id thereby gain access associated voicemail without pin following controversies phone hacking criticism leveled mobile service providers allowed access voicemail without pin many mobile phone companies strengthened default security systems remote access voicemail messages phone settings longer achieved even via default pin example announced august 2011 new wireless subscribers would required enter pin checking voicemail even checking phones t-mobile stated recommends turn voice mail password added security always choice analysis user-selected pin codes suggested ten numbers represent 15 iphone passcodes 1234 0000 common years birth graduation also common choices even four-digit pin randomly selected key space small formula_1 10,000 possibilities making pins significantly easier brute force passwords someone physical access handset secured pin therefore feasibly determine pin short time mobile phone microphones activated remotely security agencies telcos without need physical access long battery removed roving bug feature used law enforcement agencies intelligence services listen nearby conversations techniques phone hacking include tricking mobile phone user downloading malware monitors activity phone bluesnarfing unauthorized access phone via bluetooth flaws implementation gsm encryption algorithm allow passive interception equipment needed available government agencies built freely available parts december 2011 german researcher karsten nohl revealed possible hack mobile phone voice text messages many networks free decryption software available internet blamed mobile phone companies relying outdated encryption techniques 2g system said problem could fixed easily phone hacking form surveillance illegal many countries unless carried lawful interception government agency news international phone hacking scandal private investigator glenn mulcaire found violated regulation investigatory powers act 2000 sentenced six months prison january 2007 renewed controversy phone hacking claims led closure news world july 2011 december 2010 truth caller id act signed united states law making illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value
[ 6788, 208, 6515, 6240 ]
Test
5,394
4
William_Coffee:william coffee william coffee 1917-1989 received commendation meritorious civilian service april 1946 role recruiting leading group african-american cryptographers signals intelligence service began career public service civilian conservation corps 1937 1940 soon began working signal intelligence service later known signal security agency despite hired janitor promoted messenger upon promoted assigned task hiring group black cryptologists arlington hall station success composing directing group elevated status previously unreached black cryptologists second world war coffee joined armed forces security agency later became national security agency coffee retired nsa 1972 inducted national security agency cryptologic hall honor 2011
[]
Test
5,395
9
Format_(Common_Lisp):format common lisp codice_1 function common lisp produce formatted text using format string similar printf format string provides functionality codice_2 allowing user output numbers english apply certain format specifiers certain conditions iterate data structures output tabular format functionally originates mit lisp machine lisp based multics codice_3 example c codice_2 call following using common lisp equivalent another example would print every element list delimited commas done using ~^ directives note list values iterated directly codice_5 commas correctly printed items yet complex example would printing list using customary english phrasing whilst codice_5 somewhat infamous tendency become opaque hard read provides remarkably concise yet powerful syntax specialised common need common lisp format summary table available
[ 1445, 2871 ]
Test
5,396
2
Z/VM:z/vm z/vm current version ibm vm family virtual machine operating systems z/vm first released october 2000 remains active use development directly based technology concepts dating back 1960s ibm cp/cms ibm system/360-67 see article history cp/cms historical details z/vm runs ibm system z family computers used support large numbers thousands linux virtual machines see linux z systems october 16 2018 ibm released z/vm version 7.1 requires z/architecture implemented ibm ec12 bc12 later models
[ 4293, 2182, 4670, 6094, 5041, 7546, 402, 3978, 5064, 6849, 4366, 83, 1516, 1522, 7605, 6518, 3005, 1547, 5481, 839, 4428, 7278, 850, 5884, 1994, 3761, 7331, 5904, 4498, 7357, 5571, 5932, 6634, 7003, 938, 5244, 607, 2431, 4566, 2818, 817...
Validation
5,397
4
Integer_overflow:integer overflow computer programming integer overflow occurs arithmetic operation attempts create numeric value outside range represented given number digits – either larger maximum lower minimum representable value common result overflow least significant representable digits result stored result said wrap around maximum i.e modulo power radix usually two modern computers sometimes ten another radix overflow condition may give results leading unintended behavior particular possibility anticipated overflow compromise program reliability security applications timers clocks wrapping overflow desirable c11 standard states unsigned integers modulo wrapping defined behavior term overflow never applies computation involving unsigned operands never overflow processors like graphics processing units gpus digital signal processors dsps support saturation arithmetic overflowed results would clamped i.e set minimum maximum value representable range rather wrapped around register width processor determines range values represented registers though vast majority computers perform multiple-precision arithmetic operands memory allowing numbers arbitrarily long overflow avoided register width limits sizes numbers operated e.g added subtracted using single instruction per operation typical binary register widths unsigned integers include arithmetic operation produces result larger maximum n-bit integer overflow reduces result modulo n-th power 2 retaining least significant bits result effectively causing wrap around particular multiplying adding two integers may result value unexpectedly small subtracting small integer may cause wrap large positive value example 8-bit integer addition 255 2 results 1 similarly subtraction 0 − 1 results 255 two complement representation −1 wraparound may cause security problems—if overflowed value used number bytes allocate buffer buffer allocated unexpectedly small potentially leading buffer overflow depending usage buffer might turn cause arbitrary code execution variable signed integer type program may make assumption variable always contains positive value integer overflow cause value wrap become negative violates program assumption may lead unexpected behavior example 8-bit integer addition 127 1 results −128 two complement 128 solution particular problem use unsigned integer types values program expects assumes never negative computers two dedicated processor flags check overflow conditions carry flag set result addition subtraction considering operands result unsigned numbers fit given number bits indicates overflow carry borrow significant bit immediately following add carry subtract borrow operation would use contents flag modify register memory location contains higher part multi-word value overflow flag set result operation signed numbers sign one would predict signs operands e.g negative result adding two positive numbers indicates overflow occurred signed result represented two complement form would fit given number bits unsigned type ideal result operation outside types representable range returned result obtained wrapping event commonly defined overflow contrast c11 standard defines event overflow states computation involving unsigned operands never overflow ideal result integer operation outside types representable range returned result obtained clamping event commonly defined saturation usage varies whether saturation overflow eliminate ambiguity terms wrapping overflow saturating overflow used term underflow commonly used floating-point math integer math many references found integer underflow term integer underflow used means ideal result closer minus infinity output type representable value closest minus infinity term integer underflow used definition overflow may include types overflows may include cases ideal result closer positive infinity output type representable value closest positive infinity ideal result operation exact integer meaning overflow ambiguous edge cases consider case ideal result value 127.25 output type maximum representable value 127 overflow defined ideal value outside representable range output type case would classified overflow operations well defined rounding behavior overflow classification may need postponed rounding applied c11 standard defines conversions floating point integer must round toward zero c used convert floating point value 127.25 integer rounding applied first give ideal integer output 127 since rounded integer outputs range c standard would classify conversion overflow several methods handling overflow programming languages implement various mitigation methods accidental overflow ada seed7 certain variants functional languages trigger exception condition overflow python since 2.4 seamlessly converts internal representation number match growth eventually representing codice_1 – whose ability limited available memory run-time overflow detection implementation codice_2 also available c compilers languages native support arbitrary-precision arithmetic type safety python common lisp numbers promoted larger size automatically overflows occur exceptions thrown conditions signaled range constraint exists using languages may thus helpful mitigate issue however languages situations still possible integer overflow occur example explicit optimization code path considered bottleneck profiler case common lisp possible using explicit declaration type-annotate variable machine-size word fixnum lower type safety level zero particular code block java 8 overloaded methods example like throw case overflow computer emergency response team cert developed as-if infinitely ranged air integer model largely automated mechanism eliminate integer overflow truncation c/c++ using run-time error handling computer graphics signal processing typical work data ranges 0 1 −1 1 example grayscale image 0 represents black 1 represents white values in-between represent varying shades gray one operation one may want support brightening image multiplying every pixel constant saturated arithmetic allows one blindly multiply every pixel constant without worrying overflow sticking reasonable outcome pixels larger 1 i.e brighter white become white values darker black become black unanticipated arithmetic overflow fairly common cause program errors overflow bugs may hard discover diagnose may manifest large input data sets less likely used validation tests taking arithmetic mean two numbers adding dividing two done many search algorithms causes error sum although resulting mean large represented hence overflows unhandled arithmetic overflow engine steering software primary cause crash 1996 maiden flight ariane 5 rocket software considered bug-free since used many previous flights used smaller rockets generated lower acceleration ariane 5 frustratingly part software overflow error occurred even required running ariane 5 time caused rocket fail—it launch-regime process smaller predecessor ariane 5 remained software adapted new rocket furthermore actual cause failure flaw engineering specification software dealt overflow detected diagnostic dump bus would connected test equipment software testing development connected rocket steering motors flight data dump drove engine nozzle hard one side put rocket aerodynamic control precipitated rapid breakup air 30 april 2015 federal aviation authority announced order boeing 787 operators reset electrical system periodically avoid integer overflow could lead loss electrical power ram air turbine deployment boeing deployed software update fourth quarter european aviation safety agency followed 4 may 2015 error happens 2³¹ centiseconds 2^31/100/3600/24 days indicating 32-bit signed integer overflow bugs evident computer games arcade game donkey kong impossible advance past level 22 due integer overflow time/bonus game takes level number user multiplies 10 adds 40 reach level 22 time/bonus number 260 large 8-bit 256 value register resets 0 gives remaining 4 time/bonus – short finish level donkey kong jr math trying calculate number 10000 shows first 4 digits overflow cause famous split-screen level pac-man nuclear gandhi civilization also caused far lands minecraft existed infdev development period beta 1.7.3 however later fixed beta 1.8 still exists pocket edition windows 10 edition versions minecraft super nintendo game lamborghini american challenge player cause amount money drop 0 race fined limit remaining money paying fee race glitches integer grants player 65,535,000 would going negative similar glitch occurs player drop negative amount fast travelling without sufficient funds proceeding event player gets robbed currency taken away game attempts take players money away amount 0 player granted 2147482963 game currency microsoft ibm macro assembler masm version 1.00 likely programs built pascal compiler integer overflow signedness error stack setup code prevented running newer dos machines emulators common configurations 512 kb memory program either hangs displays error message exits dos 2014 music video psy gangnam style received many views youtube breached maximum possible viewership number within signed 32-bit integer youtube subsequently amended maximum count 64-bit integer august 2016 casino machine resorts world casino printed prize ticket 42,949,672.76 result overflow bug casino refused pay amount calling malfunction using defense machine clearly stated maximum payout 10,000 prize higher result programming bug iowa supreme court ruled favor casino
[ 2451, 1445, 1348, 7430, 6427, 5117, 7442, 304, 1336, 1019, 6118, 4074, 7106, 3220, 3221, 3225, 2148, 7032, 2883, 5697, 7217, 5965, 1236, 1237, 2800, 5091, 1435 ]
Test
5,398
4
Minnie_M._Kenny:minnie m. kenny minnie m. kenny 1929–august 17 2005 cryptanalyst educator equal opportunity activist worked national security agency nsa served deputy commandant national cryptologic school responsible creating scholarships nsa employees recipient numerous awards including meritorious exceptional civilian service awards presidential meritorious executive award distinguished service award cia kenny inducted cryptologic hall honor 2009 minnie mcneal born 1929 philadelphia graduating philadelphia high school girls worked philadelphia commerce department united states census bureau washington d. c. hired 1951 work arlington hall army security agency part first group african americans allowed work upstairs operations division basement assigned u street school training training change organization military footing national security agency 1952 mcneal assigned communications clerk allo non-soviet linguistics unit particularly well known expertise cryptanalysis language traffic analysis worked elite think tank nsa develop programs cryptanalysis language serving chair agency language panel 1972 mcneal married herbert cornelius kenny one singers ink spots daughter daphne 1973 kenny became founding editor nsa group b journal dragon seeds pressed cryptanalyst personal computer necessary tool 1975 1981 served office techniques standards nsa chief language linguistics 1980 recipient meritorious civilian service award beginning 1982 kenny served deputy commandant national cryptologic school worked traditional black colleges universities increase diversity introduced computer assisted teaching techniques founded computer assisted learning instruction consortium calico bring professional language teachers use language together international association 1984 kenny awarded second civilian honor exceptional civilian service award nsa presidents ronald reagan george h. w. bush awarded meritorious executive award decade working improve school kenny served department defense congressional task force women minorities handicapped science technology nsa director equal employment opportunity 1993 retirement recipient central intelligence agency distinguished service award kenny served congressional fellow staff congressman louis stokes worked drafting underground railroad act 1997 designed preserve protect history significant buildings associated historic organization kenny died august 17 2005 columbia maryland buried st. john cemetery ellicott city maryland posthumously 2009 inducted cryptologic hall honor
[ 1353 ]
Test
5,399
4
FREAK:freak freak factoring rsa export keys security exploit cryptographic weakness ssl/tls protocols introduced decades earlier compliance u.s. cryptography export regulations involved limiting exportable software use public key pairs rsa moduli 512 bits less so-called rsa_export keys intention allowing broken easily national security agency nsa organizations lesser computing resources however early 2010s increases computing power meant could broken anyone access relatively modest computing resources using well-known number field sieve algorithm using little 100 cloud computing services combined ability man-in-the-middle attack manipulate initial cipher suite negotiation endpoints connection fact finished hash depended master secret meant man-in-the-middle attack modest amount computation could break security website allowed use 512-bit export-grade keys exploit discovered 2015 underlying vulnerabilities present many years dating back 1990s flaw found researchers imdea software institute inria microsoft research freak attack openssl identifier vulnerable software devices included apple safari web browser default browser google android operating system microsoft internet explorer openssl microsoft also stated schannel implementation transport-layer encryption vulnerable version freak attack versions microsoft windows cve id microsoft vulnerability schannel cve id apple vulnerability secure transport sites affected vulnerability included us federal government websites fbi.gov whitehouse.gov nsa.gov around 36 https-using websites tested one security group shown vulnerable exploit based geolocation analysis using ip2location lite 35 vulnerable servers located us press reports exploit described effects potentially catastrophic unintended consequence us government efforts control spread cryptographic technology vendors process releasing new software would fix flaw march 9 2015 apple released security updates ios 8 os x operating systems fixed flaw march 10 2015 microsoft released patch fixed vulnerability supported versions windows server 2003 vista later google chrome 41 opera 28 also mitigated flaw mozilla firefox vulnerable flaw research paper explaining flaw published 36th ieee symposium security privacy awarded distinguished paper award
[ 363, 794, 4214, 887, 5984, 4759, 6795, 1168, 1173, 2644, 1460, 5824, 8189, 8093, 6540, 6458, 6553, 2587, 4071, 7567, 7925, 3899, 2691, 2961, 4990, 6049, 7214, 3588, 353, 1059, 1513, 2620, 359, 3426 ]
Test
5,400
8
Diffbot:diffbot diffbot developer machine learning computer vision algorithms public apis extracting data web pages web scraping company founded 2008 stanford university first company funded startx stanford student enterprises stanford on-campus venture capital fund company gained interest application computer vision technology web pages wherein visually parses web page important elements returns structured format 2015 diffbot announced working version automated knowledge graph crawling web using automatic web page extraction build large database structured web data company products allow software developers analyze web home pages article pages extract important information ignoring elements deemed core primary content august 2012 company released page classifier api automatically categorizes web pages specific page types part diffbot analyzed 750,000 web pages shared social media service twitter revealed photos followed articles videos predominant web media shared social network company raised 2 million funding may 2012 investors including andy bechtolsheim sky dayton diffbot customers include adobe aol cisco duckduckgo ebay instapaper microsoft onswipe springpad
[ 80 ]
Train
5,401
4
Computer_virus:computer virus computer virus type malware executed replicates modifying computer programs inserting code replication succeeds affected areas said infected computer virus virus writers use social engineering deceptions exploit detailed knowledge security vulnerabilities initially infect systems spread virus vast majority viruses target systems running microsoft windows employing variety mechanisms infect new hosts often using complex anti-detection/stealth strategies evade antivirus software motives creating viruses include seeking profit e.g. ransomware desire send political message personal amusement demonstrate vulnerability exists software sabotage denial service simply wish explore cybersecurity issues artificial life evolutionary algorithms computer viruses currently cause billions dollars worth economic damage year due causing system failure wasting computer resources corrupting data increasing maintenance costs stealing personal information etc response free open-source antivirus tools developed industry antivirus software cropped selling freely distributing virus protection users various operating systems even though currently existing antivirus software able uncover computer viruses especially new ones computer security researchers actively searching new ways enable antivirus solutions effectively detect emerging viruses already become widely distributed term virus also misused extension refer types malware malware encompasses computer viruses along many forms malicious software computer worms ransomware spyware adware trojan horses keyloggers rootkits bootkits malicious browser helper object bhos malicious software majority active malware threats actually trojan horse programs computer worms rather computer viruses term computer virus coined fred cohen 1985 misnomer viruses often perform type harmful activity infected host computers acquisition hard disk space central processing unit cpu time accessing private information e.g. credit card numbers corrupting data displaying political humorous messages user screen spamming e-mail contacts logging keystrokes even rendering computer useless however viruses carry destructive payload attempt hide themselves—the defining characteristic viruses self-replicating computer programs modify software without user consent first academic work theory self-replicating computer programs done 1949 john von neumann gave lectures university illinois theory organization complicated automata work von neumann later published theory self-reproducing automata essay von neumann described computer program could designed reproduce von neumann design self-reproducing computer program considered world first computer virus considered theoretical father computer virology 1972 veith risak directly building von neumann work self-replication published article selbstreproduzierende automaten mit minimaler informationsübertragung self-reproducing automata minimal information exchange article describes fully functional virus written assembler programming language siemens 4004/35 computer system 1980 jürgen kraus wrote diplom thesis selbstreproduktion bei programmen self-reproduction programs university dortmund work kraus postulated computer programs behave way similar biological viruses first known description self-reproducing program short story occurs 1970 story gregory benford describes computer program called virus installed computer telephone modem dialling capability randomly dials phone numbers hit modem answered another computer attempts program answering computer program second computer also begin dialling random numbers search yet another computer program program rapidly spreads exponentially susceptible computers countered second program called vaccine idea explored two 1972 novels harlie one david gerrold terminal man michael crichton became major theme 1975 novel shockwave rider john brunner 1973 michael crichton sci-fi movie westworld made early mention concept computer virus central plot theme causes androids run amok alan oppenheimer character summarizes problem stating ... clear pattern suggests analogy infectious disease process spreading one ... area next replies stated perhaps superficial similarities disease must confess find difficult believe disease machinery creeper virus first detected arpanet forerunner internet early 1970s creeper experimental self-replicating program written bob thomas bbn technologies 1971 creeper used arpanet infect dec pdp-10 computers running tenex operating system creeper gained access via arpanet copied remote system message 'm creeper catch displayed reaper program created delete creeper 1982 program called elk cloner first personal computer virus appear wild —that outside single computer computer lab created written 1981 richard skrenta ninth grader mount lebanon high school near pittsburgh attached apple dos 3.3 operating system spread via floppy disk 50th use elk cloner virus would activated infecting personal computer displaying short poem beginning elk cloner program personality 1984 fred cohen university southern california wrote paper computer viruses – theory experiments first paper explicitly call self-reproducing program virus term introduced cohen mentor leonard adleman 1987 fred cohen published demonstration algorithm perfectly detect possible viruses fred cohen theoretical compression virus example virus malicious software malware putatively benevolent well-intentioned however antivirus professionals accept concept benevolent viruses desired function implemented without involving virus automatic compression instance available windows operating system choice user virus definition make unauthorised changes computer undesirable even damage done intended page one dr solomon virus encyclopaedia undesirability viruses even nothing reproduce thoroughly explained article describes useful virus functionalities published j b. gunn title use virus functions provide virtual apl interpreter user control 1984 first ibm pc virus wild boot sector virus dubbed c brain created 1986 farooq alvi brothers lahore pakistan reportedly deter unauthorized copying software written first virus specifically target microsoft windows winvir discovered april 1992 two years release windows 3.0 virus contain windows api calls instead relying dos interrupts years later february 1996 australian hackers virus-writing crew vlad created bizatch virus also known boza virus first known virus target windows 95 late 1997 encrypted memory-resident stealth virus win32.cabanas released—the first known virus targeted windows nt also able infect windows 3.0 windows 9x hosts even home computers affected viruses first one appear commodore amiga boot sector virus called sca virus detected november 1987 viable computer virus must contain search routine locates new files new disks worthwhile targets infection secondly every computer virus must contain routine copy program search routine locates three main virus parts infection mechanism also called 'infection vector virus spreads propagates virus typically search routine locates new files new disks infection trigger also known logic bomb compiled version could activated time within executable file virus run determines event condition malicious payload activated delivered particular date particular time particular presence another program capacity disk exceeding limit double-click opens particular file payload actual body data performs actual malicious purpose virus payload activity might noticeable e.g. causes system slow freeze time payload harmful activity times non-destructive distributive called virus hoax virus phases life cycle computer virus described using analogy biology life cycle divided four phases virus program idle stage virus program managed access target user computer software stage virus take action virus eventually activated trigger states event execute virus date presence another program file capacity disk exceeding limit user taking certain action e.g. double-clicking certain icon opening e-mail etc. viruses stage virus starts propagating multiplying replicating virus places copy programs certain system areas disk copy may identical propagating version viruses often morph change evade detection professionals anti-virus software infected program contain clone virus enter propagation phase dormant virus moves phase activated perform function intended triggering phase caused variety system events including count number times copy virus made copies actual work virus payload released destructive deleting files disk crashing system corrupting files relatively harmless popping humorous political messages screen computer viruses infect variety different subsystems host computers software one manner classifying viruses analyze whether reside binary executables .exe .com files data files microsoft word documents pdf files boot sector host hard drive combination memory-resident virus simply resident virus installs part operating system executed remains ram time computer booted shut resident viruses overwrite interrupt handling code functions operating system attempts access target file disk sector virus code intercepts request redirects control flow replication module infecting target contrast non-memory-resident virus non-resident virus executed scans disk targets infects exits i.e remain memory done executing many common applications microsoft outlook microsoft word allow macro programs embedded documents emails programs may run automatically document opened macro virus document virus virus written macro language embedded documents users open file virus code executed infect user computer one reasons dangerous open unexpected suspicious attachments e-mails opening attachments e-mails unknown persons organizations help reduce likelihood contracting virus cases virus designed e-mail appears reputable organization e.g. major bank credit card company boot sector viruses specifically target boot sector and/or master boot record mbr host hard disk drive solid-state drive removable storage media flash drives floppy disks etc. email viruses viruses intentionally rather accidentally uses email system spread virus infected files may accidentally sent email attachments email viruses aware email system functions generally target specific type email system microsoft outlook commonly used harvest email addresses various sources may append copies email sent may generate email messages containing copies attachments order avoid detection users viruses employ different kinds deception old viruses especially dos platform make sure last modified date host file stays file infected virus approach fool antivirus software however especially maintain date cyclic redundancy checks file changes viruses infect files without increasing sizes damaging files accomplish overwriting unused areas executable files called cavity viruses example cih virus chernobyl virus infects portable executable files files many empty gaps virus 1 kb length add size file viruses try avoid detection killing tasks associated antivirus software detect example conficker 2010s computers operating systems grow larger complex old hiding techniques need updated replaced defending computer viruses may demand file system migrate towards detailed explicit permission every kind file access kinds antivirus software employ various techniques counter stealth mechanisms infection occurs recourse clean system unreliable microsoft windows operating systems ntfs file system proprietary leaves antivirus software little alternative send read request windows os files handle requests viruses trick antivirus software intercepting requests operating system os virus hide intercepting request read infected file handling request returning uninfected version file antivirus software interception occur code injection actual operating system files would handle read request thus antivirus software attempting detect virus either given permission read infected file read request served uninfected version file reliable method avoid stealth viruses reboot medium known clear security software used check dormant operating system files security software relies virus signatures employ heuristics security software may also use database file hashes windows os files security software identify altered files request windows installation media replace authentic versions older versions windows file cryptographic hash functions windows os files stored windows—to allow file integrity/authenticity checked—could overwritten system file checker would report altered system files authentic using file hashes scan altered files would always guarantee finding infection modern antivirus programs try find virus-patterns inside ordinary programs scanning so-called virus signatures unfortunately term misleading viruses possess unique signatures way human beings virus signature merely sequence bytes antivirus program looks known part virus better term would search strings different antivirus programs employ different search strings indeed different search methods identifying viruses virus scanner finds pattern file perform checks make sure found virus merely coincidental sequence innocent file notifies user file infected user delete cases clean heal infected file viruses employ techniques make detection means signatures difficult probably impossible viruses modify code infection infected file contains different variant virus one method evading signature detection use simple encryption encipher encode body virus leaving encryption module static cryptographic key cleartext change one infection next case virus consists small decrypting module encrypted copy virus code virus encrypted different key infected file part virus remains constant decrypting module would example appended end case virus scanner directly detect virus using signatures still detect decrypting module still makes indirect detection virus possible since would symmetric keys stored infected host entirely possible decrypt final virus probably required since self-modifying code rarity may reason virus scanners least flag file suspicious old compact way use arithmetic operation like addition subtraction use logical conditions xoring byte virus constant exclusive-or operation repeated decryption suspicious code modify code encryption/decryption may part signature many virus definitions simpler older approach use key encryption consisted operations parameters like incrementing decrementing bitwise rotation arithmetic negation logical viruses called polymorphic viruses employ means encryption inside executable virus encrypted certain events virus scanner disabled updates computer rebooted called cryptovirology said times executable decrypt virus execute hidden runtimes infecting computer sometimes disabling antivirus software polymorphic code first technique posed serious threat virus scanners like regular encrypted viruses polymorphic virus infects files encrypted copy decoded decryption module case polymorphic viruses however decryption module also modified infection well-written polymorphic virus therefore parts remain identical infections making difficult detect directly using signatures antivirus software detect decrypting viruses using emulator statistical pattern analysis encrypted virus body enable polymorphic code virus polymorphic engine also called mutating engine mutation engine somewhere encrypted body see polymorphic code technical detail engines operate viruses employ polymorphic code way constrains mutation rate virus significantly example virus programmed mutate slightly time programmed refrain mutating infects file computer already contains copies virus advantage using slow polymorphic code makes difficult antivirus professionals investigators obtain representative samples virus bait files infected one run typically contain identical similar samples virus make likely detection virus scanner unreliable instances virus may able avoid detection avoid detected emulation viruses rewrite completely time infect new executables viruses utilize technique said metamorphic code enable metamorphism metamorphic engine needed metamorphic virus usually large complex example w32/simile consisted 14,000 lines assembly language code 90 part metamorphic engine software often designed security features prevent unauthorized use system resources many viruses must exploit manipulate security bugs security defects system application software spread infect computers software development strategies produce large numbers bugs generally also produce potential exploitable holes entrances virus order replicate virus must permitted execute code write memory reason many viruses attach executable files may part legitimate programs see code injection user attempts launch infected program virus code may executed simultaneously operating systems use file extensions determine program associations microsoft windows extensions may hidden user default makes possible create file different type appears user example executable may created named picture.png.exe user sees picture.png therefore assumes file digital image likely safe yet opened runs executable client machine vast majority viruses target systems running microsoft windows due microsoft large market share desktop computer users diversity software systems network limits destructive potential viruses malware open-source operating systems linux allow users choose variety desktop environments packaging tools etc. means malicious code targeting systems affect subset users many windows users running set applications enabling viruses rapidly spread among microsoft windows systems targeting exploits large numbers hosts linux unix general always natively prevented normal users making changes operating system environment without permission windows users generally prevented making changes meaning viruses easily gain control entire system windows hosts difference continued partly due widespread use administrator accounts contemporary versions like windows xp 1997 researchers created released virus linux—known bliss bliss however requires user run explicitly infect programs user access modify unlike windows users unix users log administrator root user except install configure software result even user ran virus could harm operating system bliss virus never became widespread remains chiefly research curiosity creator later posted source code usenet allowing researchers see worked many users install antivirus software detect eliminate known viruses computer attempts download run executable file may distributed email attachment usb flash drives example antivirus software blocks known malicious websites attempt install malware antivirus software change underlying capability hosts transmit viruses users must update software regularly patch security vulnerabilities holes antivirus software also needs regularly updated order recognize latest threats malicious hackers individuals always creating new viruses german av-test institute publishes evaluations antivirus software windows android examples microsoft windows anti virus anti-malware software include optional microsoft security essentials windows xp vista windows 7 real-time protection windows malicious software removal tool included windows security updates patch tuesday second tuesday month windows defender optional download case windows xp additionally several capable antivirus software programs available free download internet usually restricted non-commercial use free programs almost good commercial competitors common security vulnerabilities assigned cve ids listed us national vulnerability database secunia psi example software free personal use check pc vulnerable out-of-date software attempt update ransomware phishing scam alerts appear press releases internet crime complaint center noticeboard ransomware virus posts message user screen saying screen system remain locked unusable ransom payment made phishing deception malicious individual pretends friend computer security expert benevolent individual goal convincing targeted individual reveal passwords personal information commonly used preventative measures include timely operating system updates software updates careful internet browsing avoiding shady websites installation trusted software certain browsers flag sites reported google confirmed hosting malware google two common methods antivirus software application uses detect viruses described antivirus software article first far common method virus detection using list virus signature definitions works examining content computer memory random access memory ram boot sectors files stored fixed removable drives hard drives floppy drives usb flash drives comparing files database known virus signatures virus signatures strings code used identify individual viruses virus antivirus designer tries choose unique signature string found legitimate program different antivirus programs use different signatures identify viruses disadvantage detection method users protected viruses detected signatures recent virus definition update protected new viruses see zero-day attack second method find viruses use heuristic algorithm based common virus behaviors method ability detect new viruses antivirus security firms yet define signature also gives rise false positives using signatures false positives disruptive especially commercial environment may lead company instructing staff use company computer system services checked system viruses slow productivity regular workers one may reduce damage done viruses making regular backups data operating systems different media either kept unconnected system time hard drive read-only accessible reasons using different file systems way data lost virus one start using backup hopefully recent backup session optical media like cd dvd closed becomes read-only longer affected virus long virus infected file copied onto cd/dvd likewise operating system bootable cd used start computer installed operating systems become unusable backups removable media must carefully inspected restoration gammima virus example propagates via removable flash drives many websites run antivirus software companies provide free online virus scanning limited cleaning facilities purpose websites sell antivirus products services websites—like google subsidiary virustotal.com—allow users upload one suspicious files scanned checked one antivirus programs one operation additionally several capable antivirus software programs available free download internet usually restricted non-commercial use microsoft offers optional free antivirus utility called microsoft security essentials windows malicious software removal tool updated part regular windows update regime older optional anti-malware malware removal tool windows defender upgraded antivirus product windows 8 viruses disable system restore important windows tools task manager cmd example virus ciadoor many viruses removed rebooting computer entering windows safe mode networking using system tools microsoft safety scanner system restore windows windows xp windows vista windows 7 restore registry critical system files previous checkpoint often virus cause system hang freeze subsequent hard reboot render system restore point day corrupted restore points previous days work provided virus designed corrupt restore files exist previous restore points microsoft system file checker improved windows 7 later used check repair corrupted system files restoring earlier clean virus-free copy entire partition cloned disk disk image backup copy one solution—restoring earlier backup disk image relatively simple usually removes malware may faster disinfecting computer—or reinstalling reconfiguring operating system programs scratch described restoring user preferences reinstalling operating system another approach virus removal may possible recover copies essential user data booting live cd connecting hard drive another computer booting second computer operating system taking great care infect computer executing infected programs original drive original hard drive reformatted os programs installed original media system restored precautions must taken avoid reinfection restored executable files computer networks became widespread viruses spread removable media particularly floppy disks early days personal computer many users regularly exchanged information programs floppies viruses spread infecting programs stored disks others installed disk boot sector ensuring would run user booted computer disk usually inadvertently personal computers era would attempt boot first floppy one left drive floppy disks fell use successful infection strategy boot sector viruses common wild many years traditional computer viruses emerged 1980s driven spread personal computers resultant increase bulletin board system bbs modem use software sharing bulletin board–driven software sharing contributed directly spread trojan horse programs viruses written infect popularly traded software shareware bootleg software equally common vectors viruses bbss viruses increase chances spreading computers infecting files network file system file system accessed computers macro viruses become common since mid-1990s viruses written scripting languages microsoft programs microsoft word microsoft excel spread throughout microsoft office infecting documents spreadsheets since word excel also available mac os could also spread macintosh computers although viruses ability send infected email messages viruses take advantage microsoft outlook component object model com interface old versions microsoft word allow macros replicate additional blank lines two macro viruses simultaneously infect document combination two also self-replicating appear mating two would likely detected virus unique parents virus may also send web address link instant message contacts e.g. friends colleagues e-mail addresses stored infected machine recipient thinking link friend trusted source follows link website virus hosted site may able infect new computer continue propagating viruses spread using cross-site scripting first reported 2002 academically demonstrated 2005 multiple instances cross-site scripting viruses wild exploiting websites myspace samy worm yahoo
[ 2173, 3932, 7151, 6417, 6419, 6092, 1461, 21, 3281, 3282, 25, 2566, 5748, 7186, 2577, 404, 6823, 6119, 6831, 51, 7570, 1128, 768, 429, 3328, 4734, 74, 7597, 4017, 7600, 3680, 788, 3681, 3683, 4025, 7234, 96, 2632, 4759, 6515, 7616, 11...
Test
5,402
4
Infosec_Standard_5:infosec standard 5 hmg infosec standard 5 is5 data destruction standard used british government is5 part larger family security standards published cesg referred general infosec standard no.1 is5 similar dod 5220.22-m used usa is5 sets wide range requirements—not technical detail overwriting data also policies processes organisations place ensure media disposed securely is5 also touches risk management accreditation secure reuse disposal media important control organisations handling high-impact data sufficient sanitise media sanitisation also auditable records must kept is5 defines two different levels overwriting regardless level used verification needed ensure overwriting successful apart overwriting methods could used degaussing physical destruction media inexpensive media destruction replacement may cheaper sanitisation followed reuse ata secure erase approved different methods apply different media ranging paper cds mobile phones choice method affects reusability four different outcomes considered stricter requirements apply data stronger protective marking il cases media il4 confidential may handled secure site list x site
[ 7815 ]
Test
5,403
4
Take-back_system:take-back system take-back system one primary channels waste collection especially e-waste besides municipal sites take-back split take-back retailers usually free dependent upon purchase new product producer take-back systems may apply larger commercial equipment usually rely upgrade new product european example maltesian weee take back system
[]
Test
5,404
3
Slotket:slotket computer hardware terminology slotkets also known slockets short slot socket adapter adapters allow socket-based microprocessors used slot-based motherboards slotkets first created allow use socket 8 pentium pro processors slot 1 motherboards later became popular inserting socket 370 intel celerons slot 1 based motherboards lowered costs computer builders especially dual processor machines high-end motherboards accepting two slot 1 processors usually pentium 2 widely available double-socketed motherboards less expensive socket 370 celerons slotkets remained popular transition period slot socket-based pentium iii processors allowing cpu upgrades existing slot 1 motherboards slotkets never introduced take advantage amd athlon processors transition slot form factor socket form factor today slotkets largely disappeared neither intel amd currently manufacture cpus slot form factors
[ 5377, 7302, 866, 694, 2751, 2685 ]
Validation
5,405
3
ARM_Cortex-A9:arm cortex-a9 arm cortex-a9 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor providing 4 cache-coherent cores key features cortex-a9 core arm states tsmc 40g hard macro implementation typically operating 2 ghz single core excluding caches occupies less 1.5 mm designed tsmc 65 nanometer nm generic process clocked speeds 1 ghz consuming less 250 mw per core several system chip soc devices implement cortex-a9 core including
[ 4657, 5718, 6788, 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 4336, 5406, 1864, 6125, 67, 6148, 441, 446, 451, 6165, 463, 3690, 5472, 469, 4041, 3008, 3365, 6910, 5845, 6550, 7654, 3397, 1977, 2339, 1237, 2711, 1995, 550, 4847, 3786,...
Test
5,406
3
InfoTM:infotm infotm chinese technology company founded 2008 infotm microelectronics co. ltd
[ 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 3397, 1977, 2339, 1237, 2711, 1995, 550, 3786, 2024, 5576, 4879, 7376, 5585, 4166, 4537, 950, 4197,...
Test
5,407
9
Little_b_(programming_language):little b programming language little b domain-specific programming language specifically modeling language designed build modular mathematical models biological systems designed authored aneil mallavarapu little b developed virtual cell program harvard medical school headed mathematician jeremy gunawardena language based lisp meant allow modular programming model biological systems allow flexibility facilitate rapid change required accurately capture complex biological systems language draws techniques artificial intelligence symbolic mathematics provides syntactic conveniences derived object-oriented languages language originally denoted lowercase b distinguishing b predecessor widely used c programming language name eventually changed little b avoid confusion pay homage smalltalk first object-oriented programming language
[ 6507, 4543, 8137, 4759, 578, 1435 ]
Test
5,408
7
Apache_ZooKeeper:apache zookeeper apache zookeeper software project apache software foundation essentially service distributed systems offering hierarchical key-value store used provide distributed configuration service synchronization service naming registry large distributed systems zookeeper sub-project hadoop top-level apache project right zookeeper architecture supports high availability redundant services clients thus ask another zookeeper leader first fails answer zookeeper nodes store data hierarchical name space much like file system tree data structure clients read write nodes way shared configuration service zookeeper viewed atomic broadcast system updates totally ordered zookeeper atomic broadcast zab protocol core system zookeeper used companies including yelp rackspace yahoo odnoklassniki reddit netapp solidfire facebook twitter ebay well open source enterprise search systems like solr zookeeper originally developed yahoo streamlining processes running big-data clusters storing status local log files zookeeper servers servers communicate client machines provide information zookeeper developed order fix bugs occurred deploying distributed big-data applications prime features apache zookeeper common terminologies regarding zookeeper architecture services cluster replicated stored set servers called ensemble maintains in-memory database containing entire data tree state well transaction log snapshots stored persistently multiple client applications connect server client maintains tcp connection sends requests heartbeats receives responses watch events monitoring addition client libraries included zookeeper distribution number third-party libraries apache curator kazoo available make using zookeeper easier add additional functionality additional programming languages etc etc
[ 4303, 5728, 6092, 7896, 6821, 5054, 5075, 6137, 1511, 4742, 2619, 7238, 840, 3031, 5863, 5874, 2700, 2359, 3077, 894, 7347, 2741, 917, 5571, 3463, 1286, 5239, 3479, 2776, 6319, 1333, 631, 7805, 7444, 3542, 3204, 7459, 3879, 1392, 3558, ...
Test
5,409
8
Service-oriented_architecture_implementation_framework:service-oriented architecture implementation framework service-oriented architectures soa based notion software services high-level software components include web services implementation soa requires tools well run-time infrastructure software collectively referred service-oriented architecture implementation framework soaif soaif envisions comprehensive framework provides technology enterprise might need build run soa soaif includes design-time run-time capabilities well software functionality enterprise needs build operate soa including service-oriented vendors race provide possible solutions three different approaches emerging integrating disparate heterogeneous information systems enterprise implementation frameworks meet requirements loosely coupled coarse grained asynchronous services packaged enterprise applications perform well streamlining processes related standard tasks however performance rapidly deteriorates automating streamlining customized processes encompass multiple enterprise applications process difficult time-consuming expensive implement maintain soaif infrastructure addresses issue allowing definition process network topology spanning multiple enterprise boundaries accomplished via peer-to-peer messaging infrastructure distributed security mechanisms allow efficient data exchanges easy implementation enabling enterprise enforce security policies allows soaif increase operational efficiency across entire value chain soa works standard protocols existing packaged application integration solutions complex require significant implementation effort often including extensive manual coding deployment purposes soaif provides native support run time deployment services across network dramatically reduces overall costs application integration deployment automating time-consuming processes also allows extension integration across business boundaries traditional software development process translating requirements working distributed systems time-consuming difficult requiring several stages manual development deployment complex error-prone task effectively streamlined using higher-level component-based soaif soaif incorporates tools let processes developed using standards business process execution language bpel easily translated distributed high-level services easier develop manipulate debug services easily composed implementation-level data flows without user developer track complex middleware concepts topics queues implementation-level services run machine across network virtue built-in dynamic deployment support soaif provides combination service-oriented tools built-in support distributed debugging run-time tracing logging dynamic deployment allows soaif dramatically reduce time taken implement deliver working processes soaif general-purpose infrastructure platform lets developers business analysts create deploy manage change processes within across enterprise soaifs unique requirements tools infrastructure levels typically provided single current technology platform include addressing requirements soaif lets users quickly respond changes integrate operations efficiently regardless platform language database application enterprise processes usually distributed across multiple applications hardware/software systems processes also event-based sense subprocesses linked series events example depletion inventory manufacturer may lead event-trigger automatically generated propagated one suppliers replenish depleted inventory items current bpm solutions control processes centralized hub changes applications additions new applications require modifications centralized hub data exchanged applications needs traverse central hub type topology restriction inefficient inflexible leads bottlenecks overcome limitation framework tries integrate enterprise processes needs fully distributed across network within enterprise framework must also symmetric implies event-based infrastructure software tools need run machines within enterprise support data exchange messaging existing enterprise standards becomes essential soaif since content needs exchanged partners xml messages documents desired format since businesses want leverage existing infrastructures soaif needs easily support multiple standards soaif able offer high degree reliability platform support broad range processes span increasing number applications corporations partners eliminate single points failure maximize performance fully distributed architecture becomes essential soaif needs fully distributed maximum performance scalability distributed computing environment becomes necessary restrict scope interactions partners conduct corporate infrastructure becomes necessary allow customization interactions partner providing different security roles per-user per-service basis requires security model incorporates users web services general enterprise services ’ fully distributed fault-tolerant soaif infrastructure security model needs based existing standards tools support certificate authentication user services level soaif needs provide single dashboard visibility organization ’ entire distributed computing environment platform incorporate visual implementation-process-composition tools together infrastructure-level support instantly deploy modeled implementation-level processes across distributed enterprise network visual composition tools need service-oriented sense able directly manipulate higher-level coarse-grained implementation processes first-class objects also provide visual display programming constructs able map directly naturally deployable processes critical problem deploying distributed systems monitoring debugging concurrently running processes soaif provide native support tracing logging monitoring process service across distributed environment another challenge responding changing requirements soaif provide support incremental on-the-fly modification service-based flows implement processes among critical features expected soaif since lets analysts visually change instantly redeploy processes address dynamic requirements changes implemented within soaif abstracting concepts relating lower-level middleware tools applications levels users simply specify service replaced another running service often another machine soaif dynamically reroutes data new service setting new underlying middleware constructs topics queues example on-the-fly allows implementation changed without stopping current process much way hardware upgraded mainframe system without interruption operations essential elements soaif include design-time run-time infrastructure together service-oriented tools deploying distributed processes implementation flows core infrastructure soaif typically provided enterprise service bus esb addresses challenges composing deploying managing distributed service-based enterprise applications esb incorporates standards-based enterprise-class messaging backbone together enhanced systems connectivity using web services java ee .net framework standards one approach contributes optimal soa implementation use enterprise service bus esb provide infrastructural element distributed services network esb approach integration considers systems discrete distributed services connect via asynchronous message-oriented communications infrastructure message-oriented infrastructure allows loosely coupled document-oriented exchanges independent systems esbs provides critical infrastructure components simplify scale integration approaches esbs however provide required integration meet high-level business requirements esbs also provide guarantees loose coupling coarse granularity meet evolving service-oriented needs implementing esbs meet soa requirements require addition extra functionality compose fine-grained atomic services coarse-grained business services provide policy-driven managed secure service interactions esb links individual enterprises together extended process efficiency across supply chain allowing become flexible adaptable rapidly changing requirements esb lets enterprise leverage previous investments supporting deployment processes existing software hardware infrastructure core underlying infrastructure soaif esbs offer several unique business technical advantages business process management bpm considers systems assets activities tasks participate well-coordinated centrally orchestrated business processes traditionally challenge bpm possible construct processes achieve integration goals enterprises typically use bpm tools design time modeling processes used processes rarely processes actually environment bpm solutions craft orchestrated processes composed fine-grained services ’ contain runtime environment necessary loosely coupled asynchronous service interactions least bpm solution must used conjunction loosely coupled integration approach make business processes runtime activities coordinate integration thus bpm solutions sufficient meet soa requirements service-oriented integration soi approach uses architectural guiding principles services orientation construct ecosystem services business users dynamically combine compose higher-level processes meet continuously evolving changing business requirements soi approaches transcend brittle tightly coupled eai business-to-business integration approaches mandating separation consumer service producer service thus enforcing critical aspect loose coupling required allow integration scenario evolve automatically meet business requirements soi provides guidance build right services meet current business requirements provide means execute services effective scalable manner guarantee long-running interactions esbs implement standardized interfaces communication connectivity transformation security portability supported standards include modern esb implementations typically support development multiple languages combined inherently portable esb infrastructure makes esb true multi-language multiplatform enterprise backbone ideal foundation soaif several modern esbs implement symmetric distributed architecture peer-messaging servers run multiple nodes enterprise network providing highly scalable reliable distributed messaging platform single point failure modern esb architectures combine benefits centralized control distributed parallel data flow giving application developers ultimate flexibility defining network topology choice route data directly optimally services ensuring data flowing services always traverse central point network optimizes peer-to-peer network performance instance one process requires data exchanges new york boston well san francisco los angeles two flows data ’ necessarily traverse messaging hub located chicago often case enterprise cross-enterprise deployments instead efficiency dictates setting direct data flow connections peer nodes network service-oriented tools enable composition distributed applications one services web services general enterprise services typically runs separate process services may written language communicate via xml messages allows service-oriented tools within soaif compose flexible easy-to-modify systems service-oriented processes deployed soaif composed coarse-grained web services ideally suited easy change replacement abstracting details message routing service implementations service-oriented tools decouple enable running processes modified on-the-fly simple service replacement addition tools framework within soaif supports run-time deployment services allowing changed processes deployed instantly across network experience significantly reduces solution deployment costs compared traditional broker-based solutions esb defines comprehensive security system giving administrators full control services executed esbs provide ability set several security attributes service provide administrative tools configure security settings distributed esb infrastructure across network esbs include native service-level support run-time monitoring tracing logging services monitored instantly using visual tools within soaif trace levels dynamically changed within existing services running across network debug logs routed software tools node features greatly simplify development deployment debugging distributed applications running across soaif
[ 1760, 6461, 6748, 2530, 2420, 5447 ]
Test
5,410
2
Security_Account_Manager:security account manager security account manager sam often security accounts manager database file windows xp windows vista windows 7 8.1 10 stores users passwords used authenticate local remote users beginning windows 2000 sp4 active directory authenticates remote users sam uses cryptographic measures prevent unauthenticated users accessing system user passwords stored hashed format registry hive either lm hash ntlm hash file found codice_1 mounted codice_2 attempt improve security sam database offline software cracking microsoft introduced syskey function windows nt 4.0 syskey enabled on-disk copy sam file partially encrypted password hash values local accounts stored sam encrypted key usually also referred syskey enabled running codice_3 program since hash function one-way provides measure security storage passwords case online attacks possible simply copy sam file another location sam file moved copied windows running since windows kernel obtains keeps exclusive filesystem lock sam file release lock operating system shut blue screen death exception thrown however in-memory copy contents sam dumped using various techniques including pwdump making password hashes available offline brute-force attack lm hash compromised protocol replaced ntlm hash versions windows configured disable creation storage valid lm hashes user changes password windows vista later versions windows disable lm hash default note enabling setting immediately clear lm hash values sam rather enables additional check password change operations instead store dummy value location sam database lm hash otherwise stored dummy value relationship user password value used user accounts windows nt 3.51 nt 4.0 2000 attack devised bypass local authentication system sam file deleted hard drive e.g mounting windows os volume alternate operating system attacker could log account password flaw corrected windows xp shows error message shuts computer however exist software utilities aforementioned methodology using either emulated virtual drive boot disk usually unix/linux another copy windows like windows preinstallation environment based environment mount local drive housing active ntfs partition using programmed software routines function calls within assigned memory stacks isolate sam file windows nt system installation directory structure default codice_1 depending particular software utility used removes password hashes stored user accounts entirety cases modify user account passwords directly environment software highly pragmatic beneficial use password clearing account recovering utility individuals lost forgotten windows account passwords well possible use malicious software security bypassing utility essentially granting user enough ability experience familiarity cracking utility software security routines windows nt kernel well offline immediate local access target computer capability entirely bypass remove windows account passwords potential target computer recently microsoft released utility called locksmith part msdart msdart freely available end-users however
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 1156, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Test
5,411
5
NISO_Circulation_Interchange_Protocol:niso circulation interchange protocol niso circulation interchange protocol ncip protocol limited exchange messages among computer-based applications enable perform functions necessary lend borrow items provide controlled access electronic resources facilitate cooperative management functions released may 2001 approved october 17 2002 ansi/niso z39.83-2002 ncip niso draft standard trial use protocol defines repertoire messages associated rules syntax semantics use applications perform functions necessary lend items provide controlled access electronic resources facilitate co-operative management functions intended address conditions application applications initiate lending items control access must acquire transmit information user items and/or access essential successful conclusion function
[]
Validation
5,412
4
Keith_B._Alexander:keith b. alexander keith brian alexander born december 2 1951 retired four-star general united states army served director national security agency dirnsa chief central security service chcss commander united states cyber command previously served deputy chief staff g-2 united states army 2003 2005 assumed positions director national security agency chief central security service august 1 2005 additional duties commander united states cyber command may 21 2010 alexander announced retirement october 16 2013 retirement date march 28 2014 may 2014 alexander founded ironnet cybersecurity private-sector cybersecurity firm based fulton maryland alexander born december 2 1951 syracuse new york son charlotte l. colvin donald henry alexander raised onondaga hill new york suburb syracuse paperboy post-standard attended westhill senior high school ran track alexander attended united states military academy west point class three future four-star generals david petraeus martin dempsey walter l. sharp graduation april 1974 alexander married deborah lynn douglas classmate high school grew near family onondaga hill four daughters alexander entered active duty west point intending serve five years alexander military education includes armor officer basic course military intelligence officer advanced course united states army command general staff college national war college alexander worked signals intelligence number secret national security agency bases united states germany earned master science business administration 1978 boston university master science systems technology electronic warfare master science physics 1983 naval postgraduate school master science national security strategy national defense university rose quickly military ranks due expertise advanced technology competency administration alexander assignments include deputy chief staff dcs g-2 headquarters department army washington d.c. 2003 2005 commanding general united states army intelligence security command fort belvoir virginia 2001 2003 director intelligence j-2 united states central command macdill air force base florida 1998 2001 deputy director intelligence j-2 joint chiefs staff 1997 1998 alexander served variety command assignments germany united states include tours commander border field office 511th mi battalion 66th mi group 336th army security agency company 525th mi group 204th mi battalion 525th military intelligence brigade additionally alexander held key staff assignments deputy director operations officer executive officer 522nd mi battalion 2nd armored division g-2 1st armored division germany gulf war operation desert shield operation desert storm saudi arabia also served afghanistan peace keeping mission army deputy chief staff intelligence alexander headed army intelligence security command 2001 charge 10,700 spies eavesdroppers worldwide words james bamford wrote biography wired alexander rest american intelligence community suffered devastating defeat surprised attacks 9/11 alexander reaction order intercept operators begin monitor email phone calls american citizens unrelated terrorist threats including personal calls journalists 2003 alexander named deputy chief staff intelligence united states army 205th mi brigade involved abu ghraib torture prisoner abuse baghdad iraq part v corps us alexander command testifying senate armed services committee alexander called abuse totally reprehensible described perpetrators group undisciplined mp soldiers mary louise kelly interviewed later npr said outside chain command oversaw interrogations iraq alexander able survive reputation intact 2004 along alberto gonzales others george w. bush administration alexander presented memorandum sought justify treatment deemed unlawful enemy combatants june 2013 national security agency revealed whistle-blower edward snowden secretly spying american people fisa-approved surveillance programs prism xkeyscore october 16 2013 publicly announced alexander deputy chris inglis leaving nsa april 13 2016 president obama announced alexander member commission enhancing national cybersecurity alexander became three-star general 2005 donald rumsfeld secretary defense named director national security agency according bamford alexander deceived house intelligence committee agency involved nsa warrantless wiretapping also period alexander oversaw implementation real time regional gateway iraq nsa data collection program consisted gathering electronic communication storing searching otherwise analyzing former senior u.s. intelligence agent described alexander program rather look single needle haystack approach 'let collect whole haystack collect tag store ... whatever want go searching 2008 regional gateway effective providing information iraqi insurgents eluded less comprehensive techniques collect strategy introduced keith alexander believed glenn greenwald guardian model comprehensive world-wide mass archiving communications nsa become engaged 2013 according siobhan gorman wall street journal government official stated alexander offered resign 2013 global surveillance disclosures first broke june 2013 obama administration asked alexander confirmed united states senate appointment rank general may 7 2010 officially promoted rank ceremony may 21 2010 alexander assumed command united states cyber command ceremony made four-star general alexander delivered keynote address black hat usa july 2013 organizers describe alexander advocate battlefield visualization 'data fusion useful intelligence provided quote alexander gave comprehensive interview career spanned 17,000 words 8 may 2014 australian financial review journalist christopher joye subsequently cited edward snowden full transcript covers nsa operations snowden metadata debates encryption controversies chinese russian spying published online snowden alexander told joye suspect russian intelligence driving understand well 're going let things benefit russia stand help improve snowden credibility wired magazine said afr interview alexander showed defending stock-piling zero-days wall street journal media focused alexander claims snowden working russian intelligence july 2012 response question jeff moss founder def con hacker convention ... nsa really keep file everyone alexander replied n't absolutely anybody would tell 're keeping files dossiers american people knows true march 2012 response questions representative hank johnson united states congress hearing allegations made former nsa officials nsa engages collection voice digital information u.s. citizens alexander said despite allegations james bashford wired magazine nsa collect data july 9 2012 asked member press large data center utah used store data american citizens alexander stated ca n't go details utah data center n't hold data u.s citizens def con 2012 alexander keynote speaker question answers session response question nsa really keep file everyone see mine alexander replied job foreign intelligence would want weave story millions hundreds millions dossiers people absolutely false ... perspective absolute nonsense june 6 2013 day snowden revelations then-director national intelligence james clapper released statement admitting nsa collects telephony metadata millions americans telephone calls metadata information included originating terminating telephone number telephone calling card number imei number time duration phone calls andy greenberg forbes said nsa officials including alexander years 2012 2013 publicly denied—often carefully hedged words—participating kind snooping americans since become nearly undeniable september 2013 alexander asked senator mark udall goal nsa collect phone records americans alexander replied alexander announced retirement october 16 2013 retirement date march 28 2014 replacement u.s. navy vice admiral michael s. rogers may 2014 retirement nsa alexander founded ironnet cybersecurity ironnet provides cybersecurity coverage private-sector companies using irondefense program team cybersecurity analysts experts company headquartered fulton maryland offices frederick maryland mclean virginia new york city october 2015 ironnet received 32.5 million funding trident capital cybersecurity forgepoint capital kleiner perkins caufield byers series investment may 2018 ironnet raised additional 78 million round led c5 capital alongside existing investors forgepoint capital kleiner perkins caufield byers alexander maintains role ceo ironnet today alexander inducted nps hall fame 2013 fall 2014 alexander told public forum someone else claimed 9,000 irs refund name thieves used identity apply 20 credit cards
[ 4210, 1344, 803, 6419, 820, 6627, 1278, 919, 7646, 3716, 7191, 4429, 7917, 3393, 5767, 5509, 6756, 4988, 1594, 2343, 4996, 1701, 4201, 1805 ]
Test
5,413
2
Win32_Thread_Information_Block:win32 thread information block computing win32 thread information block tib data structure win32 x86 stores information currently running thread structure also known thread environment block teb tib officially undocumented windows 9x windows nt series ddk includes struct nt_tib winnt.h documents subsystem independent part wine includes header declarations extended subsystem-specific part tib yet many win32 programs use undocumented fields effectively part api first field particular directly referenced code produced microsoft compiler tib used get lot information process without calling win32 api examples include emulating getlasterror getversion pointer peb one obtain access import tables iat process startup arguments image name etc accessed fs segment register operating 32 bits gs 64 bits fs 32-bit gs 64-bit maps tib embedded data block known tdb thread data base tib contains thread-specific exception handling chain pointer tls thread local storage thread local storage c local storage tib current thread accessed offset segment register fs x86 gs x64 common access tib fields offset fs 0 rather first getting linear self-referencing pointer stored fs 0x18 pointer used pointer arithmetics cast struct pointer example c inlined-assembly 32-bit x86
[ 1128, 2290, 352, 4810, 2827, 3635 ]
Test
5,414
5
Bitflu:bitflu bitflu open-source bittorrent client adrian ulrich available unix-like systems written perl bitflu received good reviews open-source software sites blogs praising lightweight feature-complete even bitflu seems largely unknown reportedly commanding 0.000025 total bittorrent traffic according one reviewer could due non-automated relatively elaborated install procedure could putting majority users ca n't anything complicated click-next-until-finish install
[ 2984, 5983, 3172, 7714, 7343, 2390, 7637, 5571, 2664, 499, 2681, 3573, 2430, 2696, 5531, 4014 ]
Validation
5,415
4
Polyinstantiation:polyinstantiation polyinstantiation computer science concept type class database row otherwise instantiated multiple independent instances objects copies may also indicate case database polyinstantiation two different instances name identifier primary key operating system security polyinstantiation concept creating user process specific view shared resource i.e process affect process b writing malicious code shared resource unix directory /tmp polyinstantiation shared resources similar goals process isolation application virtual memory processes assigned isolated virtual address space prevent process writing memory space process b databases polyinstantiation database-related sql structured query language terminology allows relation contain multiple rows primary key multiple instances distinguished security levels occurs mandatory policy depending security level established one record contains sensitive information one user see record information depending his/her level confidentiality previously dictated company policy consider following table primary key name λ x security level although useful security standpoint polyinstantiation raises several problems cryptography polyinstantiation existence cryptographic key one secure physical location
[ 4254, 2886, 5571, 8066, 2054 ]
Test
5,416
4
Anti-Spam_SMTP_Proxy:anti-spam smtp proxy anti-spam smtp proxy assp open-source perl based platform-independent transparent smtp proxy server assp features
[ 3683, 5983, 7624, 5733, 6102, 1277, 3106, 5571, 3017, 3031, 7470, 8122, 5248, 8029, 1598, 4734, 3915, 6233, 2713 ]
Test
5,417
5
MMS_Architecture:mms architecture mms architecture set standards used multimedia messaging service mobile networks standards prepared 3gpp standard consists number interfaces components found mobile network mm1 interface mobile station ms mmsc mm1 used following actions mm1 interface based wap protocol includes pap notifications transformed sms wap gateway notifications mm2 interface mms relay mms-r mms storage database two components mmsc platform mm3 interface mmsc external servers email server sms centers smsc interface typically uses tcp/ip based protocols e.g simple mail transfer protocol smtp generally responsibility mmsc transformation mms multi-part binary data mime format email direction mm3 used following actions mm4 interface used exchange messages two different mmscs mmscs generally located two distinct mobile networks interface also known mms interface wireless application protocol wap open mobile alliance oma standards mm5 interface mmsc network elements like hlr domain name server communication mm5 interface generally fetch routing information mm5 defined 3gpp ts 23.140 simple reference mobile application part mm7 interface mmsc value-added service provider vasp mm7 interface used send mms 3rd party providers e.g. bank sending statement advertiser sending publicity based soap attachments using http transport protocol http request shall post message mime encapsulates soap envelope encoded attachments soap envelope xml tags mm7 protocol data mm11 specified oma sti standard transcoding interface 1.0 mm11 designed ensure compatibility transcoders mmscs integration transcoder without using mm11 possible implementing transcoder proxy server placing transcoder mm1 interface user equipment mmsc messages transparently transcoded possible disadvantage implementation transcoders typically licensed transactions per second transactions sent transcoder rather marked allow adaptations
[ 3982, 4101, 7315 ]
Train
5,418
9
David_H._Munro:david h. munro david herbert munro born april 29 1955 oakland california physicist lawrence livermore national laboratory llnl created programming language yorick well scientific graphics library gist munro earned b.s caltech 1976 ph.d. massachusetts institute technology 1980 joined llnl 1980 primarily focused research laser fusion received excellence plasma physics award american physical society 1995
[ 1494 ]
Validation
5,419
1
Column-oriented_DBMS:column-oriented dbms column-oriented dbms columnar database management system database management system dbms stores data tables column rather row practical use column store versus row store differs little relational dbms world columnar row databases use traditional database query languages like sql load data perform queries row columnar databases become backbone system serve data common extract transform load etl data visualization tools however storing data columns rather rows database precisely access data needs answer query rather scanning discarding unwanted data rows query performance increased certain workloads relational database management system provides data represents two-dimensional table columns rows example database might table simple table includes employee identifier empid name fields lastname firstname salary salary two-dimensional format abstraction actual implementation storage hardware requires data serialized one form another expensive operations involving hard disks seeks order improve overall performance related data stored fashion minimize number seeks known locality reference basic concept appears number different contexts hard disks organized series blocks fixed size typically enough store several rows table organizing table data rows fit within blocks grouping related rows onto sequential blocks number blocks need read sought minimized many cases along number seeks survey pinnecke et al covers techniques column-/row hybridization 2017 common method storing table serialize row data like data inserted table assigned internal id codice_1 used internally system refer data case records sequential codice_1s independent user-assigned codice_3 example dbms uses short integers store codice_1s practice larger numbers 64-bit 128-bit normally used row-based systems designed efficiently return data entire row record operations possible matches common use-case system attempting retrieve information particular object say contact information user rolodex system product information online shopping system storing record data single block disk along related records system quickly retrieve records minimum disk operations row-based systems efficient performing set-wide operations whole table opposed small number specific records instance order find records example table salaries 40,000 50,000 dbms would fully scan entire table looking matching records example table shown likely fit single disk block table even hundred rows would multiple disk operations would needed retrieve data examine improve performance sorts operations common generally point using dbms dbmss support use database indexes store values set columns along codice_1 pointers back original table index salary column would look something like store single pieces data rather entire rows indexes generally much smaller main table stores scanning smaller set data reduces number disk operations index heavily used dramatically reduce time common operations however maintaining indexes adds overhead system especially new data written database records need stored main table attached indexes updated well main reason indexes dramatically improve performance large datasets database indexes one columns typically sorted value makes range queries operations like find records salaries 40,000 50,000 example fast lower time-complexity number row-oriented databases designed fit entirely ram in-memory database systems depend disk operations equal-time access entire dataset reduces need indexes requires amount operations fully scan original data complete index typical aggregation purposes systems may therefore simpler smaller manage databases fit memory column-oriented database serializes values column together values next column example table data would stored fashion layout one columns closely matches structure index row-based system may cause confusion lead mistaken belief column-oriented store really row-store index every column however mapping data differs dramatically row-oriented indexed system primary key rowid mapped indexed data column-oriented system primary key data mapped rowids may seem subtle difference seen common modification store whether column-oriented system efficient operation depends heavily workload automated operations retrieve data given object entire row slower row-based system retrieve row single disk read whereas numerous disk operations collect data multiple columns required columnar database however whole-row operations generally rare majority cases limited subset data retrieved rolodex application instance collecting first last names many rows build list contacts far common reading data single address even true writing data database especially data tends sparse many optional columns reason column stores demonstrated excellent real-world performance spite many theoretical disadvantages partitioning indexing caching views olap cubes transactional systems write-ahead logging multiversion concurrency control dramatically affect physical organization either system said online transaction processing oltp -focused rdbms systems row-oriented online analytical processing olap -focused systems balance row-oriented column-oriented comparisons row-oriented column-oriented databases typically concerned efficiency hard-disk access given workload seek time incredibly long compared bottlenecks computers example typical serial ata sata hard drive average seek time 16 22 milliseconds dram access intel core i7 processor takes average 60 nanoseconds nearly 400,000 times fast clearly disk access major bottleneck handling big data columnar databases boost performance reducing amount data needs read disk efficiently compressing similar columnar data reading data necessary answer query practice columnar databases well-suited olap-like workloads e.g. data warehouses typically involve highly complex queries data possibly petabytes however work must done write data columnar database transactions inserts must separated columns compressed stored making less suited oltp workloads row-oriented databases well-suited oltp-like workloads heavily loaded interactive transactions example retrieving data single row efficient data located single location minimizing disk seeks row-oriented architectures however column-oriented systems developed hybrids capable oltp olap operations oltp constraints column-oriented systems face mediated using amongst qualities in-memory data storage column-oriented systems suitable olap oltp roles effectively reduce total data footprint removing need separate systems column data uniform type therefore opportunities storage size optimizations available column-oriented data available row-oriented data example many popular modern compression schemes lzw run-length encoding make use similarity adjacent data compress missing values repeated values common clinical data represented two-bit marker techniques may used row-oriented data typical implementation achieve less effective results improve compression sorting rows also help example using bitmap indexes sorting improve compression order magnitude maximize compression benefits lexicographical order respect run-length encoding best use low-cardinality columns first sort keys example given table columns sex age name would best sort first value sex cardinality two age cardinality 150 name columnar compression achieves reduction disk space expense efficiency retrieval greater adjacent compression achieved difficult random-access may become data might need uncompressed read therefore column-oriented architectures sometimes enriched additional mechanisms aimed minimizing need access compressed data column stores transposed files implemented early days dbms development taxir first application column-oriented database storage system focus information-retrieval biology 1969 clinical data patient records many attributes could analyzed processed 1975 time-oriented database system tods statistics canada implemented rapid system 1976 used processing retrieval canadian census population housing well several statistical applications rapid shared statistical organizations throughout world used widely 1980s continued used statistics canada 1990s another column-oriented database scss later column-oriented database packages included since 2004 additional open source commercial implementations monetdb released open-source license september 30 2004 followed closely defunct c-store c-store university project eventually team member michael stonebraker staying led vertica co-founded 2005 monetdb-related x100 project evolved vectorwise druid column-oriented data store open-sourced late 2012 used numerous organizations
[ 3928, 1449, 3951, 5375, 3621, 7184, 2937, 6462, 7205, 5778, 7213, 1891, 1511, 784, 2265, 1905, 7248, 811, 4048, 3011, 3371, 6543, 7999, 3391, 7303, 4457, 2350, 4463, 8058, 7334, 4481, 5209, 3776, 4163, 3807, 4526, 2054, 7757, 1730, 7805, ...
Test
5,420
9
Pure_Data:pure data pure data pd visual programming language developed miller puckette 1990s creating interactive computer music multimedia works puckette main author program pd open-source project large developer base working new extensions released license similar bsd license runs gnu/linux ios android windows ports exist freebsd irix pd similar scope design puckette original max program developed ircam degree interoperable max/msp commercial predecessor max language may collectively discussed members patcher family languages addition graphics environment multimedia gem external externals designed work like pure data packet pidip linux framestein windows gridflow n-dimensional matrix processing linux windows possible create manipulate video opengl graphics images etc. realtime extensive possibilities interactivity audio external sensors etc pd natively designed enable live collaboration across networks internet allowing musicians connected via lan even disparate parts globe create music together real time pd uses fudi networking protocol pure data max examples dataflow programming languages languages functions objects linked patched together graphical environment models flow control audio unlike original version max however pd always designed control-rate audio processing host central processing unit cpu rather offloading sound synthesis signal processing digital signal processor dsp board ariel ispw used max/fts pd code forms basis david zicarelli msp extensions max language software audio processing like max pd modular code base externals objects used building blocks programs written software makes program arbitrarily extensible public api encourages developers add control audio routines c programming language help externals python scheme lua tcl many others however pd also programming language modular reusable units code written natively pd called patches abstractions used standalone programs freely shared among pd user community programming skill required use pd effectively like max pd dataflow programming language dsp software two primary rates data passed sample audio rate usually 44,100 samples per second control rate 1 block per 64 samples control messages audio signals generally flow top screen bottom objects connected via inlets outlets pd supports four basic types text entities messages objects atoms comments atoms basic unit data pd consist either float symbol pointer data structure pd numbers stored 32-bit floats messages composed one atoms provide instructions objects special type message null content called bang used initiate events push data flow much like pushing button pd native objects range basic mathematical logical bitwise operators found every programming language general specialized audio-rate dsp functions designated tilde symbol wavetable oscillators fast fourier transform fft~ range standard filters data loaded file read audio board midi via open sound control osc firewire usb network connection generated fly stored tables read back used audio signals control data one key innovations pd predecessors introduction graphical data structures used large variety ways composing musical scores sequencing events creating visuals accompany pd patches even extending pd gui living pd name data structures enable pd users create arbitrarily complex static well dynamic animated graphical representations musical data much like c structs pd structs composed combination floats symbols array data used parameters describe visual appearance data structure conversely control messages audio signals pd patch puckette words though powerful language pd certain limitations implementation object-oriented concepts example difficult create massively parallel processes instantiating manipulating large lists objects spawning etc impossible due lack constructor function pd arrays entities susceptible namespace collisions passing patch instance id extra step sometimes difficult accomplish pure data used basis number projects prototyping language sound engine table interface called reactable abandoned iphone app rjdj embed pd sound engine pd used prototyping audio video games number audio designers example eapd internal version pd used electronic arts ea also embedded ea spore pd also used networked performance networked resources collaborative improvisation nrci library
[ 6507, 1908, 6245, 5282, 4853, 3368, 3534, 5571, 486, 578, 3120, 2764, 2592, 4981, 7032, 6489, 5965, 1890, 3915, 5260, 1237, 6408, 1435, 5266 ]
Test
5,421
3
TI-89_series:ti-89 series ti-89 ti-89 titanium graphing calculators developed texas instruments ti differentiated ti graphing calculators computer algebra system allows symbolic manipulation algebraic expressions—equations solved terms variables whereas ti-83/84 series give numeric result ti-89 graphing calculator developed texas instruments 1998 unit features 160×100 pixel resolution lcd screen large amount flash memory includes ti advanced mathematics software ti-89 one highest model lines ti calculator products along ti-nspire summer 2004 standard ti-89 replaced ti-89 titanium ti-89 runs 16-bit microprocessor motorola 68000 nominally runs 10 12 mhz depending calculator hardware version texas instruments allocated 256 total kb ram unit 190 kb available user 2 mb flash memory 700 kb available user ram flash rom used store expressions variables programs tables text files lists ti-89 essentially ti-92 plus limited keyboard smaller screen created partially response fact calculators allowed many standardized tests ti-92 considered computer due qwerty layout keyboard additionally people found ti-92 unwieldy overly large ti-89 significantly smaller—about size graphing calculators flash rom feature present ti-92 plus original ti-92 major advantage ti-89 lower-model ti calculators built-in computer algebra system cas calculator evaluate simplify algebraic expressions symbolically example entering codice_1 returns formula_1 answer prettyprinted default displayed would written hand e.g aforementioned formula_1 rather codice_1 ti-89 abilities include addition standard two-dimensional function plots also produce graphs parametric equations polar equations sequence plots differential equation fields three-dimensional two independent variable functions ti-89 directly programmable language called ti-basic ti derivative basic calculators use pc also possible develop complex programs motorola 68000 assembly language c translate machine language copy calculator two software development kits c programming available one ti flash studio official ti sdk tigcc third-party sdk based gcc since ti-89 release 1998 thousands programs math science entertainment developed many available games generic clones tetris minesweeper classic games programs advanced example zx spectrum emulator chess-playing program symbolic circuit simulator clone link awakening one popular well-known games phoenix many calculator games useful programs found ti-program sharing sites ticalc.org major one offers thousands calculator programs four hardware versions ti-89 versions normally referred hw1 hw2 hw3 hw4 released may 2006 entering key sequence f1 displays hardware version older os versions 2.00 n't display anything hardware version unless calculator hw2 later differences hardware versions well documented texas instruments hw1 hw2 correspond original ti-89 hw3 hw4 present ti-89 titanium significant difference hw1 hw2 way calculator handles display hw1 calculators video buffer stores information displayed screen every time screen refreshed calculator accesses buffer flushes display direct memory access hw2 later calculators region memory directly aliased display controller memory-mapped i/o allows slightly faster memory access hw1 dma controller used 10 bus bandwidth however interferes trick programs use implement grayscale graphics rapidly switching two displays page-flipping hw1 dma controller base address changed single write memory-mapped hardware register screen automatically use new section memory beginning next frame hw2 new page must written screen software effect cause increased flickering grayscale mode enough make 7-level grayscale supported hw1 unusable although 4-level grayscale works calculators hw2 calculators slightly faster ti increased nominal speed processor 10 mhz 12 mhz believed ti increased speed hw4 calculators 16 mhz though many users disagree finding another difference hw1 hw2 calculators assembly program size limitations size limitation hw2 calculators varied ams version calculator ams 2.09 limit 24k earlier versions limited assembly programs 8k earliest ams versions limit hw1 calculators hardware enforce limits easy bypass software unofficial patches kernels installed hw2 calculators remove limitations ti-89 titanium released summer 2004 largely replaced popular classic ti-89 ti-89 titanium referred hw3 uses corresponding ams 3.x 2006 new calculators upgraded hw4 supposed offer increases ram speeds 16 mhz benchmarks made users reported speeds 12.85–14.1 mhz touted advantages ti-89 titanium original ti-89 include two times flash memory three times much available user ti-89 titanium essentially voyage 200 except n't integrated keyboard ti-89 titanium also usb on-the-go port connectivity ti-89 titanium calculators computer store programs update operating system ti-89 titanium also features pre-loaded applications cellsheet spreadsheet program also offered ti calculators titanium slightly updated cas adds mathematical functions notably implicit differentiation titanium also slightly differing case design ti-89 titanium case design similar ti-84 plus minor compatibility issues c assembly programs developed original ti-89 recompiled work titanium due various small hardware changes though cases problems fixed using utility ghostbuster olivier armand kevin kofler option generally preferred requires knowledge program works without need program source code automated n't require additional computer software cases one character needs changed rom base ti-89 0x200000 whereas ti-89 titanium 0x800000 hand patcher problems caused mirror memory ghost space lack thereof joint council qualifications publish examination instructions behalf main examination boards england wales northern ireland instructions state calculator used examination must designed offer symbolic algebra manipulation symbolic differentiation integration precludes use ti-89 ti-89 titanium examinations may used part classroom study sqa give instructions examinations scotland united states ti-89 allowed college board calculator-permitted tests including sat sat subject tests ap calculus physics chemistry statistics exams however calculator banned use act plan classrooms ti-92 series otherwise comparable features qwerty keyboard results classified computer device rather calculator
[ 1361, 336, 5079, 7583, 1670, 5571, 4277, 6590, 1435 ]
Test
5,422
3
The_Duel:_Test_Drive_II:duel test drive ii duel test drive ii racing video game developed distinctive software published accolade amiga amstrad cpc apple iigs commodore 64 ms-dos msx zx spectrum atari st sega genesis snes like original test drive focus duel driving exotic cars dangerous highways evading traffic trying escape police pursuits first game series player simply racing time single scenario test drive ii improves upon predecessor introducing varied scenery giving player option racing clock competing computer-controlled opponent player initially given opportunity choose car drive level difficulty turn determines whether car use automatic manual transmission—the number difficulty options varies gaming platforms levels begin player car computer opponent selected idling roadway primarily two four lane public highways many turns level different include obstacles bridges cliffs tunnels addition cars already road level also one police cars along course goal level reach gas station end course least amount time stopping gas station mandatory one could drive past inattentive consequence stopping results running gas thus losing car life player begins game 5 lives one lost time player crashes something player completes level without crashing running gas awarded bonus life addition losing life crashing adds thirty seconds player time cars could crash traffic off-road obstacles trees could crash falling cliff one mountain levels could sustain much damage staying roadway long flatland levels players could also lose life using manual transmission redlining consequently blowing engine crashing police car instantly ends game regardless number lives player left police cars appear every level player driving faster speed limit encountering one police car follow pursuit point pursued police car able pass player car player forced pull receives ticket stating offense speed vehicle n't cost player life take away valuable time players avoid pursued police slowing encountering anticipating aid radar detector comes standard vehicles game standard version test drive ii player option using one two vehicles three 1992 console versions game vehicles presented beginning game technical specifications including top speed torque acceleration rates cars included porsche 959 ferrari f40 third car lamborghini diablo non-console versions accolade later released two data disks included playable cars released many platforms computer versions game provided one course referred game “ master scenery ” consisting several stages stage one three possible locations desert cacti along side road mountain sheer rock wall one side highway cliff occasionally tunnel mountain grassy area trees later two scenery disks released containing additional course four available courses snes version game varying length difficulty route public highway different part continental united states courses included three cars chosen version game technically stopped law point animated female police officer smiles character character smiles return apprehended law enforcement various infractions including evasion police course end sequence shows female police officer placing player arrest virtually impossible complete given course without police confrontation end game due fact must maintain high speeds evade police cars highways computer gaming world stated liked test drive would like version like predecessor steering system avoid compute favorably reviewed game realism especially joystick stated installation overly difficult frustrating
[ 6380 ]
Validation
5,423
2
QP_(framework):qp framework qp quantum platform family lightweight open source software frameworks building responsive modular real-time embedded applications systems cooperating event-driven active objects actors qp family consists qp/c qp/c++ qp-nano frameworks quality controlled documented commercially licensable qp frameworks run bare-metal single-chip microcontrollers completely replacing traditional real-time operating system rtos ports ready-to-use examples provided major cpu families qp/c qp/c++ also work traditional os/rtos posix linux qnx windows vxworks threadx microc/os freertos etc behavior active objects actors specified qp means hierarchical state machines uml statecharts frameworks support manual coding uml state machines c c++ well fully automatic code generation means free graphical qm modeling tool qp frameworks qm modeling tool used medical devices defense aerospace robotics consumer electronics wired wireless telecommunication industrial automation transportation many active objects inherently support automatically enforce following best practices concurrent programming active objects dramatically improve ability reason concurrent software contrast using raw rtos tasks directly trouble number reasons particularly raw tasks let anything offer help automation best practices good patterns active objects raise level abstraction naked threads let express intent directly thus improving productivity active objects operate vacuum require software infrastructure framework provides minimum execution thread active object queuing events event-based timing services resource-constrained embedded systems biggest concern always scalability efficiency frameworks especially frameworks accompanying various modeling tools traditionally built top conventional rtos adds memory footprint cpu overhead final solution qp frameworks designed efficiency minimal footprint ground need rtos stand-alone configuration fact compared conventional rtoses qp frameworks provide smaller footprint especially ram data space also rom code space possible active objects n't need block blocking mechanisms e.g. semaphores conventional rtos needed characteristics make event-driven active objects perfect fit single-chip microcontrollers mcus get productivity boost working higher level abstraction raw rtos tasks get lower resource utilization better power efficiency event-driven systems use cpu processing events otherwise put chip low-power sleep mode qp consists universal uml-compliant event processor qep portable event-driven real-time framework qf tiny run-to-completion kernel qk software tracing system qs qep quantum event processor universal uml-compliant event processor enables direct coding uml state machines uml statecharts highly maintainable c c++ every state machine element mapped code precisely unambiguously exactly traceability qep fully supports hierarchical state nesting enables reusing behavior across many states instead repeating actions transitions qf quantum framework highly portable event-driven real-time application framework concurrent execution state machines specifically designed real-time embedded systems qk quantum kernel tiny preemptive non-blocking run-to-completion kernel designed specifically executing state machines run-to-completion rtc fashion qs quantum spy software tracing system enables live monitoring event-driven qp applications minimal target system resources without stopping significantly slowing code types qp frameworks qp/c qp/c++ qp-nano easily adapted various microprocessor architectures compilers adapting qp software called porting qp frameworks designed ground make porting easy currently bare-metal qp ports exist following processor architectures qp/c qp/c++ frameworks also work traditional operating systems rtoses currently qp ports exist following oses/rtoses qp framework types dual-licensed open source gplv2 traditional closed-source license users want distribute qp e.g embedded inside user upgradable devices retain proprietary status code fee several types commercial royalty-free closed-source licenses available
[ 3365, 4759, 1670, 5571, 1772, 5208, 578, 1435, 4336 ]
Test
5,424
9
Niklaus_Wirth:niklaus wirth niklaus emil wirth born 15 february 1934 swiss computer scientist designed several programming languages including pascal pioneered several classic topics software engineering 1984 turing award generally recognized highest distinction computer science developing sequence innovative computer languages wirth born winterthur switzerland 1934 1959 earned degree electronics engineering swiss federal institute technology zürich eth zürich 1960 earned m.sc université laval canada 1963 awarded ph.d. electrical engineering computer science eecs university california berkeley supervised computer designer pioneer harry huskey 1963 1967 served assistant professor computer science stanford university university zurich 1968 became professor informatics eth zürich taking two one-year sabbaticals xerox parc california 1976–1977 1984–1985 wirth retired 1999 2004 made fellow computer history museum seminal work programming languages algorithms including euler algol-w pascal modula oberon wirth chief designer programming languages euler algol w pascal modula modula-2 oberon oberon-2 oberon-07 also major part design implementation team lilith oberon operating systems lola digital hardware design simulation system received association computing machinery acm turing award development languages 1984 1994 inducted fellow acm book written jointly kathleen jensen pascal user manual report served basis many language implementation efforts 1970s 1980s united states across europe article program development stepwise refinement teaching programming considered classic text software engineering 1975 wrote book algorithms data structures programs gained wide recognition major revisions book new title algorithms data structures published 1985 2004 examples first edition written pascal replaced later editions examples written modula-2 oberon respectively textbook systematic programming introduction considered good source students wanted coding regarded challenging text work sought imperative reading interested numerical mathematics 1992 published together jürg gutknecht full documentation oberon os.. second book together martin reiser intended programmer guide 1995 popularized adage known wirth law states software getting slower rapidly hardware becomes faster 1995 paper plea lean software attributes martin reiser
[ 6507, 1522, 3166, 3509, 6511, 7707, 4302, 5639, 6340, 7970, 5730, 4589, 4942, 1361, 1365, 4946, 6181, 5571, 1746, 4508, 1381, 6285, 3115, 4651, 7009, 3470, 4885, 7999, 43, 1114, 5948, 7017, 7921, 149, 1774, 1308, 1408, 7758, 3229, 4361, ...
Test
5,425
2
Address_Windowing_Extensions:address windowing extensions address windowing extensions awe microsoft windows application programming interface allows 32-bit software application access physical memory virtual address space even excess 4 gb limit process mapping application virtual address space physical memory awe known windowing similar overlay concept environments awe beneficial certain data-intensive applications database management systems scientific engineering software need manipulate large data sets minimizing paging application reserves region window virtual address space allocates one regions physical memory using awe api application map virtual window one physical regions application reserve one virtual address space map allocated regions physical memory long number bytes reserved virtual address space matches physical memory region application must lock pages memory privilege use awe 32-bit systems awe depends physical address extension support reserving memory 4 gb awe first introduced windows 2000 new api superseding pse36 method windows nt 4.0 enterprise edition accessing 4 gb memory longer supported windows 2000 among first applications make use awe oracle 8.1.6 microsoft sql server 2000 /3gb boot flag used repartition 32-bit virtual address space 2 gb kernel 2 gb userland 3 gb userland awe limited accessing 16 gb physical memory limitation one gb reserved kernel n't enough memory page table entries map 16 gb memory additional restrictions maximum amount memory addressable thorough awe imposed windows licensing scheme example windows 2000 advanced server limited 8 gb windows 2000 data center server supported 64 gb article published dr. dobb journal 2004 noted memory allocated using address windowing extensions written pagefile suggested awe regions could therefore used way protecting sensitive application data encryption keys
[ 7213, 4759, 5637, 2054, 7715, 4915 ]
Test
5,426
9
Xtext:xtext xtext open-source software framework developing programming languages domain-specific languages dsls unlike standard parser generators xtext generates parser also class model abstract syntax tree well providing fully featured customizable eclipse-based ide xtext developed eclipse project part eclipse modeling framework project licensed eclipse public license first version xtext published 2006 openarchitectureware project last version released oaw project version 4.3 since beginning 2008 xtext developed eclipse eclipse modeling project joining eclipse annual simultaneous release xtext released version 0.7.0 june 2009 1.0 june 2010 2.0 june 2011 2.3 june 2012 2.5 december 2013 2.6 may 2014 2.7 september 2014 framework mainly developed german company itemis specify language developer write grammar xtext grammar language grammar describes ecore model derived textual notation definition code generator derives antlr parser classes object model used independently eclipse xtext includes features integrate well eclipse-based ide xtext languages ide highly configurable language infrastructure ide wired using dependency injection guice default components easily replaced binding customized ones instead since version 2.0 xtext facilitated development domain-specific languages java virtual machine referring compiling java artifacts tight integration eclipse java development toolkit reusable expression languages library enables rich behavior within dsl code generator written xtend hooked language jvm languages enough map dsl concepts java artifacts get holistic java integration alternative interpreter also available time writing article xtext homepage listed around 40 commercial non-commercial projects several application domains using xtext general-purpose language xtend also built xtext
[ 2506, 2623 ]
Test
5,427
4
SCADA_Strangelove:scada strangelove scada strangelove independent group information security researchers founded 2012 focused security assessment industrial control systems ics scada main fields research include scada strangelove interests expand classic ics components covers various embedded systems however encompass smart home components solar panels wind turbines smartgrid well areas group members continue develop publish numerous open source tools scanning fingerprinting security evaluation password bruteforcing ics devices devices work industrial protocols modbus siemens s7 mms iso ec 60870 profinet 2014 shodan used published tools building map ics devices publicly available internet open source security assessment frameworks thc hydra metasploit digitalbond redpoint used shodan-developed tools techniques group published security-hardening guidelines industrial solutions based siemens simatic wincc wincc flexible guidelines contain detailed security configuration walk-throughs descriptions internal security features appropriate best practices among group ’ noticeable projects choo choo pwn ccp also named critical infrastructure attack cia interactive laboratory built upon ics software hardware used real world every system connected toy city infrastructure includes factories railroads facilities laboratory demonstrated various conferences including phdays power community 30c3 primarily laboratory used discovery new vulnerabilities evaluation security mechanisms however also used workshops educational activities positive hack days iv contestants found several 0-day vulnerabilities indusoft web studio 7.1 schneider electric specific ics hardware rtu pet-7000 ics vulnerability discovery challenge group supports secure open smartgrid scadasos project find fix vulnerabilities intellectual power grid components photovoltaic power station wind turbine power inverter 80 000 industrial devices discovered isolated internet 2015 group members frequently seen presenting conferences like ccc scada security scientific symposium positive hack days notable talks overview vulnerabilities discovered widely distributed siemens simatic wincc software tools implemented searching ics internet talk consisted overview vulnerabilities discovered various systems produced abb emerson honeywell siemens presented phdays iii phdays iv implications security research aimed realization various industrial network protocols profinet modbus dnp3 iec 61850-8-1 mms iec international electrotechnical commission 61870-5-101/104 fte fault tolerant ethernet siemens s7 presentations security research showing impact radio 3g/4g networks security mobile devices well industrial equipment analysis security architecture implementation wide spread platforms wind solar energy generation produce many gigawatts cybersecurity assessment railway signaling systems automatic train control atc computer-based interlocking cbi european train control system etcs greater china cyber threat landscape keynote sergey gordeychik overview vulnerabilities attacks cyber-security incidents greater china region presented talk hopeless relay protection substation automation kirill nesterov alexander tlyapov security analysis results key digital substation component relay protection terminals presented vulnerabilities including remote code execution siemens siprotec general electric line distance relay nari abb protective relays presented names catchwords graphical elements refer stanley kubrick ’ film dr. strangelove talks group members often refer cold war events caribbean crisis draw parallels nuclear arms race current escalation cyberwar group members follow approach “ responsible disclosure ” “ ready wait years vendor patching vulnerability ” public exploits discovered vulnerabilities published account longevity ics implication long process patching ics however conflicts still happen notably 2012 talk def con called due dispute persistent weaknesses siemens industrial software
[ 3140 ]
Test
5,428
8
Easyrec:easyrec easyrec open-source program provides personalized recommendations using restful web services integrated web enabled applications distributed gnu general public license studio smart agent technologies hosted sourceforge written java uses mysql database comes administration tool development easyrec implementation adaptive personalization approach started course several research development projects conducted studio smart agent technologies close cooperation international companies year 2008 core functionality easyrec developed forming basis research prototypes focusing music domain e.g musicexplorer june 2009 beta version easyrec containing basic administration features integrated movie streaming portal evaluation purposes furthermore september 2009 easyrec awarded special recognition category “ award innovations – innovations economic upswing ” jury austrian state prize multimedia e-business comprehensive refactoring phase integration evaluation results easyrec published sourceforge 18 february 2010 course cebit tradeshow 2011 hanover easyrec awarded german “ innovationspreis-it 2011 ” following five primary goals guided development easyrec although easyrec domain-agnostic general purpose personalization system current web service api customized providing online shops item recommendations especially small medium enterprises easyrec provides low barrier entrance personalization major feature easyrec set usage statistics business relevant information presented via administration management interface furthermore easyrec administrator supported variety administration configuration functions including manual import adaptation business rules integrators developers benefit lightweight web service apis rest soap well guided installation wizard concerning personalization functionality easyrec providing following services additionally integration showcase mediawiki extension developed bundled application currently additional features like recommender algorithms plugin-system evaluated prepared integration easyrec system underlying architecture easyrec designed robust scalable—separating time-consuming computations task online assembling recommendations easyrec designed multi-layer system consisting moreover generator server contains different item association generators create business rules define relation two items examples web sites using easyrec recommender system
[ 6986 ]
Validation
5,429
0
Natural_language_processing:natural language processing natural language processing nlp subfield linguistics computer science information engineering artificial intelligence concerned interactions computers human natural languages particular program computers process analyze large amounts natural language data challenges natural language processing frequently involve speech recognition natural language understanding natural language generation history natural language processing nlp generally started 1950s although work found earlier periods 1950 alan turing published article titled computing machinery intelligence proposed called turing test criterion intelligence georgetown experiment 1954 involved fully automatic translation sixty russian sentences english authors claimed within three five years machine translation would solved problem however real progress much slower alpac report 1966 found ten-year-long research failed fulfill expectations funding machine translation dramatically reduced little research machine translation conducted late 1980s first statistical machine translation systems developed notably successful natural language processing systems developed 1960s shrdlu natural language system working restricted blocks worlds restricted vocabularies eliza simulation rogerian psychotherapist written joseph weizenbaum 1964 1966 using almost information human thought emotion eliza sometimes provided startlingly human-like interaction patient exceeded small knowledge base eliza might provide generic response example responding head hurts say head hurts 1970s many programmers began write conceptual ontologies structured real-world information computer-understandable data examples margie schank 1975 sam cullingford 1978 pam wilensky 1978 talespin meehan 1976 qualm lehnert 1977 politics carbonell 1979 plot units lehnert 1981 time many chatterbots written including parry racter jabberwacky 1980s natural language processing systems based complex sets hand-written rules starting late 1980s however revolution natural language processing introduction machine learning algorithms language processing due steady increase computational power see moore law gradual lessening dominance chomskyan theories linguistics e.g transformational grammar whose theoretical underpinnings discouraged sort corpus linguistics underlies machine-learning approach language processing earliest-used machine learning algorithms decision trees produced systems hard if-then rules similar existing hand-written rules however part-of-speech tagging introduced use hidden markov models natural language processing increasingly research focused statistical models make soft probabilistic decisions based attaching real-valued weights features making input data cache language models upon many speech recognition systems rely examples statistical models models generally robust given unfamiliar input especially input contains errors common real-world data produce reliable results integrated larger system comprising multiple subtasks many notable early successes occurred field machine translation due especially work ibm research successively complicated statistical models developed systems able take advantage existing multilingual textual corpora produced parliament canada european union result laws calling translation governmental proceedings official languages corresponding systems government however systems depended corpora specifically developed tasks implemented systems often continues major limitation success systems result great deal research gone methods effectively learning limited amounts data recent research increasingly focused unsupervised semi-supervised learning algorithms algorithms able learn data hand-annotated desired answers using combination annotated non-annotated data generally task much difficult supervised learning typically produces less accurate results given amount input data however enormous amount non-annotated data available including among things entire content world wide web often make inferior results algorithm used low enough time complexity practical 2010s representation learning deep neural network-style machine learning methods became widespread natural language processing due part flurry results showing techniques achieve state-of-the-art results many natural language tasks example language modeling parsing many others popular techniques include use word embeddings capture semantic properties words increase end-to-end learning higher-level task e.g. question answering instead relying pipeline separate intermediate tasks e.g. part-of-speech tagging dependency parsing areas shift entailed substantial changes nlp systems designed deep neural network-based approaches may viewed new paradigm distinct statistical natural language processing instance term neural machine translation nmt emphasizes fact deep learning-based approaches machine translation directly learn sequence-to-sequence transformations obviating need intermediate steps word alignment language modeling used statistical machine translation smt early days many language-processing systems designed hand-coding set rules e.g writing grammars devising heuristic rules stemming however rarely robust natural language variation since so-called statistical revolution late 1980s mid 1990s much natural language processing research relied heavily machine learning machine-learning paradigm calls instead using statistical inference automatically learn rules analysis large corpora typical real-world examples corpus plural corpora set documents possibly human computer annotations many different classes machine-learning algorithms applied natural-language-processing tasks algorithms take input large set features generated input data earliest-used algorithms decision trees produced systems hard if-then rules similar systems hand-written rules common increasingly however research focused statistical models make soft probabilistic decisions based attaching real-valued weights input feature models advantage express relative certainty many different possible answers rather one producing reliable results model included component larger system systems based machine-learning algorithms many advantages hand-produced rules following list commonly researched tasks natural language processing tasks direct real-world applications others commonly serve subtasks used aid solving larger tasks though natural language processing tasks closely intertwined frequently subdivided categories convenience coarse division given first published work artificial intelligence published 2018 1 road marketed novel contains sixty million words
[ 3601, 1444, 3263, 715, 2558, 2921, 3959, 1839, 7539, 5388, 6103, 7900, 733, 3292, 1477, 2215, 7909, 2579, 4337, 5756, 3651, 4349, 3654, 4724, 3662, 5778, 6850, 774, 5782, 2614, 84, 6507, 5800, 92, 2629, 6166, 4760, 4037, 7627, 4403, 264...
Test
5,430
4
Data_anonymization:data anonymization data anonymization type information sanitization whose intent privacy protection process either encrypting removing personally identifiable information data sets people data describe remain anonymous european union new general data protection regulation demands stored data people eu undergo either anonymization pseudonymization process data anonymization defined process personal data irreversibly altered way data subject longer identified directly indirectly either data controller alone collaboration party data anonymization enables transfer information across boundary two departments within agency two agencies reducing risk unintended disclosure certain environments manner enables evaluation analytics post-anonymization context medical data anonymized data refers data patient identified recipient information name address full post code must removed together information conjunction data held disclosed recipient could identify patient.. de-anonymization reverse process anonymous data cross-referenced data sources re-identify anonymous data source generalization perturbation two popular anonymization approaches relational data.. process obscuring data ability re-identify later also called pseudonymization one way companies store data way hipaa compliant ordered alphabetically
[ 2987, 6296, 2566, 8191 ]
Test
5,431
3
Bit_Manipulation_Instruction_Sets:bit manipulation instruction sets bit manipulation instructions sets bmi sets extensions x86 instruction set architecture microprocessors intel amd purpose instruction sets improve speed bit manipulation instructions sets non-simd operate general-purpose registers two sets published intel bmi referred bmi1 bmi2 introduced haswell microarchitecture another two sets published amd abm advanced bit manipulation also subset sse4a implemented intel part sse4.2 bmi1 tbm trailing bit manipulation extension introduced piledriver-based processors extension bmi1 dropped zen-based processors abm implemented single instruction set amd amd processors support instructions neither intel considers codice_1 part sse4.2 codice_2 part bmi1 codice_1 separate cpuid flag however intel uses amd codice_4 flag indicate codice_2 support since codice_2 completes abm codice_2 almost identical bit scan reverse codice_8 instruction sets zf result zero cf source zero flags rather produces defined result source operand size bits source operand zero instructions enabled codice_9 bit cpuid intel officially considers codice_2 part bmi advertises codice_2 support using codice_4 cpuid feature flag bmi1 available amd jaguar piledriver newer processors intel haswell newer processors intel introduced bmi2 together bmi1 line haswell processors amd produced processors supporting bmi1 without bmi2 bmi2 supported amds excavator architecture newer codice_13 codice_14 instructions new generalized bit-level compress expand instructions take two inputs one source selector selector bitmap selecting bits packed unpacked codice_14 copies selected bits source contiguous low-order bits destination higher-order destination bits cleared codice_13 opposite selected bits contiguous low-order bits copied selected bits destination destination bits cleared used extract bitfield input even lot bit-level shuffling previously would expensive instructions similar bit level gather-scatter simd instructions codice_13 codice_14 instructions like rest bmi instruction sets operate general-purpose registers 16-bit examples operations tbm consists instructions complementary instruction set started bmi1 complementary nature means necessarily need used directly generated optimizing compiler supported amd introduced tbm together bmi1 piledriver line processors amd jaguar zen-based processors support tbm
[ 2000, 1252, 3173, 4845, 2989, 3443, 4224, 6523, 5559, 6616, 1465, 5665, 5934, 742, 5669, 5670, 584, 3803, 5055, 2226, 6647, 1961, 1770, 2498, 3565, 4077, 6563, 3248, 5165, 3139, 6133, 2332, 1881, 5431, 691, 8033, 3747, 6675, 6236, 780, ...
Validation
5,432
9
Java_Portlet_Specification:java portlet specification java portlet specification defines contract portlet container portlets provides convenient programming model java portlet developers portlets pluggable user interface software components managed displayed web portal example enterprise portal web cms portlet aggregate integrate personalize content different sources within web page portlet responds requests web client generates dynamic content portlets produce fragments markup html xhtml wml aggregated portal typically following desktop metaphor portal page displayed collection non-overlapping portlet windows portlet window displays portlet hence portlet collection portlets resembles web-based application hosted portal examples portlet applications e-mail weather reports discussion forums news portlet managed portlet container portlet standards platform independent application programming interfaces intended enable software developers create portlets plugged portal supporting standards example java portlet specification java portlet resembles java servlet produces fragments rather complete documents bound url portlet container runs portlets provides required runtime environment portlet container contains portlets manages life cycles also provides persistent storage mechanisms portlet preferences portlet container receives requests portal execute requests portlets hosted portlet container responsible aggregating content produced portlets portal handles aggregation portal portlet container built together single component application suite two separate components portal application java portlet specification v1.0 developed java community process java specification request jsr 168 released final form october 2003 java portlet specification v1.0 introduces basic portlet programming model initially java portal vendors portlet development framework thus portlets confined specific portal servers could n't deployed rest java portals jsr 168 inception java portlets may deployed java portal servers adhering jsr 168 specifications portlets catalog set portlets ready-to-use components enterprise portals want adopt portals certainly need many variety portlets deploy run portlets catalog use jsr 168 portlets catalog makes sure portlets catalog may run standards–compliant java portal server types portlet solution vertical domains technology like collaboration social networking community content management utility calendaring hrm available catalogs many open source commercial portlets catalog available jsr 168 based solutions rare jsr 168 specifications offer suitability developers reuse code maintain set jsr 168 compliant portlets deployers easy keep single set solution deploy many jsr-286 java portlet specification v2.0 developed jcp created alignment updated version 2.0 wsrp released june 2008 developed improve short-comings version 1.0 specification jsr-168 major features include jsr-362 java portlet specification v3.0 released april 2017 major features include
[ 6986, 6991, 3290, 3383, 6029, 8006, 4082, 3900, 4445, 6059, 2807, 6858, 7315, 87, 6787 ]
Test
5,433
9
Codelobster:codelobster codelobster portable integrated development environment ide primarily php also supports html css javascript development plug-ins available drupal wordpress smarty joomla jquery facebook codeigniter yii cakephp free registration email required 30 days use program paid versions also lite professional additional features program missing help system latest version program features syntax highlighting auto-completion sql php html css javascript xml well automatic syntax checking html css inspector like firebug also includes drupal support plugins paid offer trial periods varying length
[ 2451, 4296, 4759, 6701, 7628, 1737, 1643, 5571, 6029, 933, 4352, 7933, 4998, 8035, 5092 ]
Test
5,434
4
Zealot_Campaign_(Malware):zealot campaign malware zealot campaign cryptocurrency mining malware collected series stolen national security agency nsa exploits released shadow brokers group windows linux machines mine cryptocurrency specifically monero discovered december 2017 exploits appeared zealot suite include eternalblue eternalsynergy apache struts jakarta multipart parser attack exploit cve-2017-5638 notable exploit within zealot vulnerabilities includes vulnerability cve-2017-9822 known dotnetnuke dnn exploits content management system user install monero miner software estimated usd 8,500 monero mined single targeted computer campaign discovered studied extensively f5 networks december 2017 many zealot exploits leaked nsa malware suite widely described “ unusually high obfuscated payload ” meaning exploit works multiple levels attack vulnerable server systems causing large amounts damage term “ zealot ” derived starcraft series namely type warrior multi-layered attack begins two http requests used scan target vulnerable systems network similar attacks past targeted either windows linux-based systems yet zealot stands prepared version apache struts exploit along using dnn operating system os identified via java script malware loads os-specific exploit chains targeted system runs either linux os x struts payload install python agent post-exploitation stage checking target system see already infected downloads crypto-miner software often referred “ mule ” obfuscates embedded python code process different botnet malware zealot campaigns request command control c c server-specific user-agent cookie headers meaning anyone malware receive different response due zealot encrypting via rc4 cipher see network inspection security software able see malware network able scan targeted os windows struts payload downloads encoded powershell interpreter decoded two times program runs another obfuscated script turn leads device url download files file known powershell script “ scv.ps1 ” heavily obfuscated script allows attacker deploy mining software targeted device deployed software also use dynamic-link library dll mining malware deployed using reflective dll injection technique attach malware powershell processing remain undetected prior moving onto next stage program also checks see firewall active yes pipe embedded base64 embedded python code circumvent firewall another possible solution known “ little snitch ” possibly terminate firewall active post-exploitation stage program scans target system python 2.7 higher found system download following downloads python module probe.py propagate network script highly obfuscated base encryption base64 zipped 20 times downloaded zip file could named several iterations derived starcraft game files included listed files run successfully miner software introduced known commonly “ mule ” malware powershell script named “ minerd_n.ps2 ” within compressed files downloaded executed via eternalsynergy exploit software utilizes target system ’ hardware process mining cryptocurrency mining software reportedly stolen close 8,500 one victim yet total amounts mined monero still speculated among researchers initially utilized wannacry ransomware attack 2017 exploit specifically utilized mining software zealot campaign much known exploit used cooperation eternalblue along exploits zealot campaign others notably eternalsynergy involved equifax hack wannacry ransomware cryptocurrency mining campaigns asp.net based content management system dnn sends serialized object via vulnerable dnnpersonalization cookie http request stage using “ objectdataprovider ” “ objectstateformatter ” attacker embeds another object victim ’ shell system invoked shell system deliver script delivered apache struts exploit dnn acts secondary backup attackers apache struts exploit fail used deliver powershell script initiate attack exploit one two http requests sent initial stage infection among first discovered exploits zealot campaign jakarta parser exploit allowed hackers exploit “ zero-day ” flaw software hack financial firm equifax march 2017 particular exploit notable public exploits utilized largely public case still utilized december 2017 exploit patched bangladeshi-based group utilized spear-phishing method known commonly business email compromise bce steal cryptocurrency unsuspecting employees lazarus primarily targeted employees cryptocurrency financial organizations executed via word document claiming legitimate-appearing european company document opened embedded trojan virus would load onto system computer begin steal credentials malware specific malware still unknown ties zealot malware among several exploits involved march 2017 equifax data breach jakarta parser eternalblue eternalsynergy heavily involved attacking servers instead software utilized mine cryptocurrency used mine data 130 million equifax customers
[ 6526, 3637, 7066 ]
Test
5,435
4
Email_injection:email injection email injection security vulnerability occur internet applications used send email messages email equivalent http header injection like sql injection attacks vulnerability one general class vulnerabilities occur one programming language embedded within another form added web page submits data web application malicious user may exploit mime format append additional information message sent new list recipients completely different message body mime format uses carriage return delimit information message raw message determines eventual destination adding carriage returns submitted form data allow simple guestbook used send thousands messages malicious spammer could use tactic send large numbers messages anonymously information topic including examples ways avoid vulnerability found securephp wiki however vulnerability limited php potentially affect application sends email messages based input arbitrary users
[ 623, 6029, 3932, 84 ]
Test
5,436
3
Socket_S1:socket s1 socket s1 cpu socket type used amd turion 64 athlon 64 mobile phenom ii mobile later sempron processors debuted dual-core turion 64 x2 cpus may 17 2006 socket s1 638 pin low profile zif 1.27mm pitch socket replaces existing socket 754 mobile computing segment e.g laptops socket s1 cpus include support dual-channel ddr2 sdram dual-core mobile cpus virtualization technology compete mobile intel core 2 processor series different generations processors used variant pinouts s1 socket processors necessarily compatible socket even fit mechanically
[ 2539, 5799, 2541, 5895, 6599, 4931, 7163, 2997, 3362, 1735, 5377, 6351, 913, 7826, 7453, 2751, 6545, 6373, 5063, 6655, 6562, 3145, 4090, 866, 1143 ]
Test
5,437
6
Coda_(file_system):coda file system coda distributed file system developed research project carnegie mellon university since 1987 direction mahadev satyanarayanan descended directly older version andrew file system afs-2 offers many similar features intermezzo file system inspired coda coda many features desirable network file systems several features found elsewhere coda uses local cache provide access server data network connection lost normal operation user reads writes file system normally client fetches hoards data user listed important event network disconnection network connection lost coda client local cache serves data cache logs updates operating state called disconnected operation upon network reconnection client moves reintegration state sends logged updates servers transitions back normal connected-mode operation also different afs coda data replication method afs uses pessimistic replication strategy files allowing one read/write server receive updates servers acting read-only replicas coda allows servers receive updates allowing greater availability server data event network partitions case afs handle unique features introduce possibility semantically diverging copies files directories known conflicts disconnected operation local updates potentially clash connected users updates objects preventing reintegration optimistic replication potentially cause concurrent updates different servers object preventing replication former case called local/global conflict latter case server/server conflict coda extensive repair tools manual automated handle repair types conflicts coda developed linux support appeared 2.1 linux kernel series also ported freebsd subsequently obsoleted efforts way bring back efforts made port coda microsoft windows windows 95/windows 98 era windows nt windows xp means open source projects like djgcc dos c compiler cygwin
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 4375, 6500, 6505, 5457, 4759, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 44...
Validation
5,438
7
Loader.io:loader.io loader.io cloud-based load scalability testing service saas allows developers test web applications api thousands concurrent connections loader.io cloud-based load testing service developers test performance scalability web applications apis provides simple cloud-based load testing born sendgrid labs late 2012
[ 330, 69 ]
Test
5,439
4
Defense.Net:defense.net defense.net privately held american information technology services company company business protect internet-facing infrastructures – e-commerce web sites – forms distributed denial service ddos attacks network defense.net operates constellation ddos mitigation sites around internet capable filtering removing ddos attacks real-time defense.net founded barrett lyon 2012 lyon also pioneer ddos mitigation industry founder prolexic first ddos mitigation company 2014 company named one 100 hottest private companies north america red herring acquired shortly f5 networks purportedly 50 100 million 2012 bessemer venture partners lead series round funding total 9.5 million
[ 1691, 3637 ]
Test
5,440
6
Disk_encryption:disk encryption disk encryption technology protects information converting unreadable code deciphered easily unauthorized people disk encryption uses disk encryption software hardware encrypt every bit data goes disk disk volume used prevent unauthorized access data storage expressions full disk encryption fde whole disk encryption signify everything disk encrypted master boot record mbr similar area bootable disk code starts operating system loading sequence encrypted hardware-based full disk encryption systems truly encrypt entire boot disk including mbr transparent encryption also known real-time encryption on-the-fly encryption otfe method used disk encryption software transparent refers fact data automatically encrypted decrypted loaded saved transparent encryption files accessible immediately key provided entire volume typically mounted physical drive making files accessible unencrypted ones data stored encrypted volume read decrypted without using correct password/keyfile correct encryption keys entire file system within volume encrypted including file names folder names file contents meta-data transparent end user transparent encryption usually requires use device drivers enable encryption process although administrator access rights normally required install drivers encrypted volumes typically used normal users without rights general every method data seamlessly encrypted write decrypted read way user and/or application software remains unaware process called transparent encryption disk encryption replace file encryption situations disk encryption sometimes used conjunction filesystem-level encryption intention providing secure implementation since disk encryption generally uses key encrypting whole drive data decryptable system runs however disk encryption solutions use multiple keys encrypting different volumes attacker gains access computer run-time attacker access files conventional file folder encryption instead allows different keys different portions disk thus attacker extract information still-encrypted files folders unlike disk encryption filesystem-level encryption typically encrypt filesystem metadata directory structure file names modification timestamps sizes trusted platform module tpm secure cryptoprocessor embedded motherboard used authenticate hardware device since tpm chip unique particular device capable performing platform authentication used verify system seeking access expected system limited number disk encryption solutions support tpm implementations wrap decryption key using tpm thus tying hard disk drive hdd particular device hdd removed particular device placed another decryption process fail recovery possible decryption password token although advantage disk removed device might create single point failure encryption example something happens tpm motherboard user would able access data connecting hard drive another computer unless user separate recovery key multiple tools available market allow disk encryption however vary greatly features security divided three main categories software-based hardware-based within storage device hardware-based elsewhere cpu host bus adaptor hardware-based full disk encryption within storage device called self-encrypting drives impact performance whatsoever furthermore media-encryption key never leaves device therefore available virus operating system trusted computing group opal storage specification provides industry accepted standardization self-encrypting drives external hardware considerably faster software-based solutions although cpu versions may still performance impact media encryption keys well protected solutions boot drive require pre-boot authentication component available types solutions number vendors important cases authentication credentials usually major potential weakness since symmetric cryptography usually strong secure safe recovery mechanisms essential large-scale deployment disk encryption solutions enterprise solution must provide easy secure way recover passwords importantly data case user leaves company without notice forgets password challenge–response password recovery mechanism allows password recovered secure manner offered limited number disk encryption solutions benefits challenge–response password recovery emergency recovery information eri file provides alternative recovery challenge–response mechanism unfeasible due cost helpdesk operatives small companies implementation challenges benefits eri-file recovery full disk encryption schemes vulnerable cold boot attack whereby encryption keys stolen cold-booting machine already running operating system dumping contents memory data disappears attack relies data remanence property computer memory whereby data bits take several minutes degrade power removed even trusted platform module tpm effective attack operating system needs hold decryption keys memory order access disk full disk encryption also vulnerable computer stolen suspended wake-up involve bios boot sequence typically ask fde password hibernation contrast goes via bios boot sequence safe software-based encryption systems vulnerable various side channel attacks acoustic cryptanalysis hardware keyloggers contrast self-encrypting drives vulnerable attacks since hardware encryption key never leaves disk controller also full disk encryption schemes n't protect data tampering silent data corruption i.e bitrot means provide privacy integrity block cipher-based encryption modes used full disk encryption authenticated encryption concerns storage overhead needed authentication tags thus tampering would done data disk data would decrypted garbled random data read hopefully errors may indicated depending data tampered case os metadata – file system case file data – corresponding program would process file one ways mitigate concerns use file systems full data integrity checks via checksums like btrfs zfs top full disk encryption however cryptsetup started experimentally support authenticated encryption full disk encryption several benefits compared regular file folder encryption encrypted vaults following benefits disk encryption one issue address full disk encryption blocks operating system stored must decrypted os boot meaning key available user interface ask password full disk encryption solutions utilize pre-boot authentication loading small highly secure operating system strictly locked hashed versus system variables check integrity pre-boot kernel implementations bitlocker drive encryption make use hardware trusted platform module ensure integrity boot environment thereby frustrate attacks target boot loader replacing modified version ensures authentication take place controlled environment without possibility bootkit used subvert pre-boot decryption pre-boot authentication environment key used encrypt data decrypted external key input system solutions storing external key include possibilities varying degrees security however better unencrypted disk
[ 4921, 454, 3350, 3512, 5808, 3083, 1259, 6711, 6892, 6505, 3100, 4406, 6899, 7258, 2566, 5571, 1008, 3866, 309, 8092, 2399, 5664, 3794, 1382, 2857, 6025, 6458, 6117, 6461, 6823, 4616, 5327, 3134, 943, 4441, 60, 5773, 2426, 4536, 7120, 4...
Test
5,441
2
Abort,_Retry,_Fail?:abort retry fail abort retry fail abort retry ignore error message found dos operating systems prompts end-user course action follow message cited example poor usability computer user interfaces cp/m attempting read floppy disk drive door open would hang disk inserted disk drive door closed early disk hardware send kind signal disk spinning timeout detect lack signal required much code tiny systems many users cp/m became accustomed method managing multiple disks opening disk drive stop program reading writing file correct disk could inserted primary design consideration pc dos software written cp/m portable dos without changes even first ibm pc hardware told operating system disk drive door open returning error software trying read disk would break ability manage disks way without changes still desirable improve experience particular giving user way get hang without find disk insert drive prompt invented reason missing disk disk drive door opened defined dos critical error would call critical error handler default critical error handler part command.com printed abort retry ... prompt waited user input problems particular checksum error reading data disk also defined critical error thus causing prompt appear reasons missing disk opened disk drive users could press key indicate wanted happen available options included program could install critical error handler running many sophisticated programs particular full screen programs order avoid messages disturbing display programs faked missing fail response dos 2.0 jumping back calling program skipping return stack dos risky hack relied stack layout skipped cleanup operations operating system error messages described example poor user interface design users message appeared choice hit r'—which repeated message—or hit another letter caused program crash work lost one scholar described way hard disks larger removable media zip drives made need manage multiple disks obsolete thus made prompt useless gradually replaced code acted like fail immediately dos 3.3 command.com provided startup option codice_1 order force default critical error handler return fail errors starting version 4.0 alternative command line processors 4dos ndos supported codice_1 corresponding codice_3 directive codice_4/codice_5 well option also supported command.com pts-dos 6.51 s/dos 1.0 well dr-dos 7.02 higher opendos 7.01 command.com provides similar feature codice_6 described install critical error handler still supported newer versions operating systems linux always act like fail cases humorous variations edgar allen poe raven using abort retry ignore place nevermore written 1980s 1990s quite popular distributed bulletin board email original best known version credited cleveland poet marcus bales adapted numerous times attributed anonymous lucy blades rob collins others 1993 neil howe published 13th gen abort retry ignore fail sympathetic book culture generation x 1996 white town released ep entitled abort retry fail pc magazine used term title column highlighting humorous computer-related errors
[ 3431, 1815, 6380, 4415, 4009, 2459, 5571, 1176, 6915 ]
Test
5,442
2
Windows_Insider:windows insider windows insider open software testing program microsoft allows users valid license windows 10 windows server 2016 register pre-release builds operating system previously accessible software developers microsoft launched windows insider developers enterprise testers technically able test new developer features pre-release software builds given publicly released gather low level diagnostics feedback order identify investigate mitigate improve windows 10 os help support guidance insider program participants direct communication microsoft engineers via proprietary communication diagnostic channel announced september 30 2014 along windows 10 september 2015 7 million people took part windows insider program february 12 2015 microsoft started test previews windows 10 mobile microsoft announced windows insider program would continue beyond official release windows 10 future updates gabriel aul previous head charge windows insider program current head windows insider program dona sarkar similar windows insider program microsoft office bing xbox visual studio code teams set insider programs microsoft originally launched windows insider enterprise testers technically able test new developer features gather feedback improve features built windows 10 time official launch windows 10 pcs total 5 million volunteers registered windows 10 windows 10 mobile also among first people receive official update windows 10 release windows 10 windows insider app merged settings app made ability install windows insider preview builds optional feature could accessed directly within windows 10 may 2017 microsoft announced program would extend windows server 2016 first insider build operating system released 13 july 2017 windows 10 insider preview updates delivered testers different rings logical categories windows insiders fast ring receive updates prior windows insiders slow ring might experience bugs issues february 2016 microsoft introduced new rings windows insider preview july 17 2017 reports began come windows 10 creators update refused install pcs tablets sporting intel atom clover trail processors first appeared though might temporary block microsoft hardware partners work fix issues preventing operating system run well however microsoft later confirmed devices running clover trail intel atom processors would receiving creators update processors longer supported intel appropriate firmware properly run versions windows 10 newer anniversary update following processors longer supported remain windows 10 anniversary update pcs unsupported processors could receive new features updates microsoft agreed extend support pcs bug fixes security updates latest compatible version windows 10 versions windows 10 released microprocessor released also supported installations operating systems may actively blocked example windows 10 version 1507 ltsb install kaby lake processors microsoft initially launched windows 10 technical preview certain third-generation x30 series phones lumia family subsequently released second-generation x20 series devices throughout testing phase hacked non-lumia phones supported time download preview builds microsoft responded blocking unsupported models roll back installed technical preview back windows phone 8.1 microsoft launched windows device recovery tool removes windows 10 recovers latest officially released software firmware preview build 10080 released may 14 2015 first support non-lumia device htc one m8 windows followed xiaomi partnership microsoft released rom port windows 10 flagship mi 4 handset june 1 2015 time limited certain registered users china build 10080 follow-up build 10166 also added support fourth-generation lumia x40 series devices result compatible windows phone 8 later lumia phones support preview august 2015 microsoft stated windows phone devices including microsoft new hardware partners announced previous year would receive final version windows 10 mobile would receive preview builds insider program however company provide information time whether new devices would added preview program microsoft instead focused promoting new devices come windows 10 mobile including lumia 950 lumia 950 xl flagships low-cost lumia 550 lumia 650 since release new windows 10 devices became eligible receive future updates advance via insider program beginning build 10586 december 4 2015 windows-based lg lancet also received version upgraded since february 19 2016 microsoft released first windows 10 mobile redstone preview build 14267 starting build future preview versions became exclusively available devices already running non-insider preview os except mi4 rom version followed build 14291 released existing windows 10 devices march 17 2016 conjunction official rtm release windows 10 mobile third fourth-generation lumias following week became available newly upgraded older lumias addition several devices already windows 10 mobile time supported devices subsequently received insider preview builds far build 15063 creators update released march 20 2017 included official release build 14393 anniversary update august 2 2016 however announced april 2017 many devices including third-generation lumias would receive rtm version creators update redstone development builds following feedback users devices remain supported nearly except lumia 640 xl variant originally come windows 10 mobile instead windows phone 8.1
[ 7879, 3937, 3263, 378, 2198, 6096, 4687, 1097, 1475, 6110, 7553, 7195, 5410, 7564, 4347, 2953, 422, 6844, 6136, 2245, 5781, 432, 435, 4377, 5090, 3340, 444, 5794, 447, 7602, 448, 6164, 458, 4759, 1534, 6885, 1536, 7247, 7619, 2999, 5475...
Test
5,443
9
MARK_IV_(software):mark iv software mark iv fourth-generation programming language created informatics inc. 1960s informatics took advantage ibm decision mark iv first software product cumulative sales 10 million mark iv developed ibm systems 360 370 rca spectra 70 main benefit allowing faster application development order 6 10 times faster system using 3gl cobol mark iv early 4gl allowed user development systems related business 1971 ad informatics several quotes customers mark iv went sterling software 1985 part company acquisition informatics general vision builder part product suite computer associates
[ 2866 ]
Test
5,444
4
Reverse_Deception:reverse deception reverse deception organized cyber threat counter-exploitation textbook investigates two topics first provides methods criteria rectify advanced persistent threats secondly covers cyber deception ieee review noted masterful presentation deception details identity apts prioritize actions applying skilled field-tested private- government- sector processes methods often involves cyber deception identified richard austin ieee review masterful presentation deception clear work interest different governments several currently involved considering future actions weaponizing cyber capabilities appears recommended reading lists notable u.s. military institutions including u.s. navy war college counterintelligence cyber threat section joint special operations university site military organizations made efforts similar manner people republic china prc considered active apt market special military effort undertaken translate simplified chinese prc national defense university press authors introduce first theory model classifying threat opportunistic-apt continuum either persistent non-persistent widely used industry built evaluation following criteria apt criteria additional content includes beer p. d. basie s. v. 2013 case cyber counterintelligence 2013 international conference adaptive science technology doi:10.1109/icastech.2013.6707493 carli l. d. sommer r. jha s. 2014 beyond pattern matching proceedings 2014 acm sigsac conference computer communications security ccs 14. doi:10.1145/2660267.2660361 csanádi g. 2015 cyber war poor man weapon mass destruction new whip hands rich defence review central journal hungarian defence forces,143 2015th ser. 154-174 chung k. kamhoua c. a. kwiat k. a. kalbarczyk z. t. iyer r. k. 2016 game theory learning cyber security monitoring 2016 ieee 17th international symposium high assurance systems engineering hase doi:10.1109/hase.2016.48 conti g. weigand m. skoudis e. raymond d. cook t. t. a. ragsdale d. 2014 towards cyber leader course weak faint hearted 3rd ed. vol 1337 rep. west point ny army cyber institute department electrical engineering computer science united states military academy gardner b 2018 social engineering non-linear warfare journal applied digital evidence 1 1 heckman k. e. stech f. j. thomas r. k. schmoker b. tsow a. w. 2015 cyber denial deception counter deception framework supporting active cyber defense heginbotham e. nixon m. morgan f. e. heim j. l. hagen j. li s. morris l. j 2015 u.s.-china military scorecard forces geography evolving balance power 1996 2017 santa monica ca rand henderson b. t. 2018 honeypot spies understanding internet-based data theft unpublished master thesis naval postgraduate school holguín j. m. moreno m. merino b 2013 detección de apts p. 9 rep. jajodia s. subrahmanian v. s. swarup v. wang c. 2016 cyber deception building scientific foundation lucas e. 2017 cyberphobia identity trust security internet bloomsbury maozhi y. ziwei l. 2015 mission scale chinese communist party strategic support force 中共戰略支援部隊的任務與規模 y. lin trans. pavlíková m. 2016 cyber operations russia ukraine ukrainian conflict obrana strategie defence strategy ,16 1 77-94. doi:10.3849/1802-7199.16.2016.1.077-094 rowe n. c. rrushi j 2018 introduction cyberdeception springer saadawi t. n. jordan l. boudreau v. colwell j 2011 cyber infrastructure protection carlisle pa strategic studies institute u.s. army war college sowa 2019 it-revision bei betrugsaufdeckung investigation und prüfung doloser handlungen it-revision it-audit und it-compliance,95-121 doi:10.1007/978-3-658-23765-3_4 wrightson t. 2015 advanced persistent threat hacking art science hacking organization ny ny mcgraw-hill education
[ 2923, 5205, 1631, 6756, 6938, 3575 ]
Validation
5,445
8
Link_contract:link contract link contract approach data control distributed data sharing network link contracts key feature xdi specifications development oasis xdi link contract machine-readable xdi document governs sharing xdi data unlike conventional web link essentially one-dimensional string pulls linked document browser link contract graph metadata typically json actively control flow data publisher subscriber either push pull flow controlled terms contract flexible extensible real-world contracts i.e. link contracts govern like real-world contracts link contracts also refer link contracts using design vast majority link contracts simple referring small number complex link contracts carefully designed reflect requirements common data exchange scenarios e.g. business cards mailing lists e-commerce transactions website registrations etc link contracts proposed key element digital trust frameworks published non-profit open identity exchange
[ 3498 ]
Test
5,446
3
Namco_System_11:namco system 11 namco system 11 arcade system board released namco 1994 actual hardware based sony playstation home console thus many games ported console major difference two system 11 used surface-mounted rom chips store game data whereas playstation used cd-rom meant system 11 games unique particular system board could swapped another game system 11 succeeded system 12 design although system 11 technically inferior sega model 2 arcade board lower price made attractive prospect smaller arcades according june 1995 issue edge psx based
[ 450, 6330, 2177, 7962, 7514, 4761, 6621, 4408, 481, 5055, 746, 7014, 4718, 602, 2873, 424, 253, 4368, 1237, 4011, 4911, 4748 ]
Test
5,447
3
Scalability:scalability scalability property system handle growing amount work adding resources system economic context scalable business model implies company increase sales given increased resources example package delivery system scalable packages delivered adding delivery vehicles however packages first pass single warehouse sorting system would scalable one warehouse handle limited number packages computing scalability characteristic computers networks algorithms networking protocols programs applications example search engine must support increasing numbers users number topics indexes incident command system ics emergency management system used across emergency response agencies united states ics scale resource coordination single-engine roadside brushfire interstate wildfire first resource scene establishes command authority order resources delegate responsibility managing five seven officers delegate seven incident grows incident expands senior officers assume command scalability measured multiple dimensions resources fall two broad categories horizontal vertical scaling horizontally out/in means adding nodes removing nodes system adding new computer distributed software application example might involve scaling one web server three high-performance computing applications seismic analysis biotechnology workloads scaled horizontally support tasks would required expensive supercomputers workloads large social networks exceed capacity largest supercomputer handled scalable systems exploiting scalability requires software efficient resource management maintenance scaling vertically up/down means adding resources removing resources single node typically involving addition cpus memory storage single computer larger numbers elements increases management complexity sophisticated programming allocate tasks among resources handle issues throughput latency across nodes applications scale horizontally note network function virtualization defines terms differently scaling out/in ability scale add/remove resource instances e.g virtual machine whereas scaling up/down ability scale changing allocated resources e.g memory/cpu/storage capacity scalability databases requires database system able perform additional work given greater hardware resources additional servers processors memory storage workloads continued grow demands databases followed suit algorithmic innovations include row-level locking table index partitioning architectural innovations include shared nothing shared everything architectures managing multi-server configurations context scale-out data storage scalability defined maximum storage cluster size guarantees full data consistency meaning ever one valid version stored data whole cluster independently number redundant physical data copies clusters provide lazy redundancy updating copies asynchronous fashion called 'eventually consistent type scale-out design suitable availability responsiveness rated higher consistency true many web file hosting services web caches want latest version wait seconds propagate classical transaction-oriented applications design avoided many open source even commercial scale-out storage clusters especially built top standard pc hardware networks provide eventual consistency idem nosql databases like couchdb others mentioned write operations invalidate copies often n't wait acknowledgements read operations typically n't check every redundant copy prior answering potentially missing preceding write operation large amount metadata signal traffic would require specialized hardware short distances handled acceptable performance i.e act like non-clustered storage device database whenever strong data consistency expected look indicators indicators eventually consistent designs suitable transactional applications often advised focus system design hardware scalability rather capacity typically cheaper add new node system order achieve improved performance partake performance tuning improve capacity node handle approach diminishing returns discussed performance engineering example suppose 70 program sped parallelized run multiple cpus instead one formula_1 fraction calculation sequential formula_2 fraction parallelized maximum speedup achieved using p processors given according amdahl law substituting value example using 4 processors get double compute power 8 processors get doubling processing power improved speedup roughly one-fifth whole problem parallelizable speed would also double therefore throwing hardware necessarily optimal approach context high performance computing two common notions scalability
[ 6069, 6415, 4298, 5371, 6085, 1826, 22, 4318, 7538, 5042, 6817, 7549, 1481, 1112, 5409, 2961, 6484, 7213, 3667, 2969, 6855, 4742, 2266, 6505, 7232, 7958, 1522, 2984, 7238, 4031, 7979, 1546, 4049, 1550, 4069, 4430, 3396, 3041, 7290, 1586, ...
Test
5,448
9
Krypton_(programming_language):krypton programming language krypton styled krypton frame-based computer programming language
[]
Test
5,449
2
Privilege_(computing):privilege computing computing privilege defined delegation authority perform security-relevant functions computer system privilege allows user perform action security consequences examples various privileges include ability create new user install software change kernel functions users delegated extra levels control called privileged users lack privileges defined unprivileged regular normal users privileges either automatic granted applied automatic privilege exists requirement permission perform action example systems people required log system use logging require privilege systems implement file protection ms-dos essentially give unlimited privilege perform action file granted privilege exists result presenting credential privilege granting authority usually accomplished logging system username password username password supplied correct user granted additional privileges privilege applied either executed program issuing request advanced privileges running program apply additional privileges example user applying additional privileges provided sudo command run command root user kerberos authentication system modern processor architectures multiple cpu modes allows os run different privilege levels processors two levels user supervisor i386+ processors four levels 0 3 least privileges tasks tagged privilege level resources segments pages ports etc privileged instructions tagged demanded privilege level task tries use resource execute privileged instruction processor determines whether permission protection fault interrupt generated prevents user tasks damaging os computer programming exceptions related privileged instruction violations may caused array accessed bounds invalid pointer dereferenced invalid memory location referenced privileged location one controlling device input/output particularly likely occur programming languages c use pointer arithmetic check array bounds automatically unix-like systems superuser commonly known 'root owns privileges ordinary users granted enough permissions accomplish common tasks unix systems built-in security features users set new user account administrative procedures user “ root ” special user something called super-user anything system high degree power necessary fully administer unix system also allows user make mistake cause system problems unprivileged users usually windows nt-based systems privileges delegated varying degrees delegations defined using local security policy manager secpol.msc following abbreviated list default assignments windows defines number administrative privileges assigned individually users and/or groups account user holds privileges granted either directly indirectly group memberships upon installation number groups accounts created privileges granted however grants changed later time though group policy unlike linux privileges implicitly permanently granted specific account administrative privileges e.g taking ownership restoring arbitrary files powerful used malicious intent could allow entire system compromised user account control default since windows vista windows strip user token privileges login thus user logs account broad system privileges he/she still running system privileges whenever user wants perform administrative actions requiring system privileges he/she elevated process launching elevated process user made aware his/her administrative privileges asserted prompt requiring his/her consent holding privileges actually required keeping principle least privilege elevated processes run full privileges user full privileges system even privileges user may still required particular process thus completely least privilege dos-based windows windows 98 windows 95 previous versions non-nt windows operated fat filesystem support filesystem permissions. therefore privileges effectively defeated windows nt-based systems use ntfs file system names used windows source code end either privilege logonright led confusion full set rights privileges called microsoft currently uses term user rights past terms also used microsoft privilege rights logon user rights nt-rights
[ 6256, 1534, 5814, 2390, 123, 7827, 1473, 3967, 5305, 2304, 6646, 3726, 6380, 4261, 7570, 2503, 2424, 952, 1047, 5962, 6148, 1512, 4913, 6501, 6242, 7230 ]
Test
5,450
2
NeXT:next next inc. later next computer inc. next software inc. american computer software company founded 1985 apple computer co-founder steve jobs name usually pronounced next based redwood city california company developed manufactured series computer workstations intended higher education business markets next founded jobs fired apple along several co-workers next introduced first next computer 1988 smaller nextstation 1990 next computers experienced relatively limited sales estimates 50,000 units shipped total nevertheless innovative object-oriented nextstep operating system development environment interface builder highly influential first major outside investment ross perot invested seeing segment next entrepreneurs 1987 invested 20 million exchange 16 percent next stock subsequently joined board directors 1988 next later released much nextstep system programming environment standard called openstep next withdrew hardware business 1993 concentrate marketing openstep mach openstep implementation several original equipment manufacturers oems next also developed webobjects one first enterprise web application frameworks webobjects never became popular initial high price 50,000 remains prominent early example web server based dynamic page generation rather static content apple purchased next 1997 429 million equivalent million 1.5 million shares apple stock part agreement steve jobs chairman ceo next software returned apple company co-founded 1976 founder promised merge software next apple hardware platforms eventually resulting macos ios watchos tvos operating systems completely based upon nextstep openstep foundation 1985 apple co-founder steve jobs led apple supermicro division responsible development macintosh lisa personal computers macintosh successful university campuses partly apple university consortium allowed students institutions buy computers discount consortium earned 50 million computers february 1984 chairman jobs visited university departments faculty members sell macintosh jobs met paul berg nobel laureate chemistry luncheon held silicon valley honor françois mitterrand president france berg frustrated expense teaching students recombinant dna textbooks instead wet laboratories used testing analysis chemicals drugs materials biological matter wet labs prohibitively expensive lower-level courses complex simulated personal computers time berg suggested jobs use influence apple create 3m computer workstation higher education featuring least one megabyte random-access memory ram megapixel display megaflops performance hence name 3m jobs intrigued berg concept workstation contemplated starting higher education computer company fall 1985 amidst increasing turmoil apple jobs division release upgraded versions macintosh much macintosh office system result sales plummeted apple forced write millions dollars unsold inventory apple chief executive officer ceo john sculley ousted jobs day-to-day role apple replacing jean-louis gassée 1985 later year jobs began power struggle regain control company board directors sided sculley jobs took business visit western europe soviet union behalf apple several months sidelined jobs resigned apple september 13 1985 told board leaving set new computer company would taking several apple employees supermicro division also told board new company would compete apple might even consider licensing designs back market macintosh brand jobs named new company next inc. number former apple employees followed next including joanna hoffman bud tribble george crow rich page susan barnes susan kare dan l lewin consulting major educational buyers around country including follow-up meeting paul berg tentative specification workstation drawn designed powerful enough run wet lab simulations cheap enough college students use dormitory rooms specifications finished however apple sued next nefarious schemes take advantage cofounders insider information jobs remarked hard think 2 billion company 4,300-plus people could n't compete six people blue jeans suit eventually dismissed trial 1986 jobs recruited famous graphic designer paul rand create brand identity costing 100,000 jobs recalled asked would come options said 'no solve problem pay ’ use solution want options go talk people rand created 20-page brochure detailing brand including precise angle used logo 28° new company name spelling next next changed business plan mid-1986 company decided develop computer hardware software instead low-end workstation team led avie tevanian joined company working one mach kernel engineers carnegie mellon university develop nextstep operating system hardware division led rich page — one cofounders previously led apple lisa team — designed developed hardware next first factory completed fremont california 1987 capable producing 150,000 machines per year next first workstation officially named next computer although widely termed cube distinctive case 1 ft magnesium cube designed apple iic case designer frogdesign accordance edict jobs original design team anticipated releasing computer us 3,000 spring 1987 ready sale summer year next computer received standing ovations revealed lavish invitation-only gala event next introduction — introduction next generation computers education louise m. davies symphony hall san francisco california wednesday october 12 1988 following day selected educators software developers invited 100 registration fee attend first public technical overview next computer event called next day held san francisco hilton event gave developers interested developing next software insight software architecture object-oriented programming developing next computer luncheon speaker steve jobs first machines tested 1989 next started selling limited numbers universities beta version nextstep operating system installed initially next computer targeted u.s. higher education establishments base price 6,500 machine widely reviewed magazines generally concentrating hardware asked upset computer debut delayed several months jobs responded late computer five years ahead time next computer based new 25 mhz motorola 68030 central processing unit cpu motorola 88000 risc chip originally considered available sufficient quantities included 8 64 mb random-access memory ram 256 mb magneto-optical mo drive 40 mb swap-only 330 mb 660 mb hard disk drive 10base2 ethernet nubus 17-inch megapixel grayscale display measuring 1120 832 pixels 1989 typical new pc macintosh amiga computer included megabytes ram 640×480 16-color 320x240 4000-color display 10 20 megabyte hard drive networking capabilities also first computer ship general-purpose dsp chip motorola 56001 motherboard used support sophisticated music sound processing including music kit software magneto-optical drive manufactured canon inc. used primary mass storage device drives relatively new market next first computer use cheaper hard drives blank media especially though cost 150 canon jobs negotiations saw canon agree retail 50 apiece slower average seek time 96 ms design made impossible move files computers without network since next computer one mo drive disk could removed without shutting system storage options proved challenging first next computers magneto-optical media relatively expensive performance reliability problems despite faster floppy drive drive sufficient run primary medium running nextstep operating system terms speed capacity 1989 next struck deal former compaq reseller businessland sell next computers select markets nationwide selling retailer major change next original business model selling directly students educational institutions businessland founder david norman predicted sales next computer would surpass sales compaq computers 12 months 1989 canon invested us 100 million next giving 16.67 percent stake making next worth almost 600 million canon invested next condition would able use nextstep environment workstations would mean greatly expanded market software next exited hardware business canon produced line pcs called object.station including models 31 41 50 52 specifically designed run nextstep/intel canon also served next distributor japan next computers first released retail market 1990 9,999 next original investor ross perot resigned board directors june 1991 dedicate time perot systems plano texas-based systems integrator next released second generation workstations 1990 new range included revised next computer renamed nextcube nextstation nicknamed slab pizza box case form-factor jobs explicit ensuring next staff use latter terminology lest next machines compared competing sun workstations already nickname magneto-optical drive replaced 2.88 mb floppy drive 2.88 mb floppy disks expensive technology supplant 1.44 mb floppy realizing next utilized cd-rom drive eventually became industry standard storage color graphics available nextstation color nextdimension graphics processor hardware nextcube new computers cheaper faster predecessors new motorola 68040 processor 1992 next launched turbo variants nextcube nextstation 33 mhz 68040 processor maximum ram capacity increased 128 mb next sold 20,000 computers 1992 next counted upgraded motherboards back order system sales — small number compared competitors however company reported sales 140 million year encouraging canon invest 30 million keep company afloat total 50,000 next machines sold including thousands super secret national reconnaissance office located chantilly virginia next long-term aim migrate risc reduced instruction set computing architecture processor design strategy intended increase performance project known next risc workstation nrw initially nrw based motorola 88110 processor due lack confidence motorola commitment 88000-series architecture later redesigned around dual powerpc 601s next produced motherboards enclosures exited hardware business full production next computers delivered mathematica pre-installed several developers used next platform write pioneering programs tim berners-lee used next computer 1990 create first web browser web server accordingly next instrumental development world wide web next used professors scientific engineering applications developing finished newspaper layouts using news george mason university early 1990s set next workstations publishing well silicon graphics cad/gl mathematica astrophysics games doom quake developed id software next machines games based doom engine heretic raven software well strife rogue entertainment also developed next hardware using id tools commercial programs released next computers including altsys virtuoso vector drawing program page-layout features ported mac os microsoft windows aldus freehand v4 lotus improv spreadsheet program systems bundled number smaller built-in applications merriam-webster collegiate dictionary oxford quotations complete works william shakespeare digital librarian search engine access next started porting nextstep operating system ibm pc compatible computers using intel 80486 processor late 1991 change business strategy withdraw hardware business entirely demonstration port displayed nextworld expo january 1992 mid-1993 product complete version 3.1 also known nextstep 486 released prior release chrysler planned buy 3,000 copies 1992 nextstep 3.x later ported pa-risc sparc-based platforms total four versions nextstep/next next 68k black boxes nextstep/intel nextstep/pa-risc nextstep/sparc although ports widely used nextstep gained popularity institutions first chicago nbd swiss bank corporation o'connor company organizations owing programming model used many american federal agencies united states naval research laboratory national security agency advanced research projects agency central intelligence agency national reconnaissance office ibm pc clone vendors offered somewhat customized hardware solutions delivered running nextstep intel elonex nextstation canon object.station 41 next withdrew hardware business 1993 company renamed next software inc consequently 300 540 staff employees laid next negotiated sell hardware business including fremont factory canon later pulled deal work powerpc machines stopped along hardware production ceo sun microsystems scott mcnealy announced plans invest 10 million 1993 use next software future sun systems next partnered sun create openstep nextstep application layer hosted third party operating system exiting hardware business next focused operating systems effect returning original business plan new products based openstep released including openstep enterprise version microsoft windows nt company launched webobjects platform building large-scale dynamic web applications many large businesses including dell disney worldcom bbc used webobjects short time eventually webobjects used solely power apple itunes store corporate website discontinuing apple computer announced intention acquire next december 20 1996 apple paid 429 million cash went initial investors 1.5 million apple shares went steve jobs deliberately given cash part deal main purpose acquisition use nextstep foundation replace dated classic mac os instead beos in-development copland deal finalized february 7 1997 bringing jobs back apple consultant later appointed interim ceo 2000 jobs took ceo position permanent assignment holding position resignation august 24 2011 jobs died six weeks later october 5 2011 complications relapsed pancreatic neuroendocrine tumor several next executives replaced apple counterparts steve jobs restructured company board directors next five years nextstep operating system ported powerpc architecture time intel port openstep enterprise toolkit windows produced operating system code named rhapsody toolkit development platforms called yellow box backwards compatibility apple added blue box rhapsody allowing existing mac applications run self-contained cooperative multitasking environment server version new operating system released mac os x server 1.0 1999 first consumer version mac os x 10.0 2001 openstep developer toolkit renamed cocoa rhapsody blue box renamed classic environment changed run applications full-screen without requiring separate window apple included updated version original macintosh toolbox called carbon gave existing mac applications access environment without constraints blue box nextstep interface features used mac os x including dock services menu finder column view cocoa text system nextstep processor-independent capabilities retained mac os x leading powerpc intel x86 versions although powerpc versions publicly available 2006 apple moved intel processors august 2006 jobs created different corporate culture next terms facilities salaries benefits jobs experimented structural changes apple next abandoned conventional corporate structures instead making community members instead employees two different salaries next early 1990s team members joined 1986 paid 75,000 joined afterwards paid 50,000 caused awkward situations managers paid less employees employees given performance reviews raises every six months spartan salary plans foster openness employees full access payrolls although employees ever took advantage privilege next health insurance plan offered benefits married couples unmarried couples same-sex couples although latter privilege later withdrawn due insurance complications payroll schedule also different companies silicon valley time instead getting paid twice month arrears end pay period employees would get paid month advance beginning words jobs found office space palo alto california 3475 deer creek road occupying glass concrete building featured staircase designed architect i. m. pei first floor used hardwood flooring large worktables workstations would assembled avoid inventory errors next used just-in-time jit inventory strategy company contracted major components mainboards cases finished components shipped first floor assembly second floor office space open floor plan enclosed rooms jobs office conference rooms next expanded office space needed company rented office 800 900 chesapeake drive redwood city also designed pei architectural centerpiece floating staircase visible supports open floor plan retained although furnishings became luxurious 5,000 chairs 10,000 sofas ansel adams prints next first campus palo alto subsequently occupied sap ag second campus redwood city occupied apnicure oncomed pharmaceuticals inc first issue nextworld magazine printed 1991 published san francisco integrated media edited michael miley later dan ruby mainstream periodical discuss next computers operating system next software publication discontinued 1994 four volumes nextworld expo followed developer conference held 1991 1992 san francisco civic center 1993 1994 moscone center san francisco steve jobs keynote speaker though profitable company wide-ranging impact computer industry object-oriented programming graphical user interfaces became common 1988 release nextcube nextstep technologically successful platform often held trendsetter companies started emulate success next object-oriented system widely seen response next microsoft announced cairo project 1991 cairo specification included similar object-oriented user interface features coming consumer version windows nt although cairo ultimately abandoned elements integrated projects 1994 microsoft next collaborating windows nt port openstep never released 1993 taligent considered press competitor objects operating systems even without product release next main point comparison first years taligent theoretical newness often compared next older mature commercially established platform taligent debut release 1995 called little late especially compared next webobjects failed achieve wide popularity partly initial high price us 50,000 remains first prominent early example web application server enabled dynamic page generation based user interactions opposed static content webobjects bundled macos server xcode
[ 6788, 6085, 7890, 2202, 4320, 4690, 734, 5752, 405, 3649, 6125, 6467, 2954, 4355, 6847, 4003, 6142, 2609, 5786, 5787, 3674, 1897, 2261, 4376, 87, 4749, 7601, 1154, 1522, 5097, 5100, 5101, 6165, 7618, 5109, 3001, 7259, 2294, 120, 3705, 1...
Test
5,451
7
Seeks:seeks seeks free open-source project licensed affero general public license version 3 agplv3 exists create alternative current market-leading search engines driven user concerns rather corporate interests original manifesto created emmanuel benazera sylvio drouin published october 2006 project active development april 2014 stable releases engine revisions source code available public use september 2011 seeks innovation award open world forum innovation awards seeks source code updated since april 28 2014 seeks nodes usable since february 6 2016 seeks aims give control ranking results users search algorithms often less accurate humans relies distributed collaborative filter let users personalize share preferred results search also openness source code users verify modify collaborative filter fit needs currently seeks used three main forms
[ 6025, 5342, 5571, 80, 2530, 578, 876 ]
Test
5,452
4
Kaspersky_Lab:kaspersky lab kaspersky lab russian лаборатория касперского laboratoriya kasperskogo multinational cybersecurity anti-virus provider headquartered moscow russia operated holding company united kingdom founded 1997 eugene kaspersky natalya kaspersky alexey de-monderik eugene kaspersky currently ceo kaspersky lab develops sells antivirus internet security password management endpoint security cybersecurity products services kaspersky expanded abroad 2005–2010 grew 698 million annual revenues 2017 8 2016 though annual revenues 8 north america due u.s. government security concerns 2016 software 400 million users largest market-share cybersecurity software vendors europe kaspersky lab ranks fourth global ranking antivirus vendors revenue first russian company included rating world leading software companies called software top 100 79th list 6/29/2012 kaspersky lab ranked 4th endpoint security segment according idc data 2010 according gartner kaspersky lab currently third largest vendor consumer security software worldwide fifth largest vendor enterprise endpoint protection kaspersky lab named leader gartner magic quadrant endpoint protection platforms kaspersky global research analysis team great led discovery sophisticated espionage platforms conducted nations equation group stuxnet worm various covert government-sponsored cyber-espionage efforts uncovered research kaspersky also publishes annual global security risks survey 2014 kaspersky research hubs analyze 350,000 malware samples per day kaspersky faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer american national security agency contractor via kaspersky antivirus software kaspersky denied allegations reporting software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland first version kaspersky lab antivirus software developed eugene kaspersky 1989 response cascade virus early versions 40 virus definitions mostly distributed friends family members eugene continued developing software kami resulting antiviral toolkit pro avp product released 1992 popularized 1994 competitive analysis hamburg university gave eugene software first place 1997 eugene kaspersky wife natalya kaspersky alexey de-monderik left kami form kaspersky lab continue developing antivirus product called avp product renamed kaspersky anti-virus american company registered avp trademark us 1998 taiwanese student released virus called cih first three weeks outbreak kaspersky lab avp software time able remove increased demand led deals antivirus companies japan finland germany integrate avp software according wired kaspersky software advanced time example first software monitor viruses isolated quarantine company revenue grew 280 percent 1998 2000 60 percent revenue coming foreign sales natalya worked broker deals abroad localize software opened offices uk poland holland china later expanded germany france us japan 2000 company 65 employees sales 40 countries kaspersky opened new offices south east asia middle east 2008 south africa 2009 also expanded india middle east africa 2010 2009 retail sales kaspersky lab antivirus products reached almost 4.5 million copies per year 2011 general atlantic bought 20 percent share kaspersky lab 200 million expectation helping company go public months later decision made keep firm private kaspersky re-purchased shares general atlantic followed numerous executive departures 2011 2014 regarding disputes going public eugene management style january 1 2012 kaspersky lab officially left business software alliance bsa sopa bsa supported controversial anti-piracy bill kaspersky lab support stating believe measures used contrary modern advances technology needs consumers show disapproval announced intent leave december 5 2011 2013 company unaudited 667 million annual revenues 2014 kaspersky lab signed distribution deal ingram micro significantly expanded reseller program august 2015 two former kaspersky employees alleged company introduced modified files virustotal antivirus database trick software kaspersky competitors triggering false positives virus malware scans possible motive eugene allegedly furious competitors perceived unfairly free-riding kaspersky malware discoveries via open-source virustotal database company denied allegations personal blog eugene kaspersky compared accusations unsubstantiated conspiracy theories reuters followed publishing leaked emails allegedly kaspersky alluding falsies rubbing foreign competitors kaspersky lab stated emails may legitimate obtained anonymous sources hidden agenda 2016 kaspersky executive ruslan stoyanov arrested russian authorities charges predating work kaspersky 2019 convicted treason kaspersky lab develops markets antivirus internet security password management endpoint security cybersecurity products services fourth fifth largest endpoint security vendor third largest consumer security software company sixth largest overall security company revenues 15 percent russian companies domestically one-third european organizations one-fourth u.s. organizations software 400 million users kaspersky consumer software include antivirus internet security total security products antivirus software includes malware protection monitors pc suspicious program behavior warns users potentially dangerous websites internet security software adds privacy features parental controls anti-phishing tools total security adds parental controls adult website filters diagnostic tools password manager application features kaspersky software available macs pcs android ios windows mobile blackberry symbian businesses company markets kaspersky endpoint security business suite includes centralized user interface management application called kaspersky security center cybersecurity software called kaspersky security network kaspersky administration kitsecurity center manages configuration installation remote use business suite also quarantine reporting features software product businesses 25 staff less called kaspersky small office security ksos within suite products specifically virtualization security mobile security fraud protection among others kaspersky also develops free tool helps businesses gain access windows devices infected ransomware kaspersky anti-virus engine also powers products solutions security vendors check point bluecoat juniper networks microsoft forefront netintelligence clearswift frontbridge netasq wedge networks others altogether 120 companies licensing technology kaspersky lab kaspersky lab also number partnerships various technology companies international multilateral partnership cyber threats datuk mohd noor amin acts chairman announced appointment harry cheung – managing director kaspersky lab apac – goodwill ambassador greater china kaspersky lab runs several global sponsorships example scuderia ferrari racing team geographical expeditions according pc magazine kaspersky antivirus competitor bitdefender consistently ranked top independent competitive tests pc magazine malware phishing tests similar results praised software bonus security tools cons magazine said took longer-than-expected complete scan magazine said kaspersky total security product impressive feature list praised extra features total security product like password management encryption parental controls pc magazine said product scored highly lab tests antivirus antiphishing features so-so scores antimalware tests n't able catch spam kaspersky 2013 endpoint security windows product top-ranked enterprise antivirus software competitive test dennis technology labs followed symantec endpoint protection av-comparatives awarded kaspersky product year 2015 based number high scores gotten throughout year wide range tests pc magazine praised software features said lacked policy management deployment options kaspersky parental controls software reviewed pc magazine reviewer said well-rounded affordable parental control monitoring praised software content filtering child profiles social media monitoring features criticize features available ios android anti-virus software testing group av-comparatives gave windows xp version kaspersky av advanced+ rating highest february 2008 on-demand detection test fourth highest detection rate among 16 products tested however retrospective/proactive test may 2008 kaspersky received standard rating detecting 21 new malware 1-month old signatures receiving substantial amount false positives firewall included kaspersky internet security 7.0 got good rating matousec firewall challenge result 85 kaspersky anti-virus 7.0 achieved 6.5 result 8 anti malware labs rootkit detection test also achieved 31 33 detection polymorphic viruses 97 result self-protection test 2007 kaspersky internet security 7 received award british magazine pc pro also place list kaspersky passed virus bulletin comparative tests since august 2003 2005 according pc world magazine kaspersky anti-virus software provided fastest updates new virus security threats industry pc world magazine march 2010 comparison consumer security suites kaspersky internet security 2010 scored 4.5/5 stars rated second overall december 2011 version av-comparatives annual reports kaspersky lab software achieved highest overall ranking earned av comparatives product year award 1 february 2012 kaspersky internet security earned av-test award best repair 2011 award field home user products av-test institute 28 january 2013 kaspersky endpoint security earned av-test award best protection 2012 av-test award best repair 2012 awards field corporate products av-test institute later 2013 kaspersky earned product year award av-comparatives highest score among enterprise solutions dennis technology labs report kaspersky also received certification products oesis ok certification program verifies applications interoperable third-party technology solutions like nac ssl vpn products cisco systems juniper networks f5 networks others kaspersky lab global research analysis team great established 2008 investigates cybersecurity threats work malware operations security companies often evaluated ability uncover previously unknown viruses vulnerabilities kaspersky reputation investigating cyber-security threats influential gaining sales prestige beginning around 2010 kaspersky exposed series government-sponsored cyber-espionage sabotage efforts include stuxnet duqu flame gauss regin equation group according wired many seemingly launched us uk israeli allies kaspersky especially well-known work uncovering stuxnet flame 2010 kaspersky lab worked microsoft counter-act stuxnet worm infected 14 industrial locations iran using four zero-day vulnerabilities microsoft windows according ieee spectrum circumstances strongly suggest worm developed united states israel damage centrifuges iran nuclear-enrichment program first discovery major government-sponsored cyber-attack may 2012 kaspersky lab identified malware flame researcher described potentially sophisticated cyber weapon yet unleashed according researchers kaspersky lab malware infected estimated 1,000 5,000 machines worldwide asked united nations international telecommunications union investigate reports virus affecting iranian oil ministry computers kaspersky lab investigated discovered md5 hash filename appeared customer machines middle eastern nations discovering pieces researchers dubbed program flame name one modules flame earlier variant stuxnet kaspersky never verified source software suspected developed national security agency nsa transmit keystrokes skype calls data kaspersky created algorithms find similar malware found gauss july collected transmitted data devices infected bluetooth usb drives january 2013 kaspersky discovered red october malware used widespread cyber-espionage five years targeted political targets like embassies nuclear sites mostly europe switzerland north america malware likely written russian-speaking hackers exploits chinese hackers june kaspersky discovered nettraveler said obtaining data emerging technology government targets oil companies kaspersky identify behind similar cyber-espionage coming beijing china later year kaspersky discovered hacker group called icefog investigating cybersecurity attack japanese television company kaspersky said hacker group possibly china unique targeted specific files seemed know planting malware extract february 2014 kaspersky identified malware mask infected 380 organizations 31 countries many organizations affected morocco files spanish group believed nation-state conducting espionage kaspersky speculate country may developed november 2014 symantec kaspersky authored papers contained first disclosure malicious software named regin according kaspersky regin similar qwerty malware program discovered next year regin used take remote control computer believed originated five eyes alliance month kaspersky reported darkhotel attack targeted users wireless networks hotels asia asked users update software downloaded malware gave passwords 2015 kaspersky identified highly sophisticated threat actor called equation group group incorporated sophisticated spying software firmware hard drives banks government agencies nuclear researchers military facilities countries frequent targets us intelligence efforts suspected developed national security agency nsa included many unique technical achievements better avoid detection day kaspersky announced discovery hacker group called carbanak targeting banks moving millions dollars fake accounts carbanak discovered one bank asked kaspersky investigate suspicious behavior atms similar malware using techniques carbanak discovered 2016 dubbed carbanak 2.0 june 2015 kaspersky reported network infiltrated government-sponsored malware evidence suggested malware created developers duqu stuxnet order get intelligence would help better avoid detection kaspersky future kaspersky called duqu 2.0 malicious software resided memory avoid detection hack believed done group duqu 2011 used exploits microsoft installer files june 2015 kaspersky lab citizen lab independently discovered software developed hacking team used 60 governments around world covertly record data mobile phones citizens software gave police enforcement menu features access emails text messages keystrokes call history data kaspersky also identified 37,000 attacks banking companies used modifications malware called asacub took control android devices asacub targeted mostly banking customers u.s. russia ukraine using sms message baited users installing trojan 2016 kaspersky discovered zero day vulnerability microsoft silverlight kaspersky identified string code often used exploits created suspected author used yara rules network kaspersky software users find string code uncover rest exploit afterwards microsoft issued critical software patch protect software vulnerability 2016 kaspersky uncovered poseidon group would infiltrate corporations malware using phishing emails get hired company security firm correct problem hired poseidon would install additional malware backdoors june 2016 kaspersky helped uncover russian hacking group leading 50 arrests since 2015 kaspersky alleged close ties russian government various western media outlets finally us government 2017 president trump signed legislation ban software kaspersky government computers us government institutions prohibited buying installing kaspersky software computers devices
[ 6797, 385, 1838, 4689, 2209, 3637, 7193, 5066, 1500, 7597, 88, 6508, 91, 4025, 4759, 7244, 104, 2642, 2644, 6526, 113, 1931, 476, 2296, 4783, 3713, 496, 5144, 142, 7660, 8014, 3047, 4449, 4456, 6589, 5187, 4115, 3089, 4492, 4138, 910, ...
Validation
5,453
2
Linux_range_of_use:linux range use linux kernel-based operating systems widely adopted wide range uses advantages benefits free open-source software apply linux kernel rest system software common human interface devices hids available desktop computers laptops similar devices determine design graphical human-computer interface implemented software software packages choose among building accordingly designed graphical user interface generic input driver linux kernel evdev several input methods implemented middleware i.e. atop part linux kernel adoption proving linux kernel suitable gaming platform course added software needed either augment typical desktop installation suitable gaming platform create linux-based operating system dedicated gaming platform abundance server software cf client–server model supporting various communications protocols http web server smtp mail transfer agents pop3 imap e-mail server lightweight directory access protocol ldap server message block smb-cifs samba simple network management protocol snmp system network monitoring session initiation protocol sip various routing protocols run partly exclusively linux kernel software bundles also called solution stacks widely adopted acronyms become well known examples include dynamic web pages cloud computing three types virtualization hardware-based software-based paravirtualization implemented projects run linux linux-exclusive linux kernel customized adapted hardened various scenarios especially operation bastion host already mainlined developed maintained out-of-tree linux kernel-based operating systems still employed routing servers server computers commodity hardware cases professional routing equipment cisco catalyst either overkill costly components linux kernel netfilter linux network scheduler along available free open-source routing daemons bird internet routing daemon bird b.a.t.m.a.n. quagga xorp fulfill task well low-cost low-performance routing performed wireless routers running openwrt anonymity routing solution tor cross-platform exclusive linux components linux kernel logical volume manager lvm well suited support computer clusters also software managing clusters e.g. pacemaker linux-ha drbd ovirt openqrm ganeti eucalyptus appscale opennebula single system image multi system image clusters least linuxpmi openssi open-sharedroot diskless shared-root cluster kerrighed available three solutions operating-system-level virtualization linux-vserver lxc openvz offer similarities freebsd jails solaris containers linux operating systems runs virtualized xen micro-kernel-type hypervisor published license linux kernel gnu gpl 2.0 kvm possible turn linux kernel hypervisor managing libvirt libguestfs several utilities building programs openstack controller nodes run exclusively linux compute nodes cross-platform software projects serving similar use-case openstack nimbus ganeti appscale opennebula eucalyptus openqrm one best known linux-based operating systems mobile devices smartphones android operating system android employs modified linux kernel combines libbionic instead glibc surfaceflinger display server replacements specifically written purpose many mobile devices touchscreen sole human interface device hid gui partly middleware operating system adapted enable software designers create according human-computer interface linux kernel gained wide use operating systems used embedded systems real-time non-real-time variants patches exist transform linux kernel real-time kernel termed real-time operating system rtos several actively maintained minimally operating system includes less modified linux kernel uclibc busybox non-rtos variants exist openwrt also linux distribution use customer-premises equipment cpe devices like wireless routers rockbox based μclinux operating system portable media players fastest supercomputers decade since earth simulator used linux linux also ran first teraflops supercomputer asci red 1997 ibm roadrunner 2008 first petascale computer 500 100 world fastest supercomputers run operating system based linux kernel world ’ fastest supercomputer china ’ sunway taihulight powered colossal 650,000+ cpus runs customised version linux called ‘ sunway raiseos ’ processing speed 93 petaflops
[ 1807, 362, 3256, 2182, 3938, 3613, 6422, 7528, 3271, 7170, 7532, 2559, 1100, 5744, 6443, 740, 2219, 2942, 7555, 6117, 4341, 5762, 412, 5064, 415, 2240, 2601, 2961, 3666, 2970, 83, 7956, 5803, 5460, 7242, 462, 1535, 1924, 6892, 4400, 117...
Test
5,454
4
Suricata_(software):suricata software suricata open source-based intrusion detection system ids intrusion prevention system ips developed open information security foundation oisf beta version released december 2009 first standard release following july 2010 third-party tools available snort compatible suricata like following
[ 6115, 3368, 4759, 5571, 3219, 4100, 5001, 5506, 3680, 578, 1435, 2466, 4590 ]
Test
5,455
1
Bigtable:bigtable bigtable compressed high performance proprietary data storage system built google file system chubby lock service sstable log-structured storage like leveldb google technologies may 6 2015 public version bigtable made available service bigtable also underlies google cloud datastore available part google cloud platform bigtable development began 2004 used number google applications web indexing mapreduce often used generating modifying data stored bigtable google maps google book search search history google earth blogger.com google code hosting youtube gmail google reasons developing database include scalability better control performance characteristics google spanner rdbms layered implementation bigtable paxos group two-phase commits table google f1 built using spanner replace implementation based mysql bigtable one prototypical examples wide column store maps two arbitrary string values row key column key timestamp hence three-dimensional mapping associated arbitrary byte array relational database better defined sparse distributed multi-dimensional sorted map bigtable designed scale petabyte range across hundreds thousands machines make easy add machines system automatically start taking advantage resources without reconfiguration example google copy web stored bigtable row key domain-reversed url columns describe various properties web page one particular column holding page page column several timestamped versions describing different copies web page timestamped fetched cell bigtable zero timestamped versions data another function timestamp allow versioning garbage collection expired data tables split multiple tablets – segments table split certain row keys tablet hundred megabytes gigabytes size bigtable somewhat like mapreduce worker pool thousands hundreds thousands tablet shards may served hundreds thousands bigtable servers table size threaten grow beyond specified limit tablets may compressed using algorithm bmdiff zippy compression algorithm publicly known open-sourced snappy less space-optimal variation lz77 efficient terms computing time locations gfs tablets recorded database entries multiple special tablets called meta1 tablets meta1 tablets found querying single meta0 tablet typically resides server since often queried clients location meta1 tablet answer question actual data located like gfs master server meta0 server generally bottleneck since processor time bandwidth necessary discover transmit meta1 locations minimal clients aggressively cache locations minimize queries
[ 2902, 4298, 5372, 6427, 6428, 2569, 1848, 6817, 3309, 7924, 2591, 5775, 6153, 84, 4762, 7967, 6176, 5476, 831, 5141, 136, 2317, 2673, 7285, 2683, 855, 6937, 168, 6950, 5534, 2712, 2359, 1616, 4116, 8062, 6978, 901, 7346, 561, 201, 5228,...
Train
5,456
5
Path_MTU_Discovery:path mtu discovery path mtu discovery pmtud standardized technique computer networking determining maximum transmission unit mtu size network path two internet protocol ip hosts usually goal avoiding ip fragmentation pmtud originally intended routers internet protocol version 4 ipv4 however modern operating systems use endpoints ipv6 function explicitly delegated end points communications session pmtud standardized ipv4 rfc 1191 ipv6 rfc 8201 obsoleted rfc 1981 previous ipv6 pmtud standard rfc 4821 describes extension techniques works without support internet control message protocol ipv4 packets path mtu discovery works setting n't fragment df flag bit ip headers outgoing packets device along path whose mtu smaller packet drop send back internet control message protocol icmp fragmentation needed type 3 code 4 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation ipv6 routers support fragmentation consequently n't support n't fragment option ipv6 path mtu discovery works initially assuming path mtu mtu link layer interface traffic originates similar ipv4 device along path whose mtu smaller packet drop packet send back icmpv6 packet big type 2 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation path mtu changes connection set lower previously determined path mtu first large packet cause icmp error new lower path mtu found conversely pmtud finds path allows larger mtu possible lower link os periodically reprobe see path changed allows larger packets linux windows timer set default ten minutes many network security devices block icmp messages perceived security benefits including errors necessary proper operation pmtud result connections complete tcp three-way handshake correctly hang data transferred state referred black hole connection implementations pmtud attempt prevent problem inferring large payload packets dropped due mtu rather link congestion however order transmission control protocol tcp operate efficiently icmp unreachable messages type 3 permitted robust method pmtud relies tcp another protocol probe path progressively larger packets standardized rfc 4821 workaround used routers change maximum segment size mss tcp connections passing links mtu lower ethernet default 1500 known mss clamping
[ 3821, 7054, 7637, 4759, 3312, 4892, 6976, 578, 3775, 3819 ]
Test
5,457
6
Flash_file_system:flash file system flash file system file system designed storing files flash memory–based storage devices flash file systems closely related file systems general optimized nature characteristics flash memory avoid write amplification use particular operating systems block device layer emulate disk drive general-purpose file system used flash-based storage device suboptimal several reasons log-structured file systems desirable properties flash file system file systems include jffs2 yaffs particular characteristics flash memory best used either controller perform wear leveling error correction specifically designed flash file systems spread writes media deal long erase times nand flash blocks basic concept behind flash file systems flash store updated file system write new copy changed data fresh block remap file pointers erase old block later time practice flash file systems used memory technology devices mtds embedded flash memories controller removable flash memory cards usb flash drives built-in controllers manage mtd dedicated algorithms like wear leveling bad block recovery power loss recovery garbage collection error correction use flash file system limited benefit flash-based memory devices becoming prevalent number mobile devices increasing cost per memory size decreases capacity flash memory chips increases earliest flash file system managing array flash freely writable disk trueffs m-systems israel presented software product pc-card expo santa clara california july 1992 patented 1993 one earliest flash file systems microsoft ffs2 use ms-dos released autumn 1992 ffs2 preceded earlier product called ffs however fell short flash file system managing flash array write read many worm space rather freely writable disk around 1994 pcmcia industry group approved flash translation layer ftl specification based design m-systems trueffs specification authored jointly proposed m-systems scm microsystems also provided first working implementations ftl endorsed intel ftl became popular flash file system design non-pcmcia media well overlayfs unionfs aufs union filesystems allow multiple filesystems combined presented user single tree allows system designer place parts operating system nominally read-only different media normal read-write areas openwrt usually installed raw flash chips without ftl uses overlayfs combine compressed read-only squashfs jffs2
[ 3599, 2547, 7161, 4672, 3270, 6431, 3626, 2566, 5049, 6117, 759, 771, 6854, 5437, 4375, 6500, 6505, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 162...
Test
5,458
9
Electronic_circuit_simulation:electronic circuit simulation electronic circuit simulation uses mathematical models replicate behavior actual electronic device circuit simulation software allows modeling circuit operation invaluable analysis tool due highly accurate modeling capability many colleges universities use type software teaching electronics technician electronics engineering programs electronics simulation software engages user integrating learning experience kinds interactions actively engage learners analyze synthesize organize evaluate content result learners constructing knowledge simulating circuit ’ behavior actually building greatly improve design efficiency making faulty designs known providing insight behavior electronics circuit designs particular integrated circuits tooling photomasks expensive breadboards impractical probing behavior internal signals extremely difficult therefore almost ic design relies heavily simulation well known analog simulator spice probably best known digital simulators based verilog vhdl electronics simulators integrate schematic editor simulation engine on-screen waveform display see figure 1 allowing designers rapidly modify simulated circuit see effect changes output also typically contain extensive model device libraries models typically include ic specific transistor models bsim generic components resistors capacitors inductors transformers user defined models controlled current voltage sources models verilog-a vhdl-ams printed circuit board pcb design requires specific models well transmission lines traces ibis models driving receiving electronics strictly analog electronics circuit simulators popular simulators often include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient another type simulation used mainly power electronics represent piecewise linear algorithms algorithms use analog linear simulation power electronic switch changes state time new analog model calculated used next simulation period methodology enhances simulation speed stability significantly process variations occur design fabricated circuit simulators often take variations account variations small taken together change output chip significantly temperature variation also modeled simulate circuit performance temperature ranges
[ 5148, 2654, 5459, 2659, 2994, 7777, 3378, 4106 ]
Train
5,459
3
Analog_Devices:analog devices analog devices inc. adi also known simply analog american multinational semiconductor company specializing data conversion signal processing power management technology headquartered norwood massachusetts 2012 analog devices led worldwide data converter market 48.5 share according analyst firm databeans company manufactures analog mixed-signal digital signal processing dsp integrated circuits ics used electronic equipment technologies used convert condition process real-world phenomena light sound temperature motion pressure electrical signals analog devices approximately 100,000 customers following industries communications computer instrumentation military/aerospace automotive consumer electronics applications company founded two mit graduates ray stata matthew lorber 1965 year company released first product model 101 op amp hockey-puck sized module used test measurement equipment 1967 company published first issue technical magazine analog dialogue 1969 analog devices filed initial public offering became publicly traded company ten years later company listed new york stock exchange 1973 company first launch laser trim wafers first cmos digital-to-analog converter 1996 company reported 1 billion company revenue year jerald fishman named president ceo position held death 2013 see 2000 analog devices sales grew 75 2.578 billion company acquired five companies including bco technologies plc manufacturer thick film semiconductors 150 million january 2008 semiconductor completed acquisition cpu voltage pc thermal monitoring business analog devices. 184 million 2004 analog devices customer base 60,000 portfolio included 10,000 products july 2016 analog linear technology agreed analog would acquire linear approximately 14.8 billion cash stock deal analog devices headquartered norwood massachusetts regional headquarters located shanghai china munich germany limerick ireland tokyo japan analog devices fabrication plants located united states ireland company testing facility located philippines design centers located australia canada china egypt england germany india israel japan scotland spain taiwan turkey raymond stata founder analog devices responsible business strategy product roadmap founding company 1965 stata served company chairman board directors since 1973 executive officer since 1996 ceo 1973 1996 president 1971 1991 addition stata also trustee massachusetts institute technology alma mater awarded ieee founders medal 2003 stata received ee times lifetime achievement award 2008 stata served chairman semiconductor industry association year 2011 vincent roche became president ceo analog devices may 2013 first joined company 1988 marketing director limerick ireland barrie gilbert named first technology fellow analog devices 1979 addition gilbert ieee life fellow holds 65 patents gilbert best known gilbert cell – electronic multiplying mixer analog devices gilbert started company northwest labs design center oregon continued work rf products crafted high-speed nonlinear circuit techniques paul brokaw expert integrated circuit design spent career analog devices holds position analog fellow brokaw inventor many analog ic circuits including brokaw bandgap reference holds 100 patents also ieee life fellow robert adams technical fellow manager audio development analog devices inc. adams holds many patents related audio electronic field member ieee fellow audio engineering society adams received finalist ranking edn innovation innovator year award 1995 jerald g. fishman ceo president analog devices 1996 death march 2013 2004 fishman named ceo year electronic business 35-year veteran analog devices also served board directors analog devices cognex corporation xilinx analog devices products include analog signal processing digital signal processing technologies technologies include data converters amplifiers radio frequency rf technologies embedded processors digital signal processing dsp ics power management interface products data converters include analog-to-digital converters adcs digital-to-analog converters dacs convert electrical signal representations real-world analog phenomena light sound waveforms temperature motion pressure digital signals data back analog devices adc dac ics used medical systems scientific instrumentation wireless wired communications radar industrial process control audio video equipment digital-processing-based systems accurate signal conversion critical data converters account 50 adi revenue adi companion amplifier ics provide accurate high-speed precise signals driving data converters key applications digital audio current sensing precision instrumentation company data converter chips used national instruments high-precision measurement instrumentation systems data converters amplifiers also used scientists researchers project icecube – underground telescope uses digital optical modules doms detect subatomic particles south pole power management products customers industrial wireless infrastructure digital camera markets support signal chain design requirements dynamic range transient performance reliability interface products include broad range interface ic products offered company product categories controller area network digital isolators level translators lvds mobile i/o expander keyboard controller usb rs-232 amplifiers includes precision operational amplifiers instrumentation current sense differential amplifiers audio amplifiers video amplifiers/buffers/filters variable gain amplifiers comparators voltage specialty amplifiers products special linear functions radio frequency integrated circuits rfics address rf signal chain simplify rf system development company rf portfolio includes trupwr rms power detectors logarithmic amplifiers pll dds synthesizers rf prescalers variable gain amplifiers adc drivers gain blocks lnas rf amplifiers processors dsp programmable signal processing integrated circuits execute specialized software programs algorithms associated processing digitized real-time data analog devices processors dsps blackfin sharc sigmadsp tigersharc adsp-21xx precision analog microcontrollers make company embedded processing dsp portfolio multi-dsp signal processing analog devices line micro-electromechanical systems mems microphones sold business invensense 2013 analog devices mems microphones found smart phones tablet pcs security systems medical applications adi mems accelerometers designed game pad controllers microsoft logitech pellican analog devices sells linear mixed-signal mems digital signal processing technologies medical imaging patient monitoring medical instrumentation home healthcare company precision signal-processing components blackfin digital signal processors included karmelsonix wholter overnight pulmonary monitor wheezometer personal asthmatic assessment device accelerometers produced analog devices included zoll medical pocketcpr measures depth chest compressions provides audible visual feedback rescuer allow adjustment proper depth correct rate compression analog devices develops components safety systems stability control systems driver assistance systems infotainment interior applications powertrain systems hybrid electric vehicles use high-precision data conversion products battery monitoring control systems analog devices industrial market includes process control systems help drive productivity energy efficiency reliability analog devices technology consumer electronics includes signal processing circuits image processing auto focus image stabilization digital still cameras camcorders audio video processors home theater systems dvd recorders high-definition televisions advanced touch screen controllers portable media devices 2009 databeans published report top semiconductor analog suppliers analog devices named number two suppliers including texas instruments national semiconductor acquired texas instruments 2011 maxim integrated products linear technology collaborating analog devices since march 2017 competitors include infineon technologies stmicroelectronics intersil corporation 2011 analog devices third ranked analog semiconductor supplier 1967 analog devices first published analog dialogue dan sheingold took position editor two years later held four decades current editor scott wayne currently longest-running in-house publication electronics industry analog dialogue forum exchange circuits systems software real-world signal processing technical magazine published analog devices discusses products applications technology techniques analog digital mixed-signal processing analog dialogue published monthly web featured technical articles also compiled quarterly print editions 2009 analog devices announced engineerzone online technical support community engineerzone launched design engineering community customers prospects partners employees students ask questions share knowledge search answers questions open forum analog devices circuits lab reference circuits engineered tested quick system integration help solve design challenges ranging common complex reference circuits smaller modular designs broadly applicable application-specific reference designs reference circuit documented test data theory operation component selection decision criteria addition reference circuits tailored meet real-world system integration needs may also include board layout schematics cad tools models device drivers evaluation hardware
[ 1252, 6874, 5458, 6179, 3365, 2654, 5740, 4783, 7453, 7010, 2765, 6830, 5762, 6219, 6043, 4537, 972, 4106, 3756, 446 ]
Validation
5,460
3
IP_Virtual_Server:ip virtual server ipvs ip virtual server implements transport-layer load balancing usually called layer 4 lan switching part linux kernel configured via user-space utility tool ipvs incorporated linux virtual server lvs runs host acts load balancer front cluster real servers ipvs direct requests tcp- udp-based services real servers make services real servers appear virtual services single ip address ipvs built top netfilter ipvs merged versions 2.4.x newer linux kernel mainline
[ 3256, 2182, 3613, 7528, 7532, 5744, 6443, 4341, 5762, 3666, 5453, 7242, 1535, 1924, 6892, 1176, 1933, 1208, 6211, 5865, 7669, 1227, 1596, 165, 7312, 1607, 5884, 1991, 6984, 5571, 4877, 5580, 2765, 4174, 7038, 976, 5627, 3843, 3174, 6707, ...
Validation
5,461
7
Internet_OS:internet os internet operating system internet os type operating system designed run applications services internet client generally web browser advantages os would would run thin client allowing cheaper easily manageable computer systems would require applications designed cross-platform open standards would tie user applications documents preferences single computer rather place internet cloud internet os also promoted perfect type platform software service talk internet os began surface 1995 browser war started heating microsoft netscape response limited capabilities html time microsoft began developing online content authoring platform would based distributed ole object linking embedding codenamed blackbird using ole applications put web would contain processing logic would act similar applications typical desktop environment immediately concerns would tie web proprietary microsoft technology would n't guaranteed run across different systems challenge marc andreessen netscape announced set new products would help transform browser called internet os would provide tools programming interfaces new generation internet-based applications so-called internet os would still run top regular os – based around netscape navigator – dismissed desktop operating systems like windows simply bag drivers reiterating goal would turn windows mundane collection entirely debugged device drivers andreessen explained newest versions navigator web browsers suites internet applications including programs mail ftp news would come viewers variety document types like adobe acrobat apple quicktime sun java applets would give programming interfaces publishing tools developers netscape also would continue sell server software java applets would run cross-platform clients servers scripting language form javascript would also provide facilities backend transaction processing elaborating client/server model navigating clients application servers database servers pointed – broad capabilities gave browser – difference technically netscape navigator traditional operating system navigator n't include device drivers technical problems blackbird growth web saw competitive statements netscape soon led microsoft rethink strategy began position ole primary tool within netscape proposed ecosystem ole would embeddable web pages using activex plug-in would easily integrated server side using asp active server pages development opposition industry microsoft began grow concept internet os led formation alliance around developing java alternative windows – chief partners netscape sun oracle ibm companies informally referred industry press gang four novell later joined alliance leading called gang five may 1997 group published position paper discussed integration software component models within corba – commonly used architecture allowing computer applications different vendors running different systems work together networks issued several rfps request proposals object management group omg standards body responsible managing corba meant help integrate different aspects java proposals included support javabeans – serialized component architecture java – javascript called java-tization corba group positioning java distributed object architecture similar microsoft intended ole blackbird ole would exist second-class technology would interface corba using javabeans group also promoted idea javaos – minimal java-based operating system – would turn run netscape web browser browser run javabeans components would front new ecosystem based open standards first html web browser second java hoped would become widely adopted corba javaos would hosted network computer nc concept long advocated oracle nc would thin client designed internet use leaving access applications documents stored entirely online oracle saw role providing tools server layer network-hosted applications would provided network application server turn would make use oracle7 relationship database management system oracle web server oracle also outlined referred network computing architecture nca would separate presentation application data access logic java applets nca cartridges microsoft intel response challenge put forward standard competing model called netpc diskless pc would primarily adapted web browser use would run simplified version windows 95 codenamed pegasus later road idea evolved netbook microsoft publicly criticized idea internet os instead argued traditional desktop os internet-enabled beginning idea active platform internet strategy culminated later release windows 98 strategy involved tightly bundling internet explorer windows became center united states anti-trust suit microsoft gang five – netscape sun ibm oracle novell – involved lobbying anti-trust action microsoft 1998 java alliance started fall apart oracle continued developing server-side java databases given idea network computer netscape given java browser efforts instead aiming position internet portal pressure investors given blame google revived idea internet os 2009 development chrome os linux-based operating system designed work exclusively ajax-based web applications operating system designed look operate like chrome web browser sold laptops developed partners called chromebooks also promoted g suite suite web applications alternative traditional desktop software microsoft office google tried address standard criticisms internet os concept development projects google native client allows browser run intel x86 native code sandbox complex programs could run fully take advantage system hardware google gears also created allow offline access online applications although deprecated favor web storage model process standardization world wide web consortium w3c
[ 2451, 6991, 5571, 578, 330, 2243, 2961, 3495, 3915, 6950, 87, 3758 ]
Test
5,462
2
IS-DOS:is-dos is-dos disk operating system russian zx spectrum clones is-dos developed 1990 1991 iskra soft leningrad ussr handles floppy disks double sided double density hard disks cd-rom maximum is-dos partition size hard disk 16 mib unlike tr-dos is-dos ram-based operating system reduces amount memory user programs is-dos chic version developed nemo kay provides memory user programs tasis modern version developed nedopc atm turbo 2+ 2006 supports text mode high memory machine based is-dos chic
[ 2864, 6076, 7794, 2887, 7079, 3748, 3690, 5555, 5048, 1288 ]
Test
5,463
3
Macintosh_IIvx:macintosh iivx macintosh iivx personal computer designed manufactured sold apple computer inc. october 1992 october 1993 last macintosh ii family macintosh computers iivx introduced time macintosh iivi performa 600 performa 600cd four models using new metal case design like performa 600cd iivx could equipped internal double-speed cd-rom drive iivx shares model designation macintosh ii computers apple considers iivx first computer macintosh centris line according apple lawyers unable complete trademark check centris name time iivx release machines bearing centris name introduced months later iivx described macworld magazine review best price-to-performance ratio computer apple ever built list price machine hard drive main memory video memory 2,949 usd adding cd-rom upgrading main memory video memory increased price 3,219 usd deemed best cd-rom drive bargain ever offered macworld much-more-powerful macintosh centris 650 released four months iivx 250 less immediately rendering iivx obsolete iivx base price slashed third increasing competition dell pc manufacturers prices iivx continued fall quickly end june 1993 price 5/80 cd-rom configuration dropped 1,799 half original price afterwards people bought expensive mac quickly became outdated said iivx-ed mac iivx began life development proof-of-concept see internal cd-rom drive could added mac apple ceo john sculley gave speech macworld tokyo promised mac cd-rom drive iivx rushed production several shortcuts taken design notably 32 mhz processor crippled 16 mhz bus making slightly slower popular aging macintosh iici serial port limited 57.6 kbit/s could cause problems serial connections midi hardware macintosh iivi slower version iivx 16 mhz processor introduced time markets though united states discontinued four months later high-end member original performa family performa 600 also based architecture iivx macintosh ii model 32k l2 cache iivx sold hard drives ranging 40 three nubus slots processor direct slot macintosh iivx uses case macintosh performa 600 reused centris 650 later known quadra 650 upgraded machine swapping logic board iivx case also used power macintosh 7100
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 5916, 3...
Test
5,464
9
Keysight_VEE:keysight vee keysight vee graphical dataflow programming software development environment keysight technologies automated test measurement data analysis reporting vee originally stood visual engineering environment developed hp designated hp vee since officially renamed keysight vee keysight vee widely used various industries serving entire stage product lifecycle design validation manufacturing optimized instrument control automation test measurement devices data acquisition instruments like digital voltmeters oscilloscopes source devices like signal generators programmable power supplies detailed list features version found references section vee program consists multiple connected vee objects sometimes called devices vee object consists different types pins namely data pins sequence pins execute pins xeq control pins error pins data pins govern data flow propagation sequence pins determine object execution order pins left side object called input pins whereas pins right output pins two objects b connected output pin object connected object b ’ input pin several connection lines emanate single output pin one connection line attached input pin data input pins execute pins must connected whereas control pins output pins left unconnected keysight vee dataflow programming language within vee program multiple connections objects data flows objects left right sequence flows top bottom object ’ execution order determined object connections data dependency rule general object unconnected data input sequence input pin operate first object sequence input pin connected execute soon data present data inputs hand sequence input pin connected although data present data input pins object hold execution sequence input pin pinged may applicable non-primitive objects like junction collector objects example object ’ sequence output pin connected fire object executed execution possible objects descended data output pins error pin object examples taken referred explanation keysight vee connect control variety keysight non-keysight instrumentation via multiple interfaces keysight vee supports following interfaces keysight vee interact programming languages using built-in activex automation server software development programs visual basic c/c++ visual c .net compliant languages call keysight vee userfunctions keysight vee also integrated microsoft .net framework common language runtime framework class libraries provides multitude functions controls used enhance program adding email capability accessing databases access 2500 matlab analysis visualization functions made possible built-in matlab signal processing toolbox built-in microsoft excel library provides direct access save retrieve generate reports spreadsheets keysight vee notable capability deploy unlimited number runtime programs time limitations extra cost runtime programs could contain gui panel allows interaction users presumably operators execute control program test execution
[ 1908, 4759, 5571, 5117 ]
Test
5,465
4
Gated_community:gated community modern form gated community walled community form residential community housing estate containing strictly controlled entrances pedestrians bicycles automobiles often characterized closed perimeter walls fences similar walls gates separated quarters cities centuries gated communities usually consist small residential streets include various shared amenities smaller communities amenities may include park common area larger communities may possible residents stay within community daily activities gated communities type common interest development distinct intentional communities given gated communities spatially type enclave setha m. low anthropologist argued negative effect net social capital broader community outside gated community gated communities usually called guard-gated communities staffed private security guards often home high-value properties and/or set retirement villages gated communities secure enough resemble fortresses intended besides services gatekeepers many gated communities provide amenities may depend number factors including geographical location demographic composition community structure community fees collected subassociations belong master associations master association may provide many amenities general larger association amenities provided amenities also depend type housing example single-family-home communities may common-area swimming pool since individual home-owners ability construct private pools condominium hand may offer community pool since individual units option private pool installation typical amenities offered include one brazil widespread form gated community called condomínio fechado closed housing estate object desire upper classes place small town infrastructure reserve power supply sanitation security guards purpose community protect residents exterior violence philosophy seen closed buildings shopping centres many accessed inside parking lot garage pakistan gated communities located big well small cities considered standard high quality living defence housing authority bahria town major private gated community developers administrators one largest world assets bahria town worth 30 billion gated communities pakistan public parks schools hospitals shopping malls gymnasiums country clubs argentina called barrios privados literal translation private neighborhoods countries often seen symbol wealth however gated communities enjoy dubious social prestige many members middle upper middle class regard gated community dwellers nouveaux riches snobs gated communities houses bigger ones nordelta hospital school shopping mall post-segregation south africa gated communities mushroomed response high levels violent crime commonly referred complexes also broadly classified security villages large-scale privately developed areas enclosed neighborhoods newest neighborhoods developed almost entirely composed security villages malls essential services hospitals part property developers adopted response counter squatting local residents fear due associated crime often results protracted eviction process popular southern china namely pearl river delta region famous clifford estates saudi arabia gated communities existed since discovery oil mainly accommodate families europe north america threat levels increased since late 1990s foreigners general u.s. citizens particular gates become armed sometimes heavily vehicles inspected marksmen saudi arabian national guard armored vehicles appeared certain times markedly recent terrorist attacks areas near-by targeting people european north american countries gated communities rare continental europe japan proponents gated communities lesser degree cul-de-sac maintain reduction exclusion people would passing generally non-local people makes stranger much recognisable closed local environment thus reduces crime danger since small proportion non-local people passing area potential criminals increased traffic increase rather decrease safety people around whose presence could deter criminal behaviour could provide assistance incident another criticism gated communities offer false sense security studies indicate safety gated communities may illusion reality gated communities suburban areas united states less crime similar non-gated neighborhoods commentary new york times specifically blames gated communities shooting death trayvon martin columnist states gated communities churn vicious cycle attracting like-minded residents seek shelter outsiders whose physical seclusion worsens paranoid groupthink outsiders influential paper vanessa watson includes gated communities within class african urban fantasies attempts remake african cities vein dubai singapore watson analysis kind urban planning prizes exclusionary self-contained spaces limit opportunities interaction different classes worsening marginalization urban poor closed cities russia different gated communities limited number gated communities long established foreigners various regions world many gated communities argentina especially greater buenos aires suburb pilar 60 km n buenos aires city suburban areas nordelta tortugas country club first gated community developed argentina dating 1930s/1940s date 1990s liberal reforms consolidated since buenos aires traditionally regarded socially integrated city gated communities subject research sociologists gated communities important way middle upper-class people cope high levels violent criminal activity greater buenos aires although gated communities rare australia since 1980s built well-known hope island particular sanctuary cove gold coast queensland similar projects built area victoria first development sanctuary lakes local government area wyndham 16 km south west melbourne new south wales macquarie links gated community well southgate estate gated community many australian gated communities built within private golf courses act example uriarra village based around community horse paddocks dwellings jointly managed strata title brazil also many gated communities particularly metropolitan regions rio de janeiro são paulo example one são paulo suburbs least 6 compounds known tamboré 1 2 3 consists generously spaced detached houses little separate front gardens one first big-scale gated community projects são paulo city region barueri alphaville planned constructed 1970s military dictatorship big cities brazil faced steep increases car ownership middle higher-classes rural exodus poverty crime urban sprawl downtown decay neighbourhoods physical explicit gating security checkpoints patrols extremely rare absent even canada richest neighbourhoods bridle path toronto furthermore municipal planning laws many canadian provinces ban locked gates public roads public health issue since deny emergency vehicles quick access noted exception canada arbutus ridge age-restricted community constructed 1988 1992 southeastern coast vancouver island common canadian neighbourhoods especially largest cities implicit symbolic gating effectively partitions private infrastructure amenities communities surrounding neighbourhoods classic example affluent montreal suburb mount royal long fence running along side l'acadie boulevard intents purposes separates community working-class neighbourhood park extension also many newer suburban subdivisions employ decorative gates give impression exclusivity seclusion china compounds like gated communities around world target rich also many foreigners live gated communities beijing often foreign companies choose locations foreign employees live cases pay rent associated costs e.g management fees garden work similar communities exist shanghai another major chinese city shanghai links exclusive expatriate community enclosing golf course shanghai american school example notable gated communities shanghai include seasons villas development hutchinson whampoa thomson golf villas green villas gated communities china daxing district beijing enclose homes rural migrants intended reduce crime increase public order safety communist party china-run people daily claims 73 system controversial segregates migrants poor claiming true purpose keep track migrants scheduled implementation changping district also guayaquil quito ecuador many gated communities coastal city guayaquil mostly located samborondón quito valleys surrounding city home mostly wealthiest people trend specially guayaquil houses gated communities moderate prices well greater cairo example dreamland mountain view egypt alexandria el maamoura india many gated neighborhoods also called colonies new delhi big cities upper middle-class upper-class people live new delhi mumbai chennai bangalore like gated communities sometimes communities separated wealth also ethnicity members particular ethnicity tend feel comfortable living among owing reasons related common festivals language cuisine examples common new delhi strong punjabi community many gated neighborhoods predominantly punjabi cases discrimination members ethnic backgrounds living communities likewise also exist bengali south indian muslim gujarati neighborhoods nowadays many modern gated communities developed like aamby valley city lavasa city maharashtra occupying 100 square kilometers area gated communities built chennai hyderabad bangalore lot real estate developers bangalore 3 locations community living bannerghatta hebbal villas devanahalli neighboring countries target housing societies seem upper-middle upper class citizens caste religious discrimination prevalent real estate industry several people denied homes based caste religion regardless factor non-residential indians interested gated housing indonesia gated communities luxurious lots 740 square metres 8000 sq ft affordable lots ranging 40 120 square metres 2000 new residential area build private developer gated community examples include bumi serpong damai south tangerang telaga golf sawangan pesona khayangan depok sentul city bogor regency gated communities indonesia still allow outsiders use facilities inside community regulation social facilities residential development handed local government used public two examples gated community italy olgiata rome village roccamare castiglione della pescaia tuscany malaysia known gated guarded communities seeing steady increase popularity currently according town country planning department four types gated communities malaysia namely gated community concept emerged response rise safety security issues offers advantages terms calm environment enhanced safety ideal family development gated communities mexico result huge income gap existing country 2008 study found average income urban area mexico 26,654 rate higher advanced regions like spain greece average income rural areas sometimes short distance away 8,403 close proximity wealth poverty created large security risk mexico middle class gated communities found virtually every medium large sized city mexico largest found major cities monterrey mexico city guadalajara luxury status gated communities popular middle high income residents mexico gated luxury communities mexico considerably cheaper countries united states retaining houses similar size quality due commonness communities lower cost build priced lower attract middle class residents many gated communities mexico fully independent self-contained infrastructure schools water power facilities security fire forces medical facilities larger gated communities even retain school districts police departments interlomas area mexico city contains hundreds gated communities largest concentration gated communities world stretching surrounding areas santa fe bosques-lomas interlomas-bosque real also made predominantly gated communities span 30 greater mexico city many smaller gated communities mexico officially classified separate gated communities many municipal rules prohibit closed roads small neighborhoods cater lower middle income residents offer close perimeter check points similar authentic gated community situation tolerated sometimes even promoted city governments due lack capacity provide reliable trusted security forces new zealand gated communities developed suburban areas main cities since 1980s 1990s pakistan large number gated communities target middle class pakistanis largest bahria town also largest asia communities major cities defence housing authority also major developer gated communities others include wapda town gulberg islamabad schon properties emaar properties also maintains several gated communities country targeting primarily upper class people gated communities pakistan mostly immune problems law enforcement lack energy faced majority housing societies short time property prices communities greatly increased – 2007 20-square-meter house bahria town lahore cost around four million rupees 40,000 similar property 2012 costed nine million rupees houses priced around 100-300 million rupees lima peru several gated communities especially wealthy districts la molina santiago de surco home many prominent peruvians philippines sizable number gated communities known philippine english subdivisions villages regardless names communities may either form part larger barangay village constitute single barangay aerobus live complex de facto first gated community moscow business center complex outside residential area ozero cooperative formed around vladimir putin dacha priozersky district leningrad oblast saudi arabia many expatriate workers required live company-provided housing 2003 attack al hambra jadawel siyanco vinell militant saudi dissidents government established tight military security compounds large western populations many western individuals also reside many gated compounds non-gated villas apartments cities work saudi aramco provides compound dhahran one largest kind within saudi arabia gated communities also popular many saudis accounts limited availability open villas communities premium rent paid housing compounds found many saudi arabia cities including limited abha dhahran riyadh taif south africa increasing number gated communities often wealthy enclosed live close proximity urban poor yet little contact two many housing estates thailand take form gated communities targeted upper middle classes may managed development company resident committees gated communities often referred mubans thailand turkey several gated communities especially istanbul ankara called site turkish mostly located around edge city united arab emirates gated communities exploded popularity particularly dubai 2002 decision allow foreigners freehold properties resulted construction numerous communities built along various themes examples include lakes springs meadows arabian ranches united kingdom gated communities relatively rare 2004 estimated 1,000 communities england i.e including scotland wales northern ireland usually small scale gated street 60 100 houses single block 500 700 flats found london example docklands new caledonian wharf kings queen wharf pan peninsula east london bow quarter bow london gated communities us unincorporated like indiana briar ridge may even span one incorporated municipality however numerous incorporated gated cities southern california namely bradbury canyon lake hidden hills laguna woods rolling hills meet legal requirements city halls municipal facilities public private corporations parks facilities within gates 1997 estimated 20,000 gated communities built across country approximately 40 new homes california behind walls 1997 estimates number people gated communities ranged 4 million 30,000 communities around 8 million million california alone one reason difficult determine many gated communities united states privately developed incorporated gated communities outside california including lake quivira kansas sea ranch lakes florida anderson creek north carolina north oaks minnesota hot springs village arkansas largest gated community united states 26,000 heavily wooded acres hot springs village governed hot springs village property owners association poa short private tax-exempt home owners association bay harbor michigan largest gated community midwestern united states village rosemont illinois outside chicago maintains security checkpoint entrance main residential section naval square first city philadelphia pennsylvania neighborhood gives suburban feel otherwise urban environment downtown miami florida neighborhood brickell key gated island community high-rise residential towers although anyone walk onto island come via public bus authorized automobiles may enter brickell key expensive apartments miami 2012 gated community retreat twin lakes made famous shooting trayvon martin george zimmerman national spotlight well year 2013 acquittal zimmerman
[]
Test
5,466
4
Data_diddling:data diddling data diddling type cybercrime data altered entered computer system often data entry clerk computer virus computerized processing altered data results fraudulent benefit cases altered data changed back processing conceal activity results huge might include adjusting financial figures marginally could complex make entire system unusable
[ 3480, 5401, 1805 ]
Validation
5,467
4
Sniffing_attack:sniffing attack sniffing attack sniffer attack context network security corresponds theft interception data capturing network traffic using sniffer application aimed capturing network packets data transmitted across networks data packets encrypted data within network packet read using sniffer using sniffer application attacker analyze network gain information eventually cause network crash become corrupted read communications happening across network sniffing attacks compared tapping phone wires get know conversation reason also referred wiretapping applied computer networks using sniffing tools attackers sniff sensitive information network including email traffic smtp pop imap traffic web traffic http ftp traffic telnet authentication ftp passwords smb nfs many packet sniffer utility usually sniffs network data without making modifications network packets packet sniffers watch display log traffic information accessed attacker prevent networks sniffing attacks organizations individual users keep away applications using insecure protocols like basic http authentication file transfer protocol ftp telnet instead secure protocols https secure file transfer protocol sftp secure shell ssh preferred case necessity using insecure protocol application data transmission encrypted required vpn virtual private networks used provide secure access users
[ 6574, 2469, 7151, 651, 4440 ]
Test
5,468
4
Electric_grid_security:electric grid security electric grid security refers activities utilities regulators stakeholders play securing national electricity grid american electrical grid going one largest changes history move smart grid technology smart grid allows energy customers energy providers efficiently manage generate electricity similar new technologies smart grid also introduces new concerns security utility owners operators whether investor-owned municipal cooperative typically responsible implementing system improvements regards cybersecurity executives utilities industry beginning recognize business impact cybersecurity electric utility industry u.s. leads number initiatives help protect national electric grid threats industry partners federal government particularly national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies electric grids targets military terrorist activity american military leaders created first air war plan axis 1941 germany electric grid top target list north american electrical power grid highly connected system ongoing modernization grid generally referred smart grid reliability efficiency two key drivers development smart grid another example ability electrical system incorporate renewable energy sources wind power geothermal power one key issues electric grid security ongoing improvements modernizations created risk system example one risk specifically comes integration digital communications computer infrastructure existing physical infrastructure power grid according academic journal ieee security privacy magazine smart grid uses intelligent transmission distribution networks deliver electricity approach aims improve electric system reliability security efficiency two-way communication consumption data dynamic optimization electric-system operations maintenance planning u.s. federal energy regulatory commission ferc charge cybersecurity standards bulk power system system includes systems necessary operating interconnected grid investor-owned utilities operate different authority state public utility commissions falls outside ferc jurisdiction 2018 two evolutions taking place power economic sector evolutions could make harder utilities defend cyber threat first hackers become sophisticated attempts disrupt electric grids attacks targeted including spear phishing efforts aimed individuals shifting corporate networks include industrial control systems second grid becoming distributed connected growing internet things world could make every device could potential vulnerability 2006 200,000 miles transmission lines 230 kv higher existed united states main problem impossible secure whole system terrorist attacks scenario terrorist attack however would minimal would disrupt small portion overall grid example attack destroys regional transmission tower would temporary impact modern-day electric grid system capable restoring equipment damaged natural disasters tornadoes hurricanes ice storms earthquakes generally short period time due resiliency national grid events would difficult even well-organized large group terrorists cause physical damage small- moderate-scale tornado 2016 members russian hacker organization grizzly steppe infiltrated computer system vermont utility company burlington electric exposing vulnerability nation electric grid attacks hackers disrupt state electric grid however burlington electric discovered malware code computer system connected grid today utility industry advancing cybersecurity series initiatives partnering federal agencies goal improve sector-wide resilience physical cyber threats industry also working national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies 2017 electric companies spent 57.2 billion grid security september 2018 brien sheahan chairman ceo illinois commerce commission member u.s. department energy doe nuclear energy advisory committee robert powelson former federal energy regulatory commission ferc commissioner wrote published piece utility dive cyberthreats national power system require stronger national standards collaboration levels government recent article u.s. department homeland security confirmed russian hackers targeted control room american public utilities electric distribution system become networked together interconnected critical public services depend system water delivery financial institutions hospitals public safety prevent disruption network sheahan powelson recommended national standards collaboration federal state energy regulators utility companies cybersecurity-specific practices teams baltimore gas electric conducts regular drills employees also shares cyber-threat related information industry government partners duke energy put together corporate incident response team devoted cybersecurity 24 hours day unit works closely government emergency management law enforcement states cybersecurity procedures practices december 2018 u.s senators cory gardner michael bennet introduced legislation intended improve grid security nation-wide bills would create 90 million fund would distributed states develop energy security plans legislation would also require u.s. energy department identify vulnerabilities cyberattacks nation ’ electrical power grid electricity subsector coordinating council escc main liaison organization federal government electric power industry mission coordinate efforts prepare respond national-level disasters threats critical infrastructure escc composed electric company ceos trade association leaders segments industry federal government counterparts include senior administration officials white house relevant cabinet agencies federal law enforcement national security organizations
[]
Validation
5,469
3
Macintosh_IIx:macintosh iix macintosh iix personal computer designed manufactured sold apple computer inc. september 1988 october 1990 model introduced update original macintosh ii replacing 16 mhz motorola 68020 cpu 68881 fpu 68030 cpu 68882 fpu running clock speed initial price iix version 40 mb hard drive 800 kb floppy drive replaced 1.44 mb superdrive iix first macintosh include standard mac iix included 0.25 kib l1 instruction cpu cache 0.25 kib l1 data cache 16 mhz bus 1:1 cpu speed supported system 7.5.5 iix second three macintosh models use case allowing dual floppy drives 6 nubus slots last model macintosh iifx apple nomenclature time used x indicate presence '030 cpu used macintosh iicx iivx support spare parts iix discontinued august 31 1998
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 405, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 20...
Test
5,470
1
Media_contacts_database:media contacts database media contacts database media database specific people media commonly journalists media contacts database consists mainly list journalists reporters editors publishers contributors freelance journalists tv show anchors radio show hosts djs etc media-type work media contacts database usually contains following information information available may less based research methods media research company creates database media contacts database pr tool used pr professionals pitch stories particular topic product company specific group journalists journalists would write speak particular topic relevant issue episode shows media contacts database allows pr professional gain easy access hundreds journalists within short span time media contacts database created sold many media research companies offer pr software professionals
[]
Train
5,471
3
Road_Fighter:road fighter game later released msx home computer system 1985 nintendo entertainment system japan 1985 europe 1992 followed format original game included konami arcade classics 1999 nintendo ds arcade game released i-mode phones japan 2005 road fighter made available microsoft game room service xbox 360 console windows-based pcs march 24 2010 first second levels contain 4 courses ranging grassy plains water bridge seashore mountains finally forest area arcade version 6 stages contained pressing b button raises player speed around 196 km/h pressing button skyrockets speed 400 player limited amount fuel earn touching special multi-colored cars player collides car slips occasionally appearing patches oil car begin spin corrected may crash side barriers causing loss 5-6 fuel units nes famicom version total 6 types cars 1 yellow red three blue one truck yellow cars travel along straight line occur large numbers red cars little less likely appear change lane travelling get way player blue cars vary way change lane trucks go straight way colliding causes player crash konami man make cameo appearance flying side road player progresses certain point level without crashing included course 2 nes famicom versions midnight run road fighter 2 sequel road fighter released arcades march 1996 playstation 1997 arcade version released worldwide playstation version released japan europe europe playstation version titled midnight run removing road fighter connection main selling point allows player shift back forth manual automatic transmission races although different 2-d road fighter scenery similar racing games set japan initial arcade stage wangan midnight except cars licensed player also unique selection normal cars tuned cars reviewing arcade version next generation praised support four players challenging ai multiple tracks ability switch manual automatic mid-race tight controls powerslides car selection generally fast-paced racing nonetheless concluded game slightly average scored three five stars winding heat sequel road fighter midnight run released arcades 1996 first appeared arcades september though arcades receive units later improved version midnight run road fighter 2 though normal tuned cars rules remain unlike midnight run takes place touge roads cabinet came two configurations sitdown version 50 inch monitor upright version 25 inch monitor cabinets linked support four players road fighters japan-only sequel original road fighter released arcades 2010 game features 3d-enhanced graphics mounted pair goggles used view effect tracks set real-life locations based race courses previous konami racing titles including enthusia professional racing gti club series game includes numerous licensed vehicles saved using konami e-amusement pass containing tuning customization data game konami answer sega initial arcade stage 4 namco wangan midnight maximum tune terms card-based games taito chase h.q 2 terms rebooted sequels opening theme take higher composed together system music sota fujimori included beatmania iidx 18 resort anthem playable song addition game includes music beatmania iidx dance dance revolution series form promote another konami arcade games
[ 6943, 4759 ]
Test
5,472
3
ARM_Cortex-A15:arm cortex-a15 arm cortex-a15 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor out-of-order superscalar pipeline running 2.5 ghz arm claimed cortex-a15 core 40 percent powerful cortex-a9 core number cores speed first a15 designs came autumn 2011 products based chip reach market 2012 key features cortex-a15 core first implementation came samsung 2012 exynos 5 dual shipped october 2012 samsung chromebook series 3 arm version followed november google nexus 10 press announcements current implementations licensees lg expected produce a15 based design point
[ 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 6148, 441, 446, 451, 6165, 463, 469, 4041, 3008, 3365, 6910, 5845, 7654, 3397, 1977, 2339, 1237, 6950, 2711, 1995, 550, 4847, 3786, 568, 2024, 3108, 5576, 4879, 7376, ...
Test
5,473
2
Android_One:android one android one near-stock version android operating system released google android one altered companies make phones runs certain smartphones android one brand promises regular security updates three years android os updates two years android one started google 2014 focusing entry-level devices emerging markets though evolved including mid-range high-end smartphones android one runs 100 phones jon gold head android one partnerships google described program evolution including higher-end devices continuation google nexus program phones vetted google included software allowing years quick updates made companies android one started sundar pichai former product chief current ceo google android one often took least year latest android update arrived non-google devices project targeted indian market low-tier devices pichai said initial set devices shared common hardware based reference platform increasing range devices launched future security system updates handled google first set android one devices featured mediatek quad-core mt6582 mobile system-on-chip mobile soc 2014 android one phones initially rolled india pakistan bangladesh nepal indonesia philippines sri lanka myanmar south asian countries first android one smartphones indian brands micromax spice karbonn september 2014 second generation android one smartphones indonesia brands mito impact evercoss one x nexian journey february 2015 first android one preinstalled android 5.0 lollipop manufacturers including qmobile launched android one device named qmobile a1 july 6 2015 pakistan android one launched nigeria august 2015 infinix hot 2 x510 1 2 gb ram version became first android one africa infinix hot 2 x510 also exported african countries egypt ghana ivory coast morocco kenya cameroon uganda also asian countries united arab emirates pakistan indonesia 2 gb ram version manufactures follow gradually 2016 softbank announced would first carrier japan introduce android one phone country namely sharp 507sh released late july 2016 netherlands italy developed countries android one available market retailer media markt sells turkish smartphone brand general mobile 4g android one devices two countries well turkey since 2017 may 25 2017 turkish smartphone brand general mobile released next addition fully committed portfolio android one phones gm 6 softbank soon followed introducing sharp x1 japan subsidiary telecommunications company mobile june 30 september 5 2017 android one xiaomi jointly announced xiaomi mi a1 first android one device evolved program charter bring users smartphones running unmodified android operating system latest google technology easy use interface regular security os upgrades mi a1 first android one device released globally thirty-six markets sold various online offline distributors including xiaomi ’ mi homes device sales concentrated india indonesia russia taiwan september 2017 mvno google fi introduced first android one device available u.s. android one moto x4 november android one entered german market htc u11 life end november 2017 softbank announced addition four new devices android one lineup mobile x2 htc x3 kyocera s3 sharp s4 kyocera february 2018 hmd global maker nokia smartphones announced joined android one program devices approved google original equipment manufacturers oems agree requirements android one features concerning android operating system os security updates official android one entry page says fine print end confirm exact duration support phones territory smartphone manufacturer monthly security updates supported least three years initial phone release february 22 2018 google blog article says faster access android os updates two years including latest ai innovations google amongst secure devices ecosystem regular security updates three years google play protect built google confirms promise provide 2 years updates android one devices still stands website design impact promise program android one continues expand line smartphones geographic availability oem carrier partnerships countries release likely expand beyond initial countries regions listed snapdragon 410 devices rebrands longcheer l8150 based qualcomm seed reference design explaining similarities direct competitor based fully custom pcb design wileyfox swift available worldwide officially supported wileyfox recent android versions community supported lineageos roms
[ 3933, 5372, 6427, 1095, 5740, 740, 7189, 4340, 42, 3310, 2591, 5771, 6132, 5775, 7956, 474, 6183, 822, 6910, 136, 6209, 1582, 6219, 6937, 6232, 4116, 5195, 2003, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 5571, 2398, 2037, 2756, 7007,...
Test
5,474
8
Discoverability:discoverability discoverability degree something especially piece content information found search file database information system discoverability concern library information science many aspects digital media software web development marketing since something e.g. website product service etc used people find understand used metadata information information book title product description website keywords affects discoverable something database online 2010s adding metadata product available online make easier end users find product example song file made available online making title name band genre year release pertinent information available connection song file make easier users find song file organizing information putting alphabetical order including search engine example improve discoverability discoverability related different accessibility usability qualities affect usefulness piece information concept discoverability information science online context loose borrowing concept similar name legal profession law discovery pre-trial procedure lawsuit party law civil procedure obtain evidence party parties means discovery devices request answers interrogatories request production documents request admissions depositions discovery obtained non-parties using subpoenas discovery request objected requesting party may seek assistance court filing motion compel discovery usability piece information directly relates discoverable either walled garden database open internet quality information available database internet depends upon quality meta-information item product service case service emphasis placed service reusability opportunities exist reuse service however reuse possible information discoverable first place make items products services discoverable following set activities need performed regarding number 2 storing information searchable repository technically human-searchable repository printed paper list would qualify 2010s searchable repository usually taken mean computer-searchable repository database human user search using type search engine find feature number 3 supports analysis number 2 reading printed paper list hand might feasible theoretical sense time cost-efficient comparison computer-based searching apart increasing reuse potential services discoverability also required avoid development solution logic already contained existing service design services discoverable also provide interpretable information capabilities service discoverability principle provides guidelines could applied service-oriented analysis phase service delivery process relation audiovisual content according meaning given canadian radio-television telecommunications commission crtc purpose 2016 discoverability summit discoverability summed intrinsic ability given content stand lot position easily found discovered piece audiovisual content movie tv series music book ebook audio book podcast audiovisual content digital file tv show movie song made available online content tagged identifying information names key artists e.g. actors directors screenwriters tv shows movies singers musicians record producers songs genres e.g. movies genres action drama comedy songs genres heavy metal music hip hop music etc makes easier end users find content interested 2010s users interact online content algorithms typically determine types content user interested computer program suggests like content user may interested different websites systems different algorithms one approach used amazon online store indicate user user searches looks content/product x users purchased x also purchased following items example oriented around online purchasing behaviour algorithm could also programmed provide suggestions based factors e.g. searching viewing etc. 2010s discoverability typically referred connection search engines highly discoverable piece content e.g. certain movie would movie appears top near top user search results related concept role recommendation engines computer programs give user recommendations based his/her online activity 2010s discoverabilty applies desktop laptop computers increasingly widening range devices access internet including various console video game systems mobile devices tablets smartphones organizations make effort promote certain content e.g. tv show film song video game use traditional marketing billboards tv ads radio ads digital ads pop-up ads pre-roll ads etc mix traditional digital marketing even user ’ intervention searching certain content type content discoverability prime factor contributes whether piece audiovisual content likely found various digital modes content consumption 2017 modes searching include looking netflix movies spotify music audible audio books etc. although concept also generally applied content found twitter tumblr instagram websites involves content ’ mere presence given platform involve associating content keywords tags search algorithms positioning within different categories metadata etc thus discoverability enables much promotes audiovisual content broadcast streamed digital media using internet discoverability includes underlying concepts information science programming architecture foundation search specific product information content within specific webpage software application app discoverability feature content link depends range factors including size colour highlighting features position within page colour used communicate importance feature link designers typically use elements well shadows bolding individuals see certain colours traditional paper printing created physical locations stood fold newspaper versus fold web page app screenview may certain locations give features additional visibility users right bottom web page screen positional advantages disadvantages various locations depend different cultures languages e.g. left right vs. right left locations become established toolbars top screen webpage designers argued commonly used features e.g. print button much visually prominent rarely used features features seen convention user places mouse cursor certain area toolbar function option become visible general smaller screen mobile devices controls often placed right centre screen user views content text organizations try increase discoverability certain feature adding animation moving click icon 2017 addition motion sensors geotracking mobile devices made webpage design discoverability complex smartphones tablets typically capable many inputs user 1980s era desktop including swiping touchscreen touching images screen tilting device one challenges webpage app design degree sophistication experience users navigating webpage app environment varies great deal individuals new using applications one extreme experienced computer users items searched online goal discoverability near top search results organizations may make efforts make likely content webpages top close top search results approaches often collectively called search engine optimization seo note organization takes action increase seo website normally involve changes search engine rather involves adding metadata tags original content among strategies increase visibility website search engine algorithms service delivery context application principle requires collecting information service service analysis phase phase maximum information available service ’ functional context capabilities service stage domain knowledge business experts could also enlisted document meta-data service service-oriented design phase already gathered meta-data could made part service contract oasis soa-rm standard specifies service description artifact represents service meta-data make service meta-data accessible interested parties must centrally accessible could either done publishing service-meta dedicated 'service registry simply placing information 'shared directory case 'service registry repository also used include qos sla current state service basic type meta-information expresses functional context service details product content service ’ capabilities application standardized service contract principle helps create basic functional meta-data consistent manner standardization applied meta-information outside technical contract service e.g publishing information service registry general items data might used categorize may include services know service behavior limitations user service experience information needs documented within service registry way potential consumers use meta-information comparing performance requirements effective application design principle requires meta-information recorded service needs consistent meaningful possible organization-wide standards exist enforce service developers record required meta-data consistent way information recorded meta-data service needs presented way technical non-technical experts understand purpose capabilities service evaluation service may required business people service authorized used principle best applied service-oriented analysis phase time details service ’ purpose functionality available although service design principles support positive manner however case service abstraction service discoverability principle exists inversely proportional relationship details service hidden away service consumers less discoverable information available discovering service could addressed carefully recording service meta-information inner workings service documented within meta-information online economy sophisticated computer programs called algorithms analyse ways end users search access use different content products online thus metadata created regarding content product e.g. author genre e-book also data generated specific human users interaction content organization social media website user profile given person indicating demographic information e.g. age gender location residence employment status education etc social media website collect analyse information tendencies given user given subcategory users social media websites collecting data human users online activities preferences may raise potential privacy concerns algorithms called “ black boxes ” factors used leading websites algorithms typically proprietary information released public number search engine optimization seo firms offer services attempting increase ranking client ’ web content website seo firms typically know exact algorithms used google facebook ghosh et al found algorithm web crawler access 26 new online content ... recrawling constant fraction entire web 2010s one concern raised increasing role algorithms search engines databases specific person indicates preference certain type content product computer algorithm may increasingly focus making recommendations type content give practical example person searches comedy movies online search engine algorithm may start mainly recommending comedies user showing range films e.g. drama documentary etc. positive side person likes comedy films restricted filter reduce information load scanning vast numbers films however various cultural stakeholders raised concerns filter algorithms may restrict diversity material discoverable users concerns dangers filter bubbles raised regards online news services provide types news news sources topics user based his/her previous online activities thus person previously searched fox tv content mainly shown fox tv content person previously searched pbs content shown pbs search results could lead news readers becoming aware certain news source viewpoints search behaviour video content viewers changed great deal since widespread popularity video sharing websites video streaming whereas typical tv show consumer 1980s would read print edition tv guide find shows click channel channel channel surfing see shows appealed 2010s video content consumers increasingly watching screens either smart tvs tablet computer screens smartphones computerized search function often automated algorithm-created suggestions viewer search function user enter name tv show producer actor screenwriter genre help find content interest user searching search engine device laptop tablet computer smartphone device may transmit information user preferences previous online searches website continuing 1980s 2010s comparison 1980s type brand television user watching affect his/her viewing habits however person searching tv shows 2010s different brands computerized smart tvs probably get different search results search term organizations trying get maximal user uptake product content service online discoverability become important goal however achieving discovery automatically translate market success example hypothetical online game xyz easily discoverable function mobile devices video game perform well mobile game market despite top search results well even product functions runs plays properly well users may like product case user like certain online product service discoverability repeatable user find product service subsequent search may longer look product/service instead shift substitute easily reliably findable enough make online product service discoverable short period unless goal create “ viral ” content part short-term marketing campaign
[ 80, 2054, 740, 6024 ]
Test
5,475
8
Application_Request_Routing:application request routing application request routing arr extension internet information server iis enables iis server function load balancer arr iis server configured route incoming requests one multiple web servers using one several routing algorithms load balancing requests high availability web servers achieved without incurring typically-high costs dedicated load balancing products arr currently available version 3.0 released july 26 2013 current version supported x86 x64 installed iis 7.0 later windows 2008 later arr available download microsoft download center via microsoft web platform installer webpi arr requires url rewrite extension function uses routing requests arr configured redirect traffic based server variables urls cookies performs full layer 7 load balancing arr functionality described load balancing reverse proxy although advanced dedicated reverse proxy products microsoft uag dedicated load balancing solutions arr 3.0 supports following features
[ 3937, 3263, 378, 2198, 6096, 1475, 6110, 7553, 5410, 7564, 422, 6844, 2245, 432, 435, 5442, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 3711, 3028, 140, 6558, 7660, 4811, 6575, 3407, 3057, 1597, 2345, 7...
Validation
5,476
1
Spanner_(database):spanner database spanner google newsql database spanner globally distributed database service gives developers production-ready storage solution provides key features global transactions strongly consistent reads automatic multi-site replication failover spanner stores large amounts mutable structured data spanner allows users perform arbitrary queries using sql relational data maintaining strong consistency high availability data synchronous replication key features spanner spanner joined google platform february 2017 available part google cloud platform spanner uses paxos algorithm part operation shard partition data across hundreds servers makes heavy use hardware-assisted clock synchronization using gps clocks atomic clocks ensure global consistency google f1 sql database management system dbms built top spanner replacing google custom mysql variant
[ 3507, 4116, 5455, 4298, 3850, 5372, 7431, 6176, 993, 7346, 2107, 2475, 831, 7908, 5141, 136, 2317, 2673, 8107, 3309, 5239, 7924, 2591, 2683, 855, 4636, 168, 6776, 6950, 1511, 6153, 2712 ]
Test
5,477
3
Macintosh_Quadra:macintosh quadra macintosh quadra family personal computers designed manufactured sold apple computer inc. october 1991 october 1995 quadra named motorola 68040 central processing unit replaced macintosh ii family high-end macintosh model first models quadra 700 quadra 900 introduced october 1991 quadra 800 840av 605 added 1993 macintosh centris line merged quadra october 1993 adding 610 650 660av range introduction power macintosh line early 1994 apple continued produce sell new quadra models 950 continued sold october 1995 product manager quadra family frank casanova also product manager macintosh iifx first computers bearing macintosh quadra name quadra 700 quadra 900 introduced 1991 central processing unit cpu speed 25 mhz 700 compact model using case dimensions macintosh iici processor direct slot pds expansion slot latter newly designed tower case five nubus expansion slots one pds slot 900 replaced 1992 quadra 950 cpu speed 33 mhz line joined number 800-series machines new minitower case design starting quadra 800 600-series pizza box desktop cases quadra 610 1993 quadra 840av 660av introduced 40 mhz 25 mhz respectively included digital signal processor s-video composite video input/output ports well cd-quality microphone audio output ports av models also introduced plaintalk consisting text-to-speech software macintalk pro speech control although dictation however features poorly supported software dsp installed later av macs based more-powerful powerpc 601 cpu powerful enough handle coprocessor duties apple hired marketing firm lexicon branding come name lexicon chose name quadra hoping appeal engineers evoking technical terms like quadrant quadriceps quadra name also used successors centris models briefly existed 1993 610 650 660av centris mid-range line systems quadra high end lc low end later decided many product lines name dropped machines era including quadra 605 also sold performas last use name quadra 630 variation lc 630 using full motorola 68040 instead lc 68lc040 introduced together 1994 630 first mac use ide based drive bus internal hard disk drive whereas earlier models used scsi first three apple workgroup server models wgs 60 wgs 80 wgs 95 mostly called aws 95 apple workgroup server based centris 610 quadra 800 quadra 950 respectively transition motorola 68040 smooth previous transitions motorola 68020 motorola 68030 due motorola 68040 split instruction data caches quadra compatibility problems self-modifying code including relocating code common macintosh memory model apple partially fixed basic mac os memory copy call flush caches solved vast majority stability problems negated much motorola 68040 performance improvements apple also introduced variant memory copy call flush cache new trap defined way calling older version mac os would simply call previous memory copy routine net effect many complex applications initially slow prone crashing 68040 although developers quickly adapted new architecture relying apple memory copy routines rather flushing cache using memory copy flush cache appropriate time
[ 6788, 7890, 5732, 722, 1094, 2926, 5037, 1103, 5752, 405, 6125, 2954, 7572, 6482, 6847, 6142, 4373, 3674, 7226, 2978, 7601, 4749, 5097, 3346, 5100, 6165, 4389, 5463, 102, 5469, 4768, 3008, 2294, 1940, 3025, 6200, 6548, 6202, 3387, 3390, ...
Test
5,478
4
Real-time_adaptive_security:real-time adaptive security real-time adaptive security network security model necessary accommodate emergence multiple perimeters moving parts network increasingly advanced threats targeting enterprises adaptive security watch network malicious traffic behavioral anomalies ferret end point vulnerabilities identify real-time changes systems automatically enforce end point protections access rules block malicious traffic follow compliance dashboard providing audit data among key features adaptive security infrastructure security platforms share correlate information rather point solutions heuristics system could communicate suspicions firewall features include finer-grained controls automation addition human intervention on-demand security services security service integration security management data rather adding security custom applications go operational security models would created design phase app major change model real-time adaptive security shifting authorization management policy on-demand service contains details policy enforcement matches compliance adapt user situation trying access application instance
[ 1533, 651, 3680 ]
Test
5,479
2
EFx_Factory:efx factory efx factory architectural-guidance software factory pioneering architectural guidance software factory microsoft one first implementations software factory built ‘ efx factory ’ implements .net distributed architecture service-oriented applications services factory based upon architectural application framework called enterprise framework describes physical microsoft .net architecture leveraging microsoft enterprise library service-oriented patterns microsoft patterns practices efx factory designed built development consultants within microsoft consulting services response customer demand implementation .net architecture best practices .net development guidance best use enterprise library number application blocks freely available microsoft initially circa 2003 .net framework 1.0-1.1 visual studio 2002–2003 ‘ enterprise framework ’ efx built meet growing customer demand implementation .net architecture framework based upon implementation patterns harvested several enterprise solution implementations various customers framework implemented layered .net architecture leveraged extended enterprise library provide complete framework authoring applications services .net platform application framework evolved along changes .net platform emerging microsoft technologies changes industry service orientation patterns framework delivered set class libraries containing base implementations architectural layers prescribing certain technologies asmx ‘ infrastructural services ’ developers used address cross-cutting concerns architectural layers exception handling authentication authorization logging etc framework extended enterprise library implemented several real-world security providers necessary many customers time heterogeneous technology environments addition many best practice patterns specifically concerning exception handling built upon enterprise library solve requirements enterprise context framework also provided blocks packaged enterprise library validation block provided useful abstractions enterprise library specific solution domain offered simplified apis framework unified api typing string parameters framework delivered source form set framework assemblies packaged enterprise library framework included suggested set solutions reference implementation ri documentation developers created client-side applications server-side asp.net web services development application service required developer create new solution implement set assemblies one layer referenced framework assemblies deployed executable application web service primary challenge developers learning patterns framework hand crafting applications services blank solutions without availability time code templates resulted prolific cut pasting code reference implementation code highly vulnerable manual error circa 2005 several technologies emerged microsoft enabled use templates automation modeling types applications services including visual studio 2005 visual studio modeling distributed application system designers guidance automation toolkit gat domain-specific language toolkit dsl using new technologies framework able evolve systematically implementation software factory process many constraints framework lifted enable flexibility products factory could assemble primarily removal prescription technology architectural layers ability deal effectively change development applications services factory introduced domain modeling several new abstractions utilized automation previously possible factory one first factories combine dsl diagrams gat recipes well extending distributed application system designers visual studio gat recipes factory makes extensive use recipes automating changes solution structure property changes structure providing wizards configure models factory provides generating project templates work products automating menial tasks factory user 2007 development efx factory ceased many concepts pioneered absorbed future software factory platform microsoft adopted software factories patterns practices web service software factory following list exemplifies features factory others period factory one first factories designed factory 'product model part factory schema factory provides logical architectural view supporting runtime creating/modifying work products factory developer logical model separates logical design factory product ‘ product explorer ’ physical implementation normally viewed modified ‘ solution explorer ’ visual studio way physical structure solution artifacts could separated logical architectural structure work products product factory user could focus upon architecture product author using models abstractions whilst factory manages creation placement source artifacts factory integrates extends distributed application system designers installed visual studio team edition software architects visual studio provided diagrams application designer system designers provide means define high-level application services enterprise compose black box systems composed larger systems factory extends designers add number new shapes representing implementation applications services new shapes implemented provide specific projects solution templates represent physical structure factory product templates added new set diagram files represent internal component parts application service layers diagrams define specification application service layers give user navigation path drill-down high-level applications inner implementation details factory models using dsl ’ internal implementation applications services based upon logical technology-independent architecture soa patterns architecture composed several layers extended implemented pluggable ‘ artefact generators ’ ‘ technology providers ’ technology providers provide technology specific implementation view layer example layer would ‘ service contract ’ layer web service containing service interfaces service operations data contracts factory first factory provide extensibility mechanism 3rd parties global si isv community domain experts would provide technology tailored implementations various layers technology providers would take form external factories factorettes would integrate efx factory enhance expose technology specific views architectural models ultimately transform source artefacts technology separation capability allowed 'variant factory packaged deployed include technology-independent core factory models several ‘ artefact generators ’ providing technology implementations factory enabled composability variant factories could build solutions suit multitude real-world heterogeneous technology environments
[ 7149, 6420, 714, 720, 1460, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 2283, 7263, 5850, 5149, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 6986, 2018, 8085, 6989, 6991, 8...
Test
5,480
2
Environment_variable:environment variable environment variable dynamic-named value affect way running processes behave computer part environment process runs example running process query value temp environment variable discover suitable location store temporary files home userprofile variable find directory structure owned user running process introduced modern form 1979 version 7 unix included unix operating system flavors variants point onward including linux macos pc dos 2.0 1982 succeeding microsoft operating systems including microsoft windows os/2 also included feature although somewhat different syntax usage standard variable names unix unix-like systems process separate set environment variables default process created inherits duplicate environment parent process except explicit changes made parent creates child api level changes must done running codice_1 codice_2 alternatively command shells bash user change environment variables particular command invocation indirectly invoking via codice_3 using codice_4 notation running program access values environment variables configuration purposes shell scripts batch files use environment variables communicate data preferences child processes also used store temporary values reference later shell script however unix variables usually used unix environment variable changed script compiled program affect process possibly child processes parent process unrelated processes affected similarly changing removing variable value inside dos batch file change variable duration codice_5 existence unix environment variables normally initialized system startup system init scripts hence inherited processes system users often augment profile script command shell using microsoft windows environment variable default value stored windows registry set codice_6 file unix setuid program given environment chosen caller runs different authority caller dynamic linker usually load code locations specified environment variables codice_7 codice_8 run process authority setuid program would insecure caller could get run arbitrary code hence misuse authority reason libc unsets environment variables startup setuid process setuid programs usually unset unknown environment variables check others set reasonable values variables used scripts command line usually referenced putting special symbols front around variable name instance display user home directory scripting environments user type dos os/2 windows command-line interpreters codice_5 codice_10 user type windows powershell user type commands codice_3 codice_12 codice_13 display environment variables values codice_13 also used print single variable giving variable name sole argument command commands codice_3 codice_12 also used set environment variables often incorporated directly shell unix following commands also used often dependent certain shell simple principles govern environment variables achieve effect environment variables local process set two shell processes spawned value environment variable changed one change seen child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called procedure gives calling program control environment called program unix unix-like systems names environment variables case-sensitive unix shells variables may assigned without codice_17 keyword variables defined way displayed codice_12 command true environment variables stored shell recognized kernel codice_13 command display child processes inherit however used front program run variables added program environment persistence environment variable session-wide system-wide unset builtin command implemented bourne shell family sh ksh bash etc c shell family csh tcsh etc unix command line shells unsets shell variable removing memory shell exported environment implemented shell builtin directly manipulates internals shell read-only shell variables unset one tries unset read-only variable unset command print error message return non-zero exit code dos os/2 windows command-line interpreters codice_5 codice_10 codice_22 command used assign environment variables values using following arguments codice_22 command without arguments displays environment variables along values examples environment variables include dos master environment provided primary command processor inherits pre-environment defined codice_64 first loaded size configured codice_65 parameter 160 32767 bytes local environment segments inherited child processes typically reduced size contents hold command-line processors like 4dos allow define minimum amount free environment space available launching secondary shells content environment variables remains unchanged upon storage names without codice_66 always converted uppercase exception pre-environment variables defined via codice_64 directive codice_22 dr dos 6.0 higher codice_69 allow lowercase names dr-dos 7.02 higher principle ms-dos 7.0 higher also supports lowercase variable names codice_70 provides means user define environment variable names containing lowercase letters stored environment like normal environment variables remain invisible dos software since written expect uppercase variables command processors limit maximum length variable name 80 characters principally limited size environment segment dos 16-bit windows programs expect contents environment variables exceed 128 characters dr-dos codice_5 supports environment variables 255 4dos even 512 characters since codice_5 configured via codice_73 support command lines 1024 characters internally ms-dos 7.0 higher environment variables expected contain least 1024 characters well versions dr-dos environment passed drivers often need environment installation shrunken relocated codice_74 codice_75/codice_76 options codice_77 zero environment codice_78 substitute drive e.g codice_79 codice_80 relocate environment program order minimize driver effectively resulting resident memory footprint batch mode non-existent environment variables replaced zero-length string standard environment variables reserved environment variables include dr-dos family supports number additional standard environment variables including datalight rom-dos supports number additional standard environment variables well including codice_364 codice_365 codice_366 codice_367 codice_368 codice_369 also used rom-dos system path variables refer locations critical operating system resources generally user-dependent user management variables store information related resources settings owned various user profiles within system general rule variables refer critical system resources locations necessary os run optional system variables explicitly specified default used modify default behavior certain built-in console commands variables also need explicitly specified command line arguments following tables shows typical default values certain environment variables english versions windows retrieved codice_427 list environment variable refers location user documents directory standard method setting program home directory documents directory besides true environment variables statically stored environment changed deleted number pseudo-environment variables exist batch processing so-called replacement parameters replaceable parameters microsoft ibm terminology aka replacement variables digital research novell caldera terminology batch file parameters jp software terminology codice_432..codice_433 codice_434 used retrieve calling parameters batchjob see codice_435 batchjobs retrieved like environment variables actually stored environment command-line processors like dr-dos codice_5 multiuser dos codice_437/codice_438 terminal message process jp software 4dos 4os2 4nt take command windows cmd.exe support type pseudo-environment variables named system information variables novell caldera terminology internal variables jp software terminology used retrieve various possibly dynamic read-only information running system batch jobs returned values represent status system moment variables queried reading multiple times row may return different values even within command querying direct effect system since stored environment listed set exist external programs retrieve true environment variable name defined takes precedence corresponding variable environment variable deleted case-sensitive almost variables prefixed underscore codice_439 4dos etc convention f.e codice_440 dr-dos codice_5 f.e codice_260 addition 4dos 4os2 4nt take command also support called variable functions including user-definable ones work like internal variables take optional parameters f.e codice_443 may even change system status depending function system information variables supported dr-dos codice_5 system information variables supported dr-dos codice_5 networking loaded dynamic environment variables also named internal variables system information variables dos pseudo-environment variables supported codice_427 command-line extensions enabled expand various discrete values whenever queried values change queried multiple times even within command used batch jobs prompt stored environment consequently neither listed codice_22 exist external programs read case-sensitive indirectly also supported windows codice_5 modified internally call codice_602 execute commands
[ 361, 4291, 6789, 1812, 366, 4662, 6791, 1817, 5017, 1077, 4675, 6088, 5731, 1837, 2581, 7555, 3984, 2589, 6844, 5781, 5784, 1140, 6857, 781, 5789, 444, 447, 790, 448, 4020, 3685, 4387, 4759, 7246, 1537, 2999, 7251, 5116, 4283, 3366, 548...
Validation
5,481
2
Amdahl_UTS:amdahl uts uts discontinued implementation unix operating system ibm mainframe compatible computers amdahl created first versions uts released may 1981 uts global acquiring rights product 2002 uts global since gone business uts release 4.5 supports following s/390 model processors successors uts project origins work started princeton university 1975 port unix ibm vm/370 system team members tom lyon joseph skudlarek peter eichenberger eric schmidt tom lyon joined amdahl 1978 1979 full version 6 unix system amdahl 470 used internally design automation engineering late 1979 updated commonly ported version 7 1980 amdahl announced support unix system 470 five years later ibm announced mainframe unix ix/370 competitive response amdahl commercial versions uts based unix system iii unix system v. 1986 amdahl announced first version run natively ibm/370-compatible hardware uts/580 amdahl 580 series machines previous unix ports always ran guests ibm vm hypervisor version 4.5 based unix system v release 4 svr4
[ 1522, 4751, 7605, 4478, 6518, 4670, 900, 8173, 2467, 5216, 299, 2294, 5571, 2300, 5041, 2118, 7546, 5396, 6360, 578, 7003, 3874, 402, 6367, 839, 3212, 4428, 850, 4447, 607, 2431, 6577, 6849, 4366, 443, 1516, 1994 ]
Validation
5,482
4
Polymorphic_code:polymorphic code computer terminology polymorphic code code uses polymorphic engine mutate keeping original algorithm intact code changes time runs function code semantics change example 1+3 6-2 achieve result using different values operations technique sometimes used computer viruses shellcodes computer worms hide presence encryption common method hide code encryption main body code also called payload encrypted appear meaningless code function decryption function added code code executed function reads payload decrypts executing turn encryption alone polymorphism gain polymorphic behavior encryptor/decryptor pair mutated copy code allows different versions code function anti-virus software intrusion detection systems ids attempt locate malicious code searching computer files data packets sent computer network security software finds patterns correspond known computer viruses worms takes appropriate steps neutralize threat polymorphic algorithms make difficult software recognize offending code constantly mutates malicious programmers sought protect encrypted code virus-scanning strategy rewriting unencrypted decryption engine resulting encrypted payload time virus worm propagated anti-virus software uses sophisticated pattern analysis find underlying patterns within different mutations decryption engine hopes reliably detecting malware emulation may used defeat polymorphic obfuscation letting malware demangle virtual environment utilising methods traditional signature scanning virtual environment sometimes called sandbox polymorphism protect virus emulation decrypted payload remains regardless variation decryption algorithm metamorphic code techniques may used complicate detection virus may execute without ever identifiable code blocks memory remain constant infection infection first known polymorphic virus written mark washburn virus called 1260 written 1990 better-known polymorphic virus created 1992 hacker dark avenger pseudonym means avoiding pattern recognition antivirus software common virulent polymorphic virus file infecter virut example really polymorphic code serve introduction world encryption via xor operator example algorithm using variables b variable c could large amount code changes c would effect algorithm allowing changed endlessly without heed final product encrypted code payload make different versions code copy garbage lines manipulate c change code inside encrypted lots encrypted code search code decryption_code cryptokey algorithm new code thing usually coder uses zero key example xor 0 first generation virus making easier coder key code encrypted coder implements incremental key algorithm random one polymorphic code also used generate encryption algorithm code generated online service stringencrypt takes string file content encrypts random encryption commands generates polymorphic decryption code one many supported programming languages see c++ example string encrypted character stored encrypted form using unicode widechar format different encryption commands used like bitwise xor addition subtraction bit rotations everything randomized encryption keys bit rotation counters encryption commands order well output code generated c/c++ c java javascript python ruby haskell masm fasm autoit thanks randomization generated algorithm different every time possible write generic decryption tools compiled code polymorphic encryption code analyzed time re-encrypted
[ 6507, 2451, 7882, 5287, 2733, 718, 6428, 2740, 5381, 2566, 5129, 7506, 8097, 5401, 6823, 1019, 7557, 3570, 5965, 3495, 5878, 1901, 3680, 7050 ]
Validation
5,483
3
Classic_RISC_pipeline:classic risc pipeline history computer hardware early reduced instruction set computer central processing units risc cpus used similar architectural solution called classic risc pipeline cpus mips sparc motorola 88000 later notional cpu dlx invented education classic scalar risc designs fetched tried execute one instruction per cycle main common concept design five-stage execution instruction pipeline operation pipeline stage worked one instruction time stages consisted initial set flip-flops combinational logic operated outputs flip-flops instruction cache machines latency one cycle meaning instruction cache would ready next clock cycle instruction fetch stage 32-bit instruction fetched cache program counter pc register holds address current instruction feeds pc predictor sends program counter pc instruction cache read current instruction time pc predictor predicts address next instruction incrementing pc 4 instructions 4 bytes long prediction always wrong case taken branch jump exception see delayed branches later machines would use complicated accurate algorithms branch prediction branch target prediction guess next instruction address unlike earlier microcoded machines first risc machines microcode fetched instruction cache instruction bits shifted pipeline simple combinational logic pipeline stage could produce control signals datapath directly instruction bits result little decoding done stage traditionally called decode stage consequence lack decoding meant however instruction bits used specifying instruction also leaves fewer bits things like register indices mips sparc dlx instructions two register inputs decode stage two register names identified within instruction two registers named read register file mips design register file 32 entries time register file read instruction issue logic stage determined pipeline ready execute instruction stage issue logic would cause instruction fetch stage decode stage stall stall cycle stages would prevent initial flip-flops accepting new bits instruction decoded branch jump target address branch jump computed parallel reading register file branch condition computed register file read branch taken instruction jump pc predictor first stage assigned branch target rather incremented pc computed architectures made use alu execute stage cost slightly decreased instruction throughput decode stage ended quite lot hardware mips possibility branching two registers equal 32-bit-wide tree ran series register file read making long critical path stage also branch target computation generally required 16 bit add 14 bit incrementer resolving branch decode stage made possible single-cycle branch mispredict penalty since branches often taken thus mispredicted important keep penalty low execute stage actual computation occurs typically stage consists arithmetic logic unit also bit shifter may also include multiple cycle multiplier divider arithmetic logic unit responsible performing boolean operations nand xor xnor also performing integer addition subtraction besides result alu typically provides status bits whether result 0 overflow occurred bit shifter responsible shift rotations instructions simple risc machines divided three latency classes according type operation data memory needs accessed done stage stage single cycle latency instructions simply results forwarded next stage forwarding ensures one two cycle instructions always write results stage pipeline one write port register file used always available direct mapped virtually tagged data caching simplest far numerous data cache organizations two srams used one storing data storing tags stage single cycle two cycle instructions write results register file hennessy patterson coined term hazard situations instructions pipeline would produce wrong answers structural hazards occur two instructions might attempt use resources time classic risc pipelines avoided hazards replicating hardware particular branch instructions could used alu compute target address branch alu used decode stage purpose alu instruction followed branch would seen instructions attempt use alu simultaneously simple resolve conflict designing specialized branch target adder decode stage data hazards occur instruction scheduled blindly would attempt use data data available register file classic risc pipeline data hazards avoided one two ways bypassing also known operand forwarding suppose cpu executing following piece code instruction fetch decode stages send second instruction one cycle first flow pipeline shown diagram naive pipeline without hazard consideration data hazard progresses follows cycle 3 codice_1 instruction calculates new value codice_2 cycle codice_3 operation decoded value codice_2 fetched register file however codice_1 instruction yet written result codice_2 write-back normally occurs cycle 5 green box therefore value read register file passed alu execute stage codice_3 operation red box incorrect instead must pass data computed codice_1 back execute stage i.e red circle diagram codice_3 operation normally written-back solution problem pair bypass multiplexers multiplexers sit end decode stage flopped outputs inputs alu multiplexer selects decode stage logic compares registers written instructions execute access stages pipeline registers read instruction decode stage cause multiplexers select recent data bypass multiplexers make possible pipeline execute simple instructions latency alu multiplexer flip-flop without multiplexers latency writing reading register file would included latency instructions note data passed forward time data bypassed back earlier stage processed yet case data passed forward time codice_3 ready register alu codice_1 already computed however consider following instructions data read address codice_13 n't present data cache memory access stage codice_14 instruction time codice_3 instruction already alu resolve would require data memory passed backwards time input alu possible solution delay codice_3 instruction one cycle data hazard detected decode stage fetch decode stages stalled prevented flopping inputs stay state cycle execute access write-back stages downstream see extra no-operation instruction nop inserted codice_14 codice_3 instructions nop termed pipeline bubble since floats pipeline like air bubble occupying resources producing useful results hardware detect data hazard stall pipeline hazard cleared called pipeline interlock pipeline interlock used data forwarding however first example codice_1 followed codice_3 second example codice_14 followed codice_3 solved stalling first stage three cycles write-back achieved data register file correct causing correct register value fetched codice_3 decode stage causes quite performance hit processor spends lot time processing nothing clock speeds increased less forwarding logic wait data hazard detected quite easily program machine code written compiler stanford mips machine relied compiler add nop instructions case rather circuitry detect taxingly stall first two pipeline stages hence name mips microprocessor without interlocked pipeline stages turned extra nop instructions added compiler expanded program binaries enough instruction cache hit rate reduced stall hardware although expensive put back later designs improve instruction cache hit rate point acronym longer made sense control hazards caused conditional unconditional branching classic risc pipeline resolves branches decode stage means branch resolution recurrence two cycles long three implications four schemes solve performance problem branches delayed branches controversial first semantics complicated delayed branch specifies jump new location happens next instruction next instruction one unavoidably loaded instruction cache branch delayed branches criticized poor short-term choice isa design suppose 32-bit risc processes add instruction adds two large numbers result fit 32 bits happens simplest solution provided architectures wrapping arithmetic numbers greater maximum possible encoded value significant bits chopped fit usual integer number system 3000000000+3000000000=6000000000 unsigned 32 bit wrapping arithmetic 3000000000+3000000000=1705032704 6000000000 mod 2^32 may seem terribly useful largest benefit wrapping arithmetic every operation well defined result programmer especially programming language supporting large integers e.g lisp scheme may want wrapping arithmetic architectures e.g mips define special addition operations branch special locations overflow rather wrapping result software target location responsible fixing problem special branch called exception exceptions differ regular branches target address specified instruction branch decision dependent outcome instruction common kind software-visible exception one classic risc machines tlb miss see virtual memory exceptions different branches jumps control flow changes resolved decode stage exceptions resolved writeback stage exception detected following instructions earlier pipeline marked invalid flow end pipe results discarded program counter set address special exception handler special registers written exception location cause make easy fast software fix problem restart program cpu must take precise exception precise exception means instructions excepting instruction executed excepting instruction everything afterwards executed take precise exceptions cpu must commit changes software visible state program order in-order commit happens naturally classic risc pipeline instructions write results register file writeback stage writes automatically happen program order store instructions however write results store data queue access stage store instruction takes exception store data queue entry invalidated written cache data sram later occasionally either data instruction cache n't contain required datum instruction cases cpu must suspend operation cache filled necessary data must resume execution problem filling cache required data potentially writing back memory evicted cache line specific pipeline organization discussed two strategies handle suspend/resume problem first global stall signal signal activated prevents instructions advancing pipeline generally gating clock flip-flops start stage disadvantage strategy large number flip flops global stall signal takes long time propagate since machine generally stall cycle identifies condition requiring stall stall signal becomes speed-limiting critical path another strategy handle suspend/resume reuse exception logic machine takes exception offending instruction instructions invalidated cache filled necessary data instruction caused cache miss restarts expedite data cache miss handling instruction restarted access cycle happens one cycle data cache filled
[ 5012, 1447, 5371, 1452, 3948, 14, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 5893, 1252, 1254, 4847, 4...
Test
5,484
4
Clock_drift:clock drift clock drift refers several related phenomena clock run exactly rate reference clock time clock drifts apart gradually desynchronizes clock i.e crystal-based clocks used computers like clocks subject clock drift means count time different rates diverge phenomenon used instance computers build random number generators negative side clock drift exploited timing attacks everyday clocks wristwatches finite precision eventually require correction remain accurate rate drift depends clock quality sometimes stability power source ambient temperature subtle environmental variables thus clock different drift rates different occasions advanced clocks old mechanical clocks often kind speed trimmer one adjust speed clock thus correct clock drift instance pendulum clocks clock drift manipulated slightly changing length pendulum quartz oscillator less subject drift due manufacturing variances pendulum mechanical clock hence everyday quartz clocks adjustable drift correction atomic clocks precise nearly clock drift even earth rotation rate drift variation drift atomic clock due tidal acceleration effects principle behind atomic clock enabled scientists re-define si unit second terms exactly 9 192 631 770 oscillations caesium atom precision oscillations allows atomic clocks drift roughly one second hundred million years 2015 accurate atomic clock loses one second every 15 billion years international atomic time tai time standard derivatives coordinated universal time utc based weighted averages atomic clocks worldwide einstein predicted relativistic effects also cause clock drift due time dilation fixed universal time time relative observer special relativity describes two clocks held observers different inertial frames i.e moving respect accelerating decelerating appear either observer tick different rates addition general relativity gives us gravitational time dilation briefly clock stronger gravitational field e.g closer planet appear tick slowly people holding clocks i.e inside outside stronger field would agree clocks appear going faster note time rather function clock affected effects experimentally observed time dilation practical importance instance clocks gps satellites experience effect due reduced gravity experience making clocks appear run quickly earth must therefore incorporate relativistically corrected calculations reporting locations users general relativity accounted navigational fix based gps satellites would false 2 minutes errors global positions would continue accumulate rate 10 kilometers day computer programs often need high quality random numbers especially cryptography several similar ways clock drift used build random number generators rngs one way build hardware random number generator use two independent clock crystals one instance ticks 100 times per second one ticks 1 million times per second average faster crystal tick 10,000 times time slower one ticks since clock crystals precise exact number ticks vary variation used create random bits instance number fast ticks even 0 chosen number ticks odd 1 chosen thus 100/1000000 rng circuit produce 100 somewhat random bits per second typically system biased—it might instance produce zeros ones—and hundreds somewhat-random bits whitened produce unbiased bits also similar way build kind software random number generator involves comparing timer tick operating system tick usually 100–1000 times per second speed cpu os timer cpu run two independent clock crystals situation ideal less previous example even use clock crystal process/program clock drift measurement disturbed many less unpredictable events cpu interrupts processes programs runs time thus measurement still produce fairly good random numbers hardware random number generators ones described fairly slow therefore programs use create good seed feed pseudorandom number generator cryptographically secure pseudorandom number generator produce many random numbers fast 2006 side channel attack published exploited clock skew based cpu heating attacker causes heavy cpu load pseudonymous server tor hidden service causing cpu heating cpu heating correlated clock skew detected observing timestamps server real identity
[ 3100, 1237, 5765, 2572 ]
Test