node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,485
4
Payload_(computing):payload computing computing telecommunications payload part transmitted data actual intended message headers metadata sent enable payload delivery context computer virus worm payload portion malware performs malicious action term borrowed transportation payload refers part load pays transportation computer security payload part private user text could also contain malware worms viruses performs malicious action deleting data sending spam encrypting data addition payload malware also typically overhead code aimed simply spreading avoiding detection computer programming common usage term context message protocols differentiate protocol overhead actual data example json web service response might string hello world payload rest protocol overhead computer networking data transmitted payload almost always encapsulated type frame composed framing bits frame check sequence examples ethernet frames point-to-point protocol ppp frames fibre channel frames v.42 modem frames
[ 3932, 376, 1461, 5381, 2566, 5401, 6823, 3323, 74, 3680, 3681, 6515, 6879, 6526, 2310, 5149, 3726, 1584, 4440, 1594, 5880, 7319, 3775, 3448, 6265, 6986, 2747, 3794, 4892, 3486, 2062, 3821, 954, 2789, 255, 5611, 623, 6694, 4577, 7799, 45...
Test
5,486
2
Comparison_of_mobile_operating_systems:comparison mobile operating systems comparison mobile operating systems latest versions shown table even though older versions may still marketed
[ 3940, 2187, 7170, 2564, 2566, 5391, 734, 740, 5062, 2233, 5068, 2240, 7209, 424, 65, 7214, 3338, 5794, 6158, 5091, 7956, 7607, 6874, 4759, 7246, 7619, 4400, 474, 2300, 1559, 1565, 3039, 1582, 3050, 4089, 3057, 5872, 5530, 544, 3081, 309...
Train
5,487
3
Stack_register:stack register stack register computer central processor register whose purpose keep track call stack accumulator-based architecture machine may dedicated register sp intel x86 machine general register machine may register reserved convention pdp-11 risc machines designs data general eclipse dedicated register used reserved hardware memory address function machines late 1960s—such pdp-8 hp 2100—did compilers supported recursion subroutine instructions typically would save current location jump address set program counter next address simpler maintaining stack since one return location per subroutine code section recursion without considerable effort part programmer stack machine 2 stack registers — one keeps track call stack keep track stack 8086 main stack register called stack pointer sp stack segment register ss usually used store information memory segment stores call stack currently executed program sp points current stack top default stack grows downward memory newer values placed lower memory addresses push value stack codice_1 instruction used pop value stack codice_2 instruction used example assuming ss 1000h sp 0xf820 means current stack top physical address 0x1f820 due memory segmentation 8086 next two machine instructions program illustrates push works usually running program pushes registers stack make use registers purposes like call routine may change current values registers restore values stored stack program shall contain machine instructions like note program pops bx first pushed last note 8086 codice_1 codice_2 instructions work 16-bit elements simpler processors store stack pointer regular hardware register use arithmetic logic unit alu manipulate value typically push pop translated multiple micro-ops separately add/subtract stack pointer perform load/store memory newer processors contain dedicated stack engine optimize stack operations pentium first x86 processor introduce stack engine implementation stack pointer split among two registers esp 32-bit register esp 8-bit delta value updated directly stack operations push pop call ret opcodes operate directly esp register esp near overflow esp register referenced instructions esp ≠ 0 synchronisation micro-op inserted updates esp using alu resets esp 0 design remained largely unmodified later intel processors although esp expanded 64 bits stack engine similar intel also adopted amd k8 microarchitecture bulldozer need synchronization micro-ops removed internal design stack engine known
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 5799, 4047, 5483, 1556, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, 895, ...
Test
5,488
5
LogMeIn_Hamachi:logmein hamachi logmein hamachi virtual private network vpn application written alex pankratov 2004 capable establishing direct links computers behind network address translation nat firewalls without requiring reconfiguration user pc accessed directly without relays internet/wan side words establishes connection internet emulates connection would exist computers connected local area network lan hamachi acquired pankratov logmein 2009 currently available production version microsoft windows macos beta version linux system-vpn-based client compatible android ios paid subscribers hamachi runs background idle computers feature previously available users became restricted paid subscribers hamachi proprietary centrally-managed vpn system consisting server cluster managed vendor system client software installed end-user computers client software adds virtual network interface computer used intercepting outbound well injecting inbound vpn traffic outbound traffic sent operating system interface delivered client software encrypts authenticates sends destination vpn peer specially initiated udp connection hamachi currently handles tunneling ip traffic including broadcasts multicast windows version also recognizes tunnels ipx traffic client establishes maintains control connection server cluster connection established client goes login sequence followed discovery process state synchronization login step authenticates client server vice versa discovery used determine topology client internet connection specifically detect presence nat firewall devices route internet synchronization step brings client view private networks sync members networks member network goes online offline server instructs network peers either establish tear tunnels former establishing tunnels peers hamachi uses server-assisted nat traversal technique similar udp hole punching detailed information works made public process work certain combinations nat devices requiring user explicitly set port forward additionally 1.0 series client software capable relaying traffic vendor-maintained 'relay servers event unexpectedly losing connection server client retains tunnels starts actively checking status server unexpectedly loses client connection informs client peers fact expects also start liveliness checks enables hamachi tunnels withstand transient network problems route client server well short periods complete server unavailability hamachi clients also get closed port clients repaired port forwarding hamachi frequently used gaming remote administration vendor provides free basic service extra features fee february 2007 ip-level block imposed hamachi servers parts vietnamese internet space due scale system abuse originating blocked addresses company working less intrusive solution problem hamachi client normally assigned ip address logs system first time avoid conflicting existing private networks client side normal private ip address blocks 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 used november 19 2012 5.0.0.0/8 range used range previously unallocated allocated ripe ncc late 2010 space range used hosting providers public internet hamachi switched 25.0.0.0/8 block 25.0.0.0/8 block allocated british ministry defence organisations need communicate mod may experience problems specific internet routes attract traffic meant internal hosts alternatively find unable reach legitimate users addresses addresses used internally squatting established practice internet client supports ipv6 selected address assigned picked range registered logmein ip address assigned hamachi client henceforth associated client public crypto key long client retains key log system use ip address hamachi creates single broadcast domain clients makes possible use lan protocols rely ip broadcasts discovery announcement services hamachi networks following considerations apply hamachi use vpn application current builds hamachi available following operating systems prior versions 1.0.2.0 1.0.2.1 windows release many windows vista users experienced compatibility connection issues using hamachi march 30 2007 software includes vista tweaks answer os-related problems among specific solutions
[ 3350, 5808, 6879, 4759, 8, 7806, 2644, 5039, 5571, 1559, 578, 2664, 4059, 6025, 6458, 4162, 8008, 5241, 2681, 5157, 5773, 3572, 3821, 7122, 4990, 6487, 7867, 4014, 2356 ]
Train
5,489
4
FlowMon:flowmon flowmon name monitoring probe result academic research activity cesnet also name commercial product marketed university spin-off company flowmon networks flowmon probe appliance monitoring reporting information ip flows high-speed computer networks probe developed liberouter team within scope cesnet research plan optical national research network new applications research activity 602 programmable hardware flowmon probe built upon pair programmable network cards called combo host computer linux operating system pair combo cards consists main card pci pci-x pci-express connector connection motherboard host computer add-on card 2 4 network interfaces cards contain programmable chips fpgas able process high amount data multi-gigabit speed flow monitoring process split hardware acceleration cards application software running host computer following principle hardware/software codesign time-critical tasks implemented fpga chips acceleration cards complex operations carried application software concept enables monitoring modern high-speed 1 gbps 10 gbps networks packet loss necessity input sampling time flexible user-friendly interface provided software flowmon probe passive monitoring device i.e alter passing traffic way therefore detection hardly possible connected network flowmon probe observes passing traffic/packets extracts aggregates information ip flows flow records flowmon probe able export aggregated data external collectors netflow version 5 9 ipfix format collectors collect incoming flow records store automated manual visual analysis automated malicious traffic detection filter rules graphs statistical schemas whole system allows monitoring actual state monitored network well long-term traffic analysis flowmon probe part géant2 security toolset consists netflow analysis tools nfsen nfdump flowmon appliance flowmon network traffic monitoring security solution flowmon networks company flowmon networks established 2007 university spin-off made technology transfer cesnet czech nren continue r finish prototypes put market flowmon solution initially based flowmon probes developed cesnet nowadays flowmon complete flow monitoring solution consists flowmon probes flowmon collectors additional modules flowmon ads flowmon apm flowmon ddos defender flowmon traffic recorder flowmon probes provide netflow/ipfix statistics network traffic come standard version suitable standard networks 10mbit/s 10gbit/s hardware-accelerated version based cesnet fpga boards suitable high-speed networks 10gbit/s 100gbit/s flowmon collectors appliances netflow/sflow/ipfix/jflow/netflow lite/net stream/cflowd storage analysis flowmon modules extend functionality flowmon probes flowmon collectors brings additional functionality e.g network behavior analysis nba application performance monitoring anomaly detection http logging
[ 3872, 6014, 578 ]
Validation
5,490
9
FusionDebug:fusiondebug fusiondebug interactive step debugger cfml compatible adobe coldfusion railo lucee enables developers step code line-by-line step code better understand code running
[ 3186, 6095, 2456, 5571, 6704, 103, 6362, 2752, 3543 ]
Test
5,491
5
SVDO:svdo svdo simultaneous voice ev-do data technology allows supported cdma2000 ev-do cellular phones maintain active 3g data session phone call previously capability able use data call found mobile phones using gsm cellular networks 2011 verizon released first svdo-supported phone htc thunderbolt following year sprint released first svdo-supported phone htc evo 4g lte although phones support lte already allows simultaneous voice data devices 3g data coverage use svdo 3g data session phone call
[]
Validation
5,492
5
Data_link_layer:data link layer data layer layer 2 second layer seven-layer osi model computer networking layer protocol layer transfers data adjacent network nodes wide area network wan nodes local area network lan segment data link layer provides functional procedural means transfer data network entities might provide means detect possibly correct errors may occur physical layer data link layer concerned local delivery frames nodes level network data-link frames protocol data units called cross boundaries local area network inter-network routing global addressing higher-layer functions allowing data-link protocols focus local delivery addressing media arbitration way data link layer analogous neighborhood traffic cop endeavors arbitrate parties contending access medium without concern ultimate destination devices attempt use medium simultaneously frame collisions occur data-link protocols specify devices detect recover collisions may provide mechanisms reduce prevent examples data link protocols ethernet local area networks multi-node point-to-point protocol ppp hdlc adccp point-to-point dual-node connections internet protocol suite tcp/ip data link layer functionality contained within link layer lowest layer descriptive model also includes functionality encompassed osi model physical layer frame header contains source destination addresses indicate device originated frame device expected receive process contrast hierarchical routable addresses network layer layer-2 addresses flat meaning part address used identify logical physical group address belongs data link thus provides data transfer across physical link transfer reliable unreliable many data-link protocols acknowledgments successful frame reception acceptance data-link protocols might even form checksum check transmission errors cases higher-level protocols must provide flow control error checking acknowledgments retransmission networks ieee 802 local area networks data link layer described detail media access control mac logical link control llc sublayers means ieee 802.2 llc protocol used ieee 802 mac layers ethernet token ring ieee 802.11 etc. well non-802 mac layers fddi data-link-layer protocols hdlc specified include sublayers although protocols cisco hdlc use hdlc low-level framing mac layer combination different llc layer itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables data link layer divided three sub-layers application protocol convergence logical link control media access control within semantics osi network architecture data-link-layer protocols respond service requests network layer perform function issuing service requests physical layer data link layer two sublayers logical link control llc media access control mac uppermost sublayer llc multiplexes protocols running top data link layer optionally provides flow control acknowledgment error notification llc provides addressing control data link specifies mechanisms used addressing stations transmission medium controlling data exchanged originator recipient machines mac may refer sublayer determines allowed access media one time e.g csma/cd times refers frame structure delivered based mac addresses inside generally two forms media access control distributed centralized may compared communication people network made people speaking i.e conversation pause random amount time attempt speak effectively establishing long elaborate game saying first media access control sublayer also determines one frame data ends next one starts – frame synchronization four means frame synchronization time based character counting byte stuffing bit stuffing services data link layer provides beside framing data link layers also include mechanisms detect even recover transmission errors receiver detect transmission error sender must add redundant information form bits error detection code frame sent receiver obtains frame error detection code recomputes verifies whether received error detection code matches computed error detection code match frame considered valid error detection code defined function computes amount redundant bits corresponding string total number bits simplest error detection code parity bit allows receiver detect transmission errors affected single bit among transmitted bits multiple flipped bits checking method might able unveil receiver side advanced methods parity error detection exist providing higher grades quality features simple example works using metadata transmitting word hello encoding letter position alphabet thus letter coded 1 b 2 shown table right adding resulting numbers yields 8 5 12 12 15 52 5 2 7 calculates metadata finally 8 5 12 12 15 7 numbers sequence transmitted receiver see end transmission errors receiver knows last number received error-detecting metadata data message receiver recalculate math metadata matches concluded data received error-free though receiver sees something like 7 5 12 12 15 7 sequence first element altered error run check calculating 7 5 12 12 15 51 5 1 6 discard received data defective since 6 equal 7 internet protocol suite tcp/ip osi data link layer functionality contained within lowest layer link layer tcp/ip link layer operating scope link host connected concerns hardware issues point obtaining hardware mac addresses locating hosts link transmitting data frames onto link link layer functionality described rfc 1122 defined differently data link layer osi encompasses methods affect local link tcp/ip model top-down comprehensive design reference networks formulated purpose illustrating logical groups scopes functions needed design suite internetworking protocols tcp/ip needed operation internet general direct strict comparisons osi tcp/ip models avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 particular tcp/ip dictate strict hierarchical sequence encapsulation requirements attributed osi protocols following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources
[ 5714, 7148, 7876, 709, 4667, 4676, 7170, 7173, 1462, 3283, 1468, 2219, 3640, 7916, 44, 7566, 3312, 1869, 7569, 3314, 7214, 7217, 7590, 6871, 456, 6879, 1916, 2281, 6521, 1543, 2644, 6531, 2650, 823, 7637, 4783, 6908, 1948, 3383, 494, 19...
Validation
5,493
2
Nokia_N81:nokia n81 nokia n81 symbian os smartphone announced nokia 29 august 2007 released next month runs s60 3rd edition feature pack 1 n81 marketed entertainment device focused music gaming first device came preloaded n-gage 2.0 gaming service 2008 albeit public beta features two dedicated gaming keys used n-gage games would later also appear n96 n85 5730 xpressmusic launch n-gage 2.0 n81 specifically chosen nokia advertisements also much marketed music-centric smartphone one first support nokia music store service stereo speakers considered loud several reviewers claimed n81 much like older nokia n91 high sound output quality therefore highly suitable audiophiles four-way silver-coloured d-pad display also contains new capacitive sensor called navi wheel allows scrolling s60 gallery music player applications 'stroking key similar manner ipod click wheel unique feature rarely appears mobile handsets navi wheel would later also appear nokia nseries handsets n78 n85 n79 n81 modest specifications compared nokia n95 2-megapixel camera lacking gps hsdpa weighing 20 grams heavier however n81 arm11 369 mhz processor fastest nokia device time nokia n81 notably features sliding spring-loaded physical keylock top device located next 3.5 mm jack first nseries device swapped miniusb port favour microusb variant called n81 8gb 8-gigabytes internal flash memory also announced time version retailed 430 euros taxes 70 euros standard version requires microsd memory card expand 12 megabytes storage n81 would succeeded n85 nokia n81 lower sound output compared n91 due release new firmware version according nokia must follow international standard wherein device initial default volume must set low cause damage users cnet found buggy slow badly designed s21 gave 3/5 praising feature set criticising plasticky design however musical capabilities highly praised
[ 1066, 5979, 2271, 6517, 372, 1724, 463, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 6440, 7545, 5044, 740, 1202, 5315, 3029, 5499, 7012, 139, 6378, 6465, 5062, 3039, 3653, 1582, 4894...
Validation
5,494
9
Spice_Lisp:spice lisp spice lisp scientific personal integrated computing environment programming language dialect lisp implementation originally written carnegie mellon university cmu spice lisp group targeted microcode 16-bit workstation perq operating system accent used workstation microcode abilities provided microcodes languages pascal c ada implement stack machine architecture store data structures 32-bit objects enable run time type-checking would later popular workstations spice lisp evolved implementation common lisp renamed cmu common lisp cmucl
[ 5012, 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 2249, 1889, 1890, 6507, 795, 6876, 6888, 3370, 1557, 6191, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 6949, ...
Test
5,495
4
Proxy_list:proxy list proxy list list open http/https/socks proxy servers one website proxies allow users make indirect network connections computer network services proxy lists include ip addresses computers hosting open proxy servers meaning proxy servers available anyone internet proxy lists often organized various proxy protocols servers use many proxy lists index web proxies used without changing browser settings 3 types http proxies socks protocol relays tcp sessions firewall host allow application users transparent access across firewall protocol independent application protocols used many different services telnet ftp finger whois gopher www etc access control applied beginning tcp session thereafter server simply relays data client application server incurring minimum processing overhead since socks never know anything application protocol also easy accommodate applications use encryption protect traffic nosy snoopers information client sent server – thus need test anonymity level socks proxies
[ 3777, 1175, 3338 ]
Test
5,496
7
Axcient:axcient axcient inc mountain view california company provides recovery-as-a-service raas businesses protect data applications axcient platform manages data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data recovery single web based service eliminate data loss small large businesses axcient founded 2006 headquartered mountain view california privately held backing investors including allegis capital peninsula ventures thomvest scale venture partners company name comes combining words intelligent access placed random word generator exchanged word intelligent synonym sapient flipped around access ax -sapient cient september 16 2014 axcient acquired directrestore dover delaware-based granular recovery technology solutions provider directrestore product portfolio enables restoration mainstream applications sql server microsoft exchange database backups replications axcient integrate single solution oem software.in july 2017 efolder merged axcient gartner rated axcient excellent critical capabilities recovery service report “ visionary ” gartner ’ magic quadrant draas axcient also ranked “ leader ” forrester disaster recovery service provider forrester wave “ leader ” idc marketscape draas vendor assessment service require software installed customers hardware axcient one product web-based cloud solution includes data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data application restore
[ 4554, 4594, 2390, 5889 ]
Test
5,497
2
UpdateStar:updatestar updatestar freeware software application providing update information approximately 1.3 million software programs implementing social computing aspect update database maintained users updatestar uses advertising refinance free service shares ad revenue 50/50 software authors via share program software searched downloaded updated addition updatestar freeware client easily installed inform users available updates individual software setup allows downloading installing uninstalling programs within client acts enhancement add/remove programs control panel applet programs features windows vista software search engine http //www.updatestar.com/ built top updatestar ’ user generated software program database via ad revenue sharing program share updatestar allows developers use updatestar website download mirror participate ad revenue created program ’ webpages updatestar founded michael ganss frank alperstaedt olaf kehrer 2007 based berlin software search engine website however launch july 2008 company funded founders current version site released july 2008 included new software search capabilities results based user submitted information 259,000 programs new professional services business section updatestar freeware client section updatestar freeware grown popularity 50,000 users 2007 550,000 users july 2008 updatestar 4 released march 2009 introduced enhanced recognition algorithm registry cleaner removes remnants uninstalled software updates appear almost daily basis software setup 60 80 programs typical pc making nearly impossible pc user keep program available freeware well commercial premium edition additional security advice program cleaner system maintenance updatestar provides user information software updates available software computer includes major releases provided updatestar freeware edition well minor version upgrades patches included premium edition many updates published security reasons newly included features either way software updates considered important even critical case updates made available publishers security reasons updatestar premium additionally offers security advice allowing identification important software updates updatestar premium includes tool clean windows registry superfluous faulty software entries often result incompletely uninstalled software two million users profit updatestar service per month december 2009 receive updates pcs software updatestar provides users program update information 4.5 million installations daily updatestar released version 5 oct 19 2009 introducing improved version recognition improved windows 7 support new language support korean lithuanian improved translations russian hungarian romanian attempts download software updatestar site lead malware attacks updatestar uses software search engine website share ad revenue software authors professional services include software market research analytics well targeted marketing services connect software vendors allows updatestar provide update information service free user community updatestar website tracks created ad revenues program pages share program creates ppc based revenue streams users click ads program ’ download page updatestar web advertiser charged advertising fee split updatestar software vendor vendor participates share partner updatestar website ’ user traffic comes targeted alerts newly available updates used software offering information downloads traffic multiplies number updates users way share software vendor partners participate repeatedly revenue created content software long participate february 2010 updatestar began commercial online backup service called updatestar online backup users updatestar online backup select files folders desktop application periodically backed remote data center program employs differential backup algorithm minimize amount data needs backed subsequent runs updatestar offers plans unlimited storage home business desktop computers limited storage 100 gb 250 gb 500 gb server computers program runs windows xp windows vista windows 7 desktop edition windows server 2003 windows server 2008 server edition
[ 2885, 3559, 4759, 5571 ]
Test
5,498
9
Affix_grammar:affix grammar affix grammar kind formal grammar used describe syntax languages mainly computer languages using approach based natural language typically described grammatical rules affix grammar context-free grammar except certain parts nonterminals affixes used arguments affix occurs multiple times rule value must agree i.e must everywhere types affix grammar complex relationships affix values possible describe extremely simple fragment english following manner context-free grammar describes simple sentences nouns verbs rules introduce parts speech large range english sentences described promising approach describing syntax english however given grammar also describes sentences sentences wrong english subject verb grammatical number must agree affix grammar express directly grammar describes correct english sentences although could argued still incorrect instead read incorporated using affixes means describing relationships different affix values powerful enough remarked means depend type affix grammar chosen simplest type affix grammar affixes take values finite domain affix values related agreement example applied way affixes increase compactness grammars add expressive power another approach allow affixes take arbitrary strings values allow concatenations affixes used rules ranges allowable values affixes described context-free grammar rules produces formalism two-level grammars also known van wijngaarden grammars 2vw grammars successfully used describe complicated languages particular syntax algol 68 programming language however turns even though affix values manipulated string concatenation formalism turing complete hence even basic questions language described arbitrary 2vw grammar undecidable general extended affix grammars developed 1980s restricted version idea mainly applied describe grammar natural language e.g english another possibility allow values affixes computed code written programming language two basic approaches used
[ 1361, 1157, 6882, 5326, 336 ]
Test
5,499
2
Nokia_N96:nokia n96 nokia n96 high-end smartphone announced nokia february 11 2008 mobile world congress barcelona part nseries line n96 runs updated symbian os v9.3 s60 3rd edition fp2 compatible n-gage 2.0 gaming platform also dvb-h television tuner compared popular nokia n95 8gb n96 doubled flash storage capacity 16 gigabytes dual led flash camera slimmer design however critics negative views n96 battery life user-unfriendlyness downgraded cpu clock speed raised questions one 2008 anticipated mobile phones launch delayed widely available october 2008 thus considered commercial failure critics felt nokia n85 provided new additions compared n96 much cheaper shipments n96 started september 2008 europe middle east asia-pacific first locations provide handset consumers american chinese versions expected shortly thereafter u.s. device sold us 900 criticised expensive general uk release date n96 1 october although london separate date 24 september device went sale exclusively nokia flagship stores regent street terminal 5 heathrow airport additions negative
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 6440, 7545, 5044, 5493, 740, 1202, 5315, 3029, 7012, 139, 6465, 7751, 5062, 3039, 3653, 1582, 4894, 506...
Test
5,500
8
List_of_web_service_specifications:list web service specifications variety specifications associated web services specifications varying degrees maturity maintained supported various standards bodies entities specifications basic web services framework established first-generation standards represented wsdl soap uddi specifications may complement overlap compete web service specifications occasionally referred collectively ws-* though single managed set specifications consistently refers recognized owning body across ws-* prefix used indicate specifications associated web services exist many ws-* standards including ws-addressing ws-discovery ws-federation ws-policy ws-security ws-trust page includes many specifications might considered part ws-* sites contain documents links different web services standards identified page specifications provide additional information improve interoperability vendor implementations
[ 5631, 4038, 5111, 7252, 4043, 6986, 302, 4246, 6555, 751, 7565, 4436, 1409, 4445, 7763, 345, 4192, 2973, 7315, 4743, 2715 ]
Test
5,501
9
Flavors_(programming_language):flavors programming language flavors early object-oriented extension lisp developed howard cannon mit artificial intelligence laboratory lisp machine programming language lisp machine lisp first programming language include mixins symbolics used lisp machines eventually developed new flavors original new flavors message passing oo models hugely influential development common lisp object system clos implementations flavors also available common lisp new flavors replaced message sending calling generic functions flavors offers daemons default method combination called flavors offers features found clos clos offers following features found flavors
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 795, 6876, 6888, 1557, 5494, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 5883, 6949, 6955, 4837, 1616, 3429, 2366, ...
Test
5,502
2
Direct-access_storage_device:direct-access storage device direct-access storage device dasd pronounced secondary storage device physical record discrete location unique address ibm coined term dasd shorthand describing hard disk drives magnetic drums data cells later optical disc drives flash memory units also classified dasd term dasd contrasts sequential storage media magnetic tape unit record equipment card devices like card readers punches access methods dasd include sequential indexed direct direct access contrasts sequential access method used tape drives record dasd accessed without read intervening records current location whereas reading anything next record tape requires skipping intervening records requires proportionally long time access distant point medium dasd storage class includes fixed removable media ibm mainframes access i/o devices including dasd channels type subordinate mini-processor channel programs write read control given device operating system uses four byte relative track record ttr access methods others eight-byte extent-bin-cylinder-track-record block address mbbcchhr channel programs address dasd using six byte seek address bbcchh five byte record identifier cchhr 2321 data cell discontinued january 1975 addressing scheme device referred chr ctr cylinder-track-record bin number always 0 ibm refers data records programmers work logical records format disk blocks physical records one block might contain several logical user records schemes called spanned records partial logical records physical records size limit track devices track overflow feature allowed breaking large block track-size segments within cylinder access methods responsible blocking deblocking logical records written read external media ckd acronym count key data physical layout block dasd device confused ctr block address used channel program 1970s ibm introduced fixed block architecture fba mainframes programming level devices use traditional chr addressing reference fixed-length blocks number much like sectors mini-computers correctly application programmer remains unaware underlying storage arrangement stores data fixed physical block lengths 512 1024 2048 4096 depending device type applications fba offers simplicity increase throughput fba supported vm/370 dos/vse mvs successor operating systems os/360 line programming interface macros routines collectively referred dam direct access methods ibm 1964 first version ibm system/360 system summary used term file collectively described devices called dasd files provided random access storage time ibm product reference manual described devices direct access storage devices without acronym early public use acronym dasd ibm march 1966 manual data file handbook earliest non-ibm use acronym dasd found google ngram viewer refer storage devices dates 1968 use term grew exponentially drums data cells disappeared products dasd remains synonym disk flash optical devices modern dasd used mainframes rarely consist single disk-drives commonly dasd means large disk arrays utilizing raid schemes current devices emulate ckd fba hardware
[ 607, 467, 4662, 8173, 6213, 5041, 4199, 4555, 3201, 6957 ]
Test
5,503
2
Lorinda_Cherry:lorinda cherry lorinda cherry computer programmer received masters computer science stevens institute technology 1969 joined bell labs 1972 assembly language programmer worked unix operating system several years cherry worked mathematical tools bc dc co-authored eqn brian kernighan work libplot inspired later gnu plotutils package also worked analyzing federalist papers compressing digital phone books non-mathematical work included dictionary unix spell checker bell labs writer workbench wwb writer workbench meant help students learn edit work feeling lot tools value education much pointing people learning write choices make choices ’ think writing task making choices per se get paper think ’ cast stone makes edit cherry also contributed plan 9 operating system cowrote typing documents unix system using –ms –mcs macros troff mike lesk unix tenth edition manual coded non-dictionary based spellchecker typo conceived bob morris lorinda cherry also worked lee mcmahon along morris collecting substantial corpus text studying statistically tools particularly uniq comm became staples work came remarkable typo spotted typing errors statistical inference cherry ’ work approximate parsing aho ’ fast pattern search turned right foundation english style-appraiser suggested prof. william vesterman rutgers turn elaborated writer workbench nina macdonald others human performance engineering department cherry one three co-inventors patent method system verifying status 911 emergency telephone services cherry raced rally cars hobby cherry always fascinated text processing
[ 1389, 5946, 6470, 217, 336 ]
Train
5,504
2
C-list_(computer_security):c-list computer security capability-based computer security c-list array capabilities usually associated process maintained kernel program running process manipulate capabilities directly refers via c-list indexes—integers indexing c-list file descriptor table unix example c-list unix processes manipulate file descriptors directly refer via file descriptor numbers c-list indexes keykos eros operating systems process capability registers constitute c-list
[ 180, 2859, 7072, 7554, 2090, 8111, 7570, 2615, 7414, 6019, 4771 ]
Test
5,505
5
GroupDAV:groupdav groupdav computer protocol used connect open source groupware clients open source groupware servers primary design goal simple possible implement focusing end-user issues open source applications extremely extensive command set based subset webdav client side groupdav implementations exist kde kontact evolution thunderbird outlook work mozilla calendar project progress servers include opengroupware.org sogo citadel system egroupware addition webdav caldav carddav server implicitly groupdav v2 server groupdav relationship caldav viewed differently different developers earliest implementors intended protocol complementary caldav effort caldav provides extensive operations calendar folders others positioned groupdav leading protocol citing caldav excessive complexity source interoperability bugs dichotomy likely become irrelevant future however straightforward server simultaneously support variants groupdav considered subset caldav rfc 4791 carddav rfc 6352 intended less complex applications
[ 7975, 1912 ]
Test
5,506
9
Rust_(programming_language):rust programming language rust multi-paradigm system programming language focused safety especially safe concurrency rust syntactically similar c++ designed provide better memory safety maintaining high performance rust originally designed graydon hoare mozilla research contributions dave herman brendan eich others designers refined language writing servo layout browser engine rust compiler compiler free open-source software dual-licensed mit license apache license 2.0 rust loved programming language stack overflow developer survey 2016 2017 2018 2019 rust intended language highly concurrent highly safe systems programming large creating maintaining boundaries preserve large-system integrity led feature set emphasis safety control memory layout concurrency performance idiomatic rust comparable performance idiomatic c++ concrete syntax rust similar c c++ blocks code delimited curly brackets control flow keywords codice_1 codice_2 codice_3 codice_4 c c++ keywords implemented however rust functions use keyword codice_5 pattern matching less familiar versed languages despite superficial resemblance c c++ syntax rust deeper sense closer ml family languages haskell language nearly every part function body expression even control flow operators example ordinary codice_1 expression also takes place function need end codice_7 expression case last expression function creates return value system designed memory safe permit null pointers dangling pointers data races safe code data values initialized fixed set forms require inputs already initialized replicate function languages pointers either valid codice_8 linked list binary tree data structures rust core library provides option type used test pointer codice_9 value codice_10 rust also introduces added syntax manage lifetimes compiler reasons borrow checker rust use automated garbage collection system like used go java .net framework instead memory resources managed resource acquisition initialization raii convention optional reference counting rust provides deterministic management resources low overhead rust also favors stack allocation values perform implicit boxing also concept references using codice_11 symbol involve run-time reference counting safety using pointers verified compile time borrow checker preventing dangling pointers forms undefined behavior rust ownership system values unique owner scope value scope owner values passed immutable reference using codice_12 mutable reference using codice_13 value using codice_14 times either multiple immutable references one mutable reference rust compiler enforces rules compile time also checks references valid type system supports mechanism similar type classes called traits inspired directly haskell language facility ad hoc polymorphism achieved adding constraints type variable declarations features haskell higher-kinded polymorphism yet supported rust features type inference variables declared keyword codice_15 variables require value initially assigned determine type compile-time error results branch code fails assign value variable variables assigned multiple times must marked keyword codice_16 functions given generic parameters usually require generic type implement certain trait traits within function generic value used traits means generic function type-checked soon defined contrast c++ templates fundamentally duck typed checked instantiated concrete types c++ concepts address issue expected part c++20 2020 however implementation rust generics similar typical implementation c++ templates separate copy code generated instantiation called monomorphization contrasts type erasure scheme typically used java haskell benefit monomorphization optimized code specific use case drawback increased compile time size resulting binaries object system within rust based around implementations traits structured types implementations fulfill role similar classes within languages defined keyword codice_17 inheritance polymorphism provided traits allow methods defined mixed implementations structured types used define fields implementations traits define fields traits provide inheritance among benefits prevents diamond problem multiple inheritance c++ words rust supports interface inheritance replaces implementation inheritance composition see composition inheritance language grew personal project begun 2006 mozilla employee graydon hoare stated project possibly named rust family fungi mozilla began sponsoring project 2009 announced 2010 year work shifted initial compiler written ocaml self-hosting compiler written rust named successfully compiled 2011. uses llvm back end first numbered pre-alpha release rust compiler occurred january 2012 rust 1.0 first stable release released may 15 2015 following 1.0 stable point releases delivered every six weeks features developed nightly rust tested alpha beta releases last six weeks along conventional static typing version 0.4 rust also supported typestates typestate system modeled assertions program statements use special codice_18 statement discrepancies could discovered compile time rather program running might case assertions c c++ code typestate concept unique rust first introduced language nil typestates removed practice little used though function still achieved branding pattern style object system changed considerably within versions 0.2 0.3 0.4 rust version 0.2 introduced classes first time version 0.3 adding several features including destructors polymorphism use interfaces rust 0.4 traits added means provide inheritance interfaces unified traits removed separate feature classes also removed replaced combination implementations structured types starting rust 0.9 ending rust 0.11 rust two built-in pointer types codice_19 codice_20 simplifying core memory model reimplemented pointer types standard library codice_21 removed codice_22 january 2014 editor-in-chief dr dobb andrew binstock commented rust chances become competitor c++ upcoming languages go nim nimrod according binstock rust widely viewed remarkably elegant language adoption slowed changed repeatedly versions rust third-most-loved programming language 2015 stack overflow annual survey took first place 2016 2017 2018 2019 language referenced oxidised metal simple hello world program written rust codice_23 macro prints message standard output fn main fn factorial u64 u64 fn factorial u64 u64 fn factorial u64 u64 web browser several related components written rust including many operating systems os related components written rust january 2019 oses included blogos intermezzos quiltos redox rustos rux tefflin tock wikipedia articles exist
[ 5021, 6428, 6802, 3968, 403, 4705, 1804, 5055, 6458, 7557, 6118, 4352, 7213, 775, 1889, 7587, 2619, 5091, 445, 1152, 6507, 5454, 3684, 4755, 1158, 4759, 6882, 7246, 2639, 4039, 7975, 5117, 3368, 1556, 1190, 831, 486, 1198, 5143, 5846, 4...
Validation
5,507
2
Chunking_(computing):chunking computing computer programming chunking multiple meanings typical modern software systems allocate memory dynamically structures known heaps calls made heap-management routines allocate free memory heap management involves computation time performance issue chunking refers strategies improving performance using special knowledge situation aggregate related memory-allocation requests example known certain kind object typically required groups eight instead allocating freeing object individually making sixteen calls heap manager one could allocate free array eight objects reducing number calls two chunking specific feature http 1.1 protocol meaning opposite used memory management refers facility allows inconveniently large messages broken conveniently-sized smaller chunks
[ 126 ]
Validation
5,508
1
CJK_Dictionary_Institute:cjk dictionary institute cjk dictionary institute inc. cjki japan-based dictionary compilation company headed jack halpern specializes chinese japanese korean arabic lexicography well compilation maintenance large-scale lexical databases notable works include forthcoming cjki arabic learner dictionary kodansha kanji learner dictionary known introducing skip system kanji indexing patterns popular method kanji indexing addition printed works cjki produces language-oriented mobile applications ios android various electronic dictionaries include large number technical dictionaries covering subjects mechanical engineering economics medicine cjki maintains licenses large-scale lexical databases covering total approximately 24 million entries japanese chinese korean arabic notably database arabic names dan contains 6.5 million entries designed security applications e.g terrorist watchlists anti-money laundering systems customer identity management systems general natural language processing cjki ’ databases currently licensed number software development companies including fujitsu sony ibm google microsoft yahoo amazon cjki also responsible producing academic papers regarding technological linguistic issues pertaining chinese japanese korean arabic include papers discussing natural language processing use dictionaries language education 2009 paper introduces cjki arabic romanization system cars new arabic romanization including indications word stress vowel neutralization jack halpern founder ceo cjk dictionary institute linguist entrepreneur halpern speaker 10 languages editor chief kodansha kanji learner ’ dictionary addition work cjki halpern avid unicyclist founding serving executive director international development international unicycling federation lived japan 30 years
[ 5429, 1696 ]
Validation
5,509
4
Global_surveillance_disclosures_(2013–present):global surveillance disclosures 2013–present ongoing news reports international media revealed operational details united states national security agency nsa international partners global surveillance foreign nationals u.s. citizens reports mostly emanate cache top secret documents leaked ex-nsa contractor edward snowden obtained whilst working booz allen hamilton one largest contractors defense intelligence united states addition trove u.s. federal documents snowden cache reportedly contains thousands australian british canadian intelligence files accessed via exclusive five eyes network june 2013 first snowden documents published simultaneously washington post guardian attracting considerable public attention disclosure continued throughout 2013 small portion estimated full cache documents later published media outlets worldwide notably new york times united states canadian broadcasting corporation australian broadcasting corporation der spiegel germany globo brazil le monde france l'espresso italy nrc handelsblad netherlands dagbladet norway el país spain sveriges television sweden media reports shed light implications several secret treaties signed members ukusa community efforts implement global surveillance example der spiegel revealed german foreign intelligence service bnd transfers massive amounts intercepted data nsa swedish television revealed national defence radio establishment fra provided nsa data cable collection secret treaty signed 1954 bilateral cooperation surveillance security intelligence agencies involved practice global surveillance include australia asd britain gchq canada csec denmark pet france dgse germany bnd italy aise netherlands aivd norway nis spain cni switzerland ndb singapore sid well israel isnu receives raw unfiltered data u.s. citizens shared nsa june 14 2013 united states prosecutors charged edward snowden espionage theft government property late july 2013 granted one-year temporary asylum russian government contributing deterioration russia–united states relations august 6 2013 u.s. president barack obama made public appearance national television told americans n't domestic spying program spying americans towards end october 2013 british prime minister david cameron warned guardian publish leaks receive da-notice november 2013 criminal investigation disclosure undertaken britain metropolitan police service december 2013 guardian editor alan rusbridger said published think 26 documents far 58,000 've seen extent media reports responsibly informed public disputed january 2014 obama said sensational way disclosures come often shed heat light critics sean wilentz noted many snowden documents released concern domestic surveillance us uk defense establishment weigh strategic harm period following disclosures heavily civic public benefit first assessment disclosures pentagon concluded snowden committed biggest theft u.s. secrets history united states sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever barton gellman pulitzer prize–winning journalist led washington post coverage snowden disclosures summarized leaks follows disclosure revealed specific details nsa close cooperation u.s. federal agencies federal bureau investigation fbi central intelligence agency cia addition agency previously undisclosed financial payments numerous commercial partners telecommunications companies well previously undisclosed relationships international partners britain france germany secret treaties foreign governments recently established sharing intercepted data citizens disclosures made public course several months since june 2013 press several nations trove leaked former nsa contractor edward j. snowden obtained trove working booz allen hamilton george brandis attorney-general australia asserted snowden disclosure serious setback western intelligence since second world war global surveillance programs include nsa also getting data directly telecommunications companies codenamed artifice lithium serenade steelknight x real identities companies behind codenames included snowden document dump protected exceptionally controlled information prevents wide circulation even like snowden otherwise necessary security clearance although exact size snowden disclosure remains unknown following estimates put various government officials contractor nsa snowden granted access u.s. government documents along top secret documents several allied governments via exclusive five eyes network snowden claims currently physical possession documents surrendered copies journalists met hong kong according lawyer snowden pledged release documents russia leaving responsibility disclosures solely journalists 2014 following news outlets accessed documents provided snowden australian broadcasting corporation canadian broadcasting corporation channel 4 der spiegel el pais el mundo l'espresso le monde nbc nrc handelsblad dagbladet globo south china morning post süddeutsche zeitung sveriges television guardian new york times washington post 1970s nsa analyst perry fellwock pseudonym winslow peck revealed existence ukusa agreement forms basis echelon network whose existence revealed 1988 lockheed employee margaret newsham months september 11 attacks aftermath details global surveillance apparatus provided various individuals former mi5 official david shayler journalist james bamford followed aftermath snowden revelations pentagon concluded snowden committed biggest theft u.s. secrets history united states australia coalition government described leaks damaging blow dealt australian intelligence history sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever april 2012 nsa contractor edward snowden began downloading documents year snowden made first contact journalist glenn greenwald employed guardian contacted documentary filmmaker laura poitras january 2013 may 2013 snowden went temporary leave position nsa citing pretext receiving treatment epilepsy towards end may traveled hong kong greenwald poitras guardian defence intelligence correspondent ewen macaskill flew hong kong meet snowden u.s.-based editor guardian janine gibson held several meetings new york city decided greenwald poitras guardian defence intelligence correspondent ewen macaskill would fly hong kong meet snowden june 5 first media report based leaked material guardian exposed top secret court order showing nsa collected phone records 120 million verizon subscribers order numbers parties call well location data unique identifiers time call duration call handed fbi turned records nsa according wall street journal verizon order part controversial data program seeks stockpile records calls made u.s. collect information directly t-mobile us verizon wireless part foreign ownership ties june 6 2013 second media disclosure revelation prism surveillance program collects e-mail voice text video chats foreigners unknown number americans microsoft google facebook yahoo apple tech giants published simultaneously guardian washington post der spiegel revealed nsa spying multiple diplomatic missions european union eu united nations headquarters new york specific episodes within four-year period nsa hacked several chinese mobile-phone companies chinese university hong kong tsinghua university beijing asian fiber-optic network operator pacnet australia canada new zealand uk explicitly exempted nsa attacks whose main target eu germany method bugging encrypted fax machines used eu embassy codenamed dropmire 2009 g-20 london summit british intelligence agency government communications headquarters gchq intercepted communications foreign diplomats addition gchq intercepting storing mass quantities fiber-optic traffic via tempora two principal components tempora called mastering internet mti global telecoms exploitation data preserved three days metadata kept thirty days data collected gchq tempora shared national security agency nsa united states 2001 2011 nsa collected vast amounts metadata records detailing email internet usage americans via stellar wind later terminated due operational resource constraints subsequently replaced newer surveillance programs shelltrumpet processed one trillionth metadata record end december 2012 nsa follows specific procedures target non-u.s. persons minimize data collection u.s. persons court-approved policies allow nsa according boundless informant 97 billion pieces intelligence collected 30-day period ending march 2013 97 billion sets information 3 billion data sets originated u.s. computer networks around 500 million metadata records collected german networks august 2013 revealed bundesnachrichtendienst bnd germany transfers massive amounts metadata records nsa der spiegel disclosed germany targeted country 27 members european union due nsa systematic monitoring storage germany telephone internet connection data according magazine nsa stores data around half billion communications connections germany month data includes telephone calls emails mobile-phone text messages chat transcripts nsa gained massive amounts information captured monitored data traffic europe example december 2013 nsa gathered average day metadata 15 million telephone connections 10 million internet datasets nsa also monitored european commission brussels monitored eu diplomatic facilities washington united nations placing bugs offices well infiltrating computer networks u.s. government made part upstream data collection program deals companies ensure access hence capability surveil undersea fiber-optic cables deliver e-mails web pages electronic communications phone calls one continent another speed light according brazilian newspaper globo nsa spied millions emails calls brazilian citizens australia new zealand involved joint operation nsa global analytical system xkeyscore among numerous allied facilities contributing xkeyscore four installations australia one new zealand globo released nsa document titled revealed specific locations codenames fornsat intercept stations 2002 according edward snowden nsa established secret intelligence partnerships many western governments foreign affairs directorate fad nsa responsible partnerships according snowden organized foreign governments insulate political leaders public outrage event global surveillance partnerships leaked interview published der spiegel snowden accused nsa bed together germans nsa granted german intelligence agencies bnd foreign intelligence bfv domestic intelligence access controversial xkeyscore system return bnd turned copies two systems named mira4 veras reported exceed nsa sigint capabilities certain areas every day massive amounts metadata records collected bnd transferred nsa via bad aibling station near munich germany december 2012 alone bnd handed 500 million metadata records nsa document dated january 2013 nsa acknowledged efforts bnd undermine privacy laws according nsa document dated april 2013 germany become nsa prolific partner section separate document leaked snowden titled success stories nsa acknowledged efforts german government expand bnd international data sharing partners addition german government well aware prism surveillance program long edward snowden made details public according angela merkel spokesman steffen seibert two separate prism programs – one used nsa used nato forces afghanistan two programs identical guardian revealed details nsa xkeyscore tool allows government analysts search vast databases containing emails online chats browsing histories millions individuals without prior authorization microsoft developed surveillance capability deal interception encrypted chats outlook.com within five months service went testing nsa access outlook.com emails prism collects data prior encryption addition microsoft worked fbi enable nsa gain access cloud storage service skydrive internal nsa document dating august 3 2012 described prism surveillance program team sport even reason suspect u.s. citizens wrongdoing cia national counterterrorism center allowed examine federal government files possible criminal behavior previously ntc barred unless person terror suspect related investigation snowden also confirmed stuxnet cooperatively developed united states israel report unrelated edward snowden french newspaper le monde revealed france dgse also undertaking mass surveillance described illegal outside serious control documents leaked edward snowden seen süddeutsche zeitung sz norddeutscher rundfunk revealed several telecom operators played key role helping british intelligence agency government communications headquarters gchq tap worldwide fiber-optic communications telecom operators assigned particular area international fiber-optic network individually responsible following networks infiltrated gchq tat-14 europe-usa atlantic crossing 1 europe-usa circe south france-uk circe north netherlands-uk flag atlantic-1 flag europa-asia sea-me-we 3 southeast asia-middle east-western europe sea-me-we 4 southeast asia-middle east-western europe solas ireland-uk uk-france 3 uk-netherlands 14 ulysses europe-uk yellow uk-usa pan european crossing telecommunication companies participated forced choice matter companies subsequently paid gchq participation infiltration cables according sz gchq access majority internet telephone communications flowing throughout europe listen phone calls read emails text messages see websites internet users around world visiting also retain analyse nearly entire european internet traffic gchq collecting data transmitted united kingdom northern europe via undersea fibre optic telecommunications cable sea-me-we 3 security intelligence division sid singapore co-operates australia accessing sharing communications carried sea-me-we-3 cable australian signals directorate asd also partnership british american singaporean intelligence agencies tap undersea fibre optic telecommunications cables link asia middle east europe carry much australia international phone internet traffic u.s. runs top-secret surveillance program known special collection service scs based 80 u.s. consulates embassies worldwide nsa hacked united nations video conferencing system summer 2012 violation un agreement nsa intercepting communications americans direct contact foreigners targeted overseas also searching contents vast amounts e-mail text communications country americans mention information foreigners surveillance also spied al jazeera gained access internal communications systems nsa built surveillance network capacity reach roughly 75 u.s. internet traffic u.s. law-enforcement agencies use tools used computer hackers gather information suspects internal nsa audit may 2012 identified 2776 incidents i.e violations rules court orders surveillance americans foreign targets u.s. period april 2011 march 2012 u.s. officials stressed mistakes intentional fisa court supposed provide critical oversight u.s. government vast spying programs limited ability must trust government report improperly spies americans legal opinion declassified august 21 2013 revealed nsa intercepted three years many 56,000 electronic communications year americans suspected links terrorism fisa court oversees surveillance found operation unconstitutional 2011 corporate partner access project major u.s. telecommunications providers receive hundreds millions dollars year nsa voluntary cooperation nsa providers global communications took 1970s cover name blarney letter drafted obama administration specifically inform congress government mass collection americans telephone communications data withheld lawmakers leaders house intelligence committee months key vote affecting future program nsa paid gchq £100 million 2009 2012 exchange funds gchq must pull weight seen pull weight documents referenced article explain weaker british laws regarding spying selling point nsa gchq also developing technology exploit mobile phone time nsa legal authority secret backdoor databases gathered large internet companies enabling search u.s. citizens email phone calls without warrant privacy civil liberties oversight board urged u.s. intelligence chiefs draft stronger us surveillance guidelines domestic spying finding several guidelines updated 30 years u.s. intelligence analysts deliberately broken rules designed prevent spying americans choosing ignore so-called minimisation procedures aimed protecting privacy used nsa agency enormous eavesdropping power spy love interests u.s. foreign secret intelligence court ruled october 2011 nsa activities unconstitutional agency paid millions dollars major internet companies cover extra costs incurred involvement prism surveillance program mastering internet mti part interception modernisation programme imp british government involves insertion thousands dpi deep packet inspection black boxes various internet service providers revealed british media 2009 2013 revealed nsa made £17.2 million financial contribution project capable vacuuming signals 200 fibre-optic cables physical points entry great britain guardian new york times reported secret documents leaked snowden showing nsa collaboration technology companies part aggressive multipronged effort weaken encryption used commercial software gchq team dedicated cracking hotmail google yahoo facebook traffic germany domestic security agency bundesverfassungsschutz bfv systematically transfers personal data german residents nsa cia seven members united states intelligence community exchange information espionage software israel sweden italy also cooperating american british intelligence agencies secret treaty codenamed lustre french intelligence agencies transferred millions metadata records nsa obama administration secretly permission foreign intelligence surveillance court 2011 reverse restrictions national security agency use intercepted phone calls e-mails permitting agency search deliberately americans communications massive databases searches take place surveillance program congress authorized 2008 section 702 foreign intelligence surveillance act law target must foreigner reasonably believed outside united states court must approve targeting procedures order good one year warrant target would thus longer required means communications americans could picked without court first determining probable cause people talking terrorists spies foreign powers fisc extended length time nsa allowed retain intercepted u.s. communications five years six years extension possible foreign intelligence counterintelligence purposes measures done without public debate specific authority congress special branch nsa called follow money ftm monitors international payments banking credit card transactions later stores collected data nsa financial databank tracfin nsa monitored communications brazil president dilma rousseff top aides agency also spied brazil oil firm petrobras well french diplomats gained access private network ministry foreign affairs france swift network united states nsa uses analysis phone call e-mail logs american citizens create sophisticated graphs social connections identify associates locations certain times traveling companions personal information nsa routinely shares raw intelligence data israel without first sifting remove information u.s. citizens effort codenamed genie computer specialists control foreign computer networks using covert implants form remotely transmitted malware tens thousands devices annually worldwide sales smartphones began exceeding feature phones nsa decided take advantage smartphone boom particularly advantageous smartphone combines myriad data would interest intelligence agency social contacts user behavior interests location photos credit card numbers passwords internal nsa report 2010 stated spread smartphone occurring extremely rapidly —developments certainly complicate traditional target analysis according document nsa set task forces assigned several smartphone manufacturers operating systems including apple inc. iphone ios operating system well google android mobile operating system similarly britain gchq assigned team study crack blackberry heading iphone capability document notes smaller nsa programs known scripts perform surveillance 38 different features ios 3 ios 4 operating systems include mapping feature voicemail photos well google earth facebook yahoo messenger september 9 2013 internal nsa presentation iphone location services published der spiegel one slide shows scenes apple 1984 -themed television commercial alongside words knew 1984 ... another shows steve jobs holding iphone text ... would big brother ... third shows happy consumers iphones completing question ... zombies would paying customers october 4 2013 washington post guardian jointly reported nsa gchq made repeated attempts spy anonymous internet users communicating secret via anonymity network tor several surveillance operations involved implantation malicious code computers tor users visit particular websites nsa gchq partly succeeded blocking access anonymous network diverting tor users insecure channels government agencies also able uncover identity anonymous internet users communications security establishment cse using program called olympia map communications brazil mines energy ministry targeting metadata phone calls emails ministry australian federal government knew prism surveillance program months edward snowden made details public nsa gathered hundreds millions contact lists personal e-mail instant messaging accounts around world agency target individuals instead collected contact lists large numbers amount sizable fraction world e-mail instant messaging accounts analysis data enables agency search hidden connections map relationships within much smaller universe foreign intelligence targets nsa monitored public email account former mexican president felipe calderón thus gaining access communications high-ranking cabinet members emails several high-ranking members mexico security forces text mobile phone communication current mexican president enrique peña nieto nsa tries gather cellular landline phone numbers—often obtained american diplomats—for many foreign officials possible contents phone calls stored computer databases regularly searched using keywords nsa monitoring telephone conversations 35 world leaders u.s. government first public acknowledgment tapped phones world leaders reported october 28 2013 wall street journal internal u.s. government review turned nsa monitoring 35 world leaders gchq tried keep mass surveillance program secret feared damaging public debate scale activities could lead legal challenges guardian revealed nsa monitoring telephone conversations 35 world leaders given numbers official another u.s. government department confidential memo revealed nsa encouraged senior officials departments white house state pentagon share rolodexes agency could add telephone numbers leading foreign politicians surveillance systems reacting news german leader angela merkel arriving brussels eu summit accused u.s. breach trust saying need trust allies partners must established repeat spying among friends acceptable anyone goes every citizen germany nsa collected 2010 data ordinary americans cellphone locations later discontinued operational value britain muscular programme nsa gchq secretly broken main communications links connect yahoo google data centers around world thereby gained ability collect metadata content hundreds millions user accounts mobile phone german chancellor angela merkel might tapped u.s. intelligence according spiegel monitoring goes back 2002 ended summer 2013 new york times reported germany evidence nsa surveillance merkel began george w. bush tenure learning der spiegel magazine nsa listening personal mobile phone merkel compared snooping practices nsa stasi reported march 2014 der spiegel merkel also placed nsa surveillance list alongside 122 world leaders october 31 2013 hans-christian ströbele member german bundestag met snowden moscow revealed former intelligence contractor readiness brief german government nsa spying highly sensitive signals intelligence collection program known stateroom involves interception radio telecommunications internet traffic operated diplomatic missions five eyes australia britain canada new zealand united states numerous locations around world program conducted u.s. diplomatic missions run concert u.s. intelligence agencies nsa cia joint venture group called special collection service scs whose members work undercover shielded areas american embassies consulates officially accredited diplomats enjoy special privileges diplomatic protection able look listen unhindered scs example used american embassy near brandenburg gate berlin monitor communications germany government district parliament seat government stateroom surveillance programme australia operates clandestine surveillance facilities intercept phone calls data across much asia france nsa targeted people belonging worlds business politics french state administration nsa monitored recorded content telephone communications history connections target i.e metadata actual surveillance operation performed french intelligence agencies behalf nsa cooperation france nsa confirmed director nsa keith b. alexander asserted foreign intelligence services collected phone records war zones areas outside borders provided nsa french newspaper le monde also disclosed new prism upstream slides see page 4 7 8 coming prism/us-984xn overview presentation spain nsa intercepted telephone conversations text messages emails millions spaniards spied members spanish government december 10 2012 january 8 2013 nsa collected metadata 60 million telephone calls spain according documents leaked snowden surveillance spanish citizens jointly conducted nsa intelligence agencies spain new york times reported nsa carries eavesdropping effort dubbed operation dreadnought iranian leader ayatollah ali khamenei 2009 visit iranian kurdistan agency collaborated gchq u.s. national geospatial-intelligence agency collecting radio transmissions aircraft airports examining khamenei convoy satellite imagery enumerating military radar stations according story objective operation communications fingerprinting ability distinguish khamenei communications people iran story revealed operation code-named ironavenger nsa intercepted e-mails sent country allied united states government adversary ally conducting spear-phishing attack e-mails contained malware nsa gathered documents login credentials belonging enemy country along knowledge ally capabilities attacking computers according british newspaper independent british intelligence agency gchq maintains listening post roof british embassy berlin capable intercepting mobile phone calls wi-fi data long-distance communications german capital including adjacent government buildings reichstag seat german parliament chancellery seat germany head government clustered around brandenburg gate operating code-name quantum insert gchq set fake website masquerading linkedin social website used professional networking part efforts install surveillance software computers telecommunications operator belgacom addition headquarters oil cartel opec infiltrated gchq well nsa bugged computers nine opec employees monitored general secretary opec three years gchq using automated monitoring system code-named royal concierge infiltrate reservation systems least 350 prestigious hotels many different parts world order target search analyze reservations detect diplomats government officials first tested 2010 aim royal concierge track travel plans diplomats often supplemented surveillance methods related human intelligence humint covert operations include wiretapping room telephones fax machines used targeted hotels well monitoring computers hooked hotel network november 2013 australian broadcasting corporation guardian revealed australian signals directorate dsd attempted listen private phone calls president indonesia wife indonesian foreign minister marty natalegawa confirmed president contacted ambassador canberra natalegawa said tapping indonesian politicians personal phones violates every single decent legal instrument think of—national indonesia national australia international well high-ranking indonesian politicians targeted dsd include carrying title 3g impact update classified presentation leaked snowden revealed attempts asd/dsd keep pace rollout 3g technology indonesia across southeast asia asd/dsd motto placed bottom page reads reveal secrets—protect secret deal approved british intelligence officials nsa storing analyzing internet email records uk citizens since 2007 nsa also proposed 2005 procedure spying citizens uk five-eyes nations alliance even partner government explicitly denied u.s. permission proposal partner countries must neither informed particular type surveillance procedure towards end november new york times released internal nsa report outlining agency efforts expand surveillance abilities five-page document asserts law united states kept needs nsa conduct mass surveillance golden age signals intelligence grounds optimism nsa words report titled sigint strategy 2012–2016 also said u.s. try influence global commercial encryption market commercial relationships emphasized need revolutionize analysis vast data collection radically increase operational impact november 23 2013 dutch newspaper nrc handelsblad reported netherlands targeted u.s. intelligence agencies immediate aftermath world war ii period surveillance lasted 1946 1968 also included interception communications european countries including belgium france west germany norway dutch newspaper also reported nsa infected 50,000 computer networks worldwide often covertly malicious spy software sometimes cooperation local authorities designed steal sensitive information according classified documents leaked snowden australian signals directorate asd formerly known defence signals directorate offered share intelligence information collected intelligence agencies ukusa agreement data shared foreign countries include bulk unselected unminimised metadata collected asd provided information condition australian citizens targeted time asd assessed unintentional collection metadata australian nationals viewed significant issue target later identified australian national asd required contacted ensure warrant could sought consideration given whether medical legal religious information would automatically treated differently types data however decision made agency would make determinations case-by-case basis leaked material specify asd collected intelligence information however section 7 intelligence services act 2001 commonwealth states asd role ... obtain intelligence capabilities intentions activities people organisations outside australia ... possible asd metadata intelligence holdings focused foreign intelligence collection within bounds australian law washington post revealed nsa tracking locations mobile phones world tapping cables connect mobile networks globally serve u.s. cellphones well foreign ones process nsa collects five billion records phone locations daily basis enables nsa analysts map cellphone owners relationships correlating patterns movement time thousands millions phone users cross paths washington post also reported gchq nsa make use location data advertising tracking files generated normal internet browsing cookies operated google known pref pinpoint targets government hacking bolster surveillance norwegian intelligence service nis cooperates nsa gained access russian targets kola peninsula civilian targets general nis provides information nsa politicians energy armament top secret memo nsa lists following years milestones norway–united states america sigint agreement norus agreement nsa considers nis one reliable partners agencies also cooperate crack encryption systems mutual targets according nsa norway made objections requests nis december 5 sveriges television reported national defence radio establishment fra conducting clandestine surveillance operation sweden targeting internal politics russia operation conducted behalf nsa receiving data handed fra swedish-american surveillance operation also targeted russian energy interests well baltic states part ukusa agreement secret treaty signed 1954 sweden united states united kingdom canada australia new zealand regarding collaboration intelligence sharing result snowden disclosures notion swedish neutrality international politics called question internal document dating year 2006 nsa acknowledged relationship sweden protected top secret level nation political neutrality specific details sweden cooperation members ukusa agreement include according documents leaked snowden special source operations nsa sharing information containing logins cookies googleprefid tailored access operations division nsa well britain gchq agency 2010 g-20 toronto summit u.s. embassy ottawa transformed security command post six-day spying operation conducted nsa closely coordinated communications security establishment canada csec goal spying operation among others obtain information international development banking reform counter trade protectionism support u.s. policy goals behalf nsa csec set covert spying posts 20 countries around world italy special collection service nsa maintains two separate surveillance posts rome milan according secret nsa memo dated september 2010 italian embassy washington d.c. targeted two spy operations nsa due concerns terrorist criminal networks may secretly communicating via computer games nsa gchq cia fbi conducting surveillance scooping data networks many online games including massively multiplayer online role-playing games mmorpgs world warcraft well virtual worlds second life xbox gaming console nsa cracked commonly used cellphone encryption technology a5/1 according classified document leaked snowden agency process encrypted a5/1 even acquired encryption key addition nsa uses various types cellphone infrastructure links carrier networks determine location cellphone user tracked visitor location registers us district court judge district columbia richard leon declared december 16 2013 mass collection metadata americans telephone records national security agency probably violates fourth amendment prohibition unreasonable searches seizures leon granted request preliminary injunction blocks collection phone data two private plaintiffs larry klayman conservative lawyer charles strange father cryptologist killed afghanistan helicopter shot 2011 ordered government destroy records gathered judge stayed action ruling pending government appeal recognizing 68-page opinion significant national security interests stake case novelty constitutional issues however federal judge william h. pauley iii new york city ruled u.s. government global telephone data-gathering system needed thwart potential terrorist attacks work everyone calls swept u.s. district judge pauley also ruled congress legally set program violate anyone constitutional rights judge also concluded telephone data swept nsa belong telephone users telephone companies ruled nsa obtains data telephone companies probes find links callers potential terrorists use data even search fourth amendment also concluded controlling precedent smith v. maryland smith bedrock holding individual legitimate expectation privacy information provided third parties judge pauley wrote american civil liberties union declared january 2 2012 appeal judge pauley ruling nsa bulk phone record collection legal government legitimate interest tracking associations suspected terrorists tracking associations require government subject every citizen permanent surveillance deputy aclu legal director jameel jaffer said statement recent years american british intelligence agencies conducted surveillance 1,100 targets including office israeli prime minister heads international aid organizations foreign energy companies european union official involved antitrust battles american technology businesses catalog high-tech gadgets software developed nsa tailored access operations tao leaked german news magazine der spiegel dating 2008 catalog revealed existence special gadgets modified capture computer screenshots usb flash drives secretly fitted radio transmitters broadcast stolen data airwaves fake base stations intended intercept mobile phone signals well many secret devices software implants listed tailored access operations tao division nsa intercepted shipping deliveries computers laptops order install spyware physical implants electronic gadgets done close cooperation fbi cia nsa officials responded spiegel reports statement said tailored access operations unique national asset front lines enabling nsa defend nation allies tao work centred computer network exploitation support foreign intelligence collection separate disclosure unrelated snowden french trésor public runs certificate authority found issued fake certificates impersonating google order facilitate spying french government employees via man-in-the-middle attacks nsa working build powerful quantum computer capable breaking types encryption effort part us 79.7 million research program known penetrating hard targets involves extensive research carried large shielded rooms known faraday cages designed prevent electromagnetic radiation entering leaving currently nsa close producing basic building blocks allow agency gain complete quantum control two semiconductor qubits quantum computer successfully built would enable nsa unlock encryption protects data held banks credit card companies retailers brokerages governments health care providers according new york times nsa monitoring approximately 100,000 computers worldwide spy software named quantum quantum enables nsa conduct surveillance computers one hand also create digital highway launching cyberattacks hand among targets chinese russian military also trade institutions within european union nyt also reported nsa access alter computers connected internet secret technology use nsa since 2008 prerequisite physical insertion radio frequency hardware spy manufacturer unwitting user technology relies covert channel radio waves transmitted tiny circuit boards usb cards inserted surreptitiously computers cases sent briefcase-size relay station intelligence agencies set miles away target technology also transmit malware back infected computer channel 4 guardian revealed existence dishfire massive database nsa collects hundreds millions text messages daily basis gchq given full access database uses obtain personal information britons exploiting legal loophole day database receives stores following amounts data database supplemented analytical tool known prefer program processes sms messages extract types information including contacts missed call alerts privacy civil liberties oversight board report mass surveillance released january 23 2014 recommends end bulk telephone metadata i.e. bulk phone records – phone numbers dialed call times durations call content collection – collection program create special advocate involved cases fisa court judge release future past fisc decisions involve novel interpretations fisa significant questions law technology compliance according joint disclosure new york times guardian propublica nsa gchq begun working together collect store data dozens smartphone application software 2007 latest 2008 gchq report leaked snowden asserts anyone using google maps smartphone working support gchq system nsa gchq traded recipes various purposes grabbing location data journey plans made target uses google maps vacuuming address books buddy lists phone logs geographic data embedded photos posted mobile versions numerous social networks facebook flickr linkedin twitter services separate 20-page report dated 2012 gchq cited popular smartphone game angry birds example application could used extract user data taken together forms data collection would allow agencies collect vital information user life including home country current location geolocation age gender zip code marital status income ethnicity sexual orientation education level number children etc gchq document dated august 2012 provided details squeaky dolphin surveillance program enables gchq conduct broad real-time monitoring various social media features social media traffic youtube video views like button facebook blogspot/blogger visits without knowledge consent companies providing social media features agency squeaky dolphin program collect analyze utilize youtube facebook blogger data specific situations real time analysis purposes program also collects addresses billions videos watched daily well user information analysis purposes 2009 united nations climate change conference copenhagen nsa five eyes partners monitored communications delegates numerous countries done give policymakers negotiating advantage communications security establishment canada csec tracking canadian air passengers via free wi-fi services major canadian airport passengers exited airport terminal continued tracked showed wi-fi locations across canada csec document dated may 2012 agency described gained access two communications systems 300,000 users order pinpoint specific imaginary target operation executed behalf nsa trial run test new technology capable tracking target makes occasional forays cities/regions technology subsequently shared canada five eyes partners – australia new zealand britain united states according research süddeutsche zeitung tv network ndr mobile phone former german chancellor gerhard schröder monitored 2002 onwards reportedly government opposition military intervention iraq source latest information document leaked edward snowden document containing information national sigint requirement list nsrl previously interpreted referring angela merkel mobile however süddeutsche zeitung ndr claim confirmation nsa insiders surveillance authorisation pertains individual political post – 2002 still held schröder according research two media outlets schröder placed number 388 list contains names persons institutions put surveillance nsa gchq launched cyber-attack activist network anonymous using denial-of-service attack dos shut chatroom frequented network members spy attack dubbed rolling thunder conducted gchq unit known joint threat research intelligence group jtrig unit successfully uncovered true identities several anonymous members nsa section 215 bulk telephony metadata program seeks stockpile records calls made u.s. collecting less 30 percent americans call records inability keep pace explosion cellphone use according washington post controversial program permits nsa warrant granted secret foreign intelligence surveillance court record numbers length location every call participating carriers intercept reported u.s. government using primarily nsa surveillance target people drone strikes overseas report intercept author detail flawed methods used locate targets lethal drone strikes resulting deaths innocent people according washington post nsa analysts collectors i.e nsa personnel controls electronic surveillance equipment use nsa sophisticated surveillance capabilities track individual targets geographically real time drones tactical units aimed weaponry targets take unnamed us law firm reported mayer brown targeted australia asd according snowden documents asd offered hand intercepted communications nsa allowed government authorities able continue cover talks providing highly useful intelligence interested us customers nsa gchq documents revealed anti-secrecy organization wikileaks activist groups targeted government surveillance criminal prosecution particular ip addresses visitors wikileaks collected real time us government urged allies file criminal charges founder wikileaks julian assange due organization publication afghanistan war logs wikileaks organization designated malicious foreign actor quoting unnamed nsa official germany bild sonntag reported whilst president obama order stop spying merkel obeyed focus shifted bugging leading government business figures including interior minister thomas de maiziere close confidant merkel caitlin hayden security adviser president obama quoted newspaper report saying us made clear gathers intelligence exactly way states intercept reveals government agencies infiltrating online communities engaging false flag operations discredit targets among people nothing terrorism national security threats two main tactics currently used injection sorts false material onto internet order destroy reputation targets use social sciences techniques manipulate online discourse activism generate outcomes considers desirable guardian reported britain surveillance agency gchq aid national security agency intercepted stored webcam images millions internet users suspected wrongdoing surveillance program codenamed optic nerve collected still images yahoo webcam chats one image every five minutes bulk saved agency databases agency discovered surprising number people use webcam conversations show intimate parts body person estimating 3 11 yahoo webcam imagery harvested gchq contains undesirable nudity nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process nsa relies automated system codenamed turbine essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland eavesdropping bases used agency misawa japan menwith hill england codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates cia accused u.s. senate intelligence committee chairwoman dianne feinstein spying stand-alone computer network established committee investigation allegations cia abuse george w. bush-era detention interrogation program voice interception program codenamed mystic began 2009 along retro short retrospective retrieval retro voice audio recording buffer allows retrieval captured content 30 days past mystic program capable recording 100 percent foreign country telephone calls enabling nsa rewind review conversations 30 days relating metadata capability store 30 days recorded conversations mystic enables nsa pull instant history person movements associates plans march 21 le monde published slides internal presentation communications security establishment canada attributed piece malicious software french intelligence csec presentation concluded list malware victims matched french intelligence priorities found french cultural reference malware code including name babar popular french children character developer name titi french telecommunications corporation orange s.a. shares call data french intelligence agency dgse hands intercepted data gchq nsa spied chinese technology company huawei huawei leading manufacturer smartphones tablets mobile phone infrastructure wlan routers installs fiber optic cable according der spiegel kind technology … decisive nsa battle data supremacy nsa operation named shotgiant able access huawei email archive source code huawei communications products us government longstanding concerns huawei may independent people liberation army chinese government might use equipment manufactured huawei conduct cyberespionage cyberwarfare goals nsa operation assess relationship huawei pla learn chinese government plans use information huawei spy huawei customers including iran afghanistan pakistan kenya cuba former chinese president hu jintao chinese trade ministry banks well telecommunications companies also targeted nsa intercept published document nsa employee discussing build database ip addresses webmail facebook accounts associated system administrators nsa gain access networks systems administer end march 2014 der spiegel intercept published based series classified files archive provided reporters nsa whistleblower edward snowden articles related espionage efforts gchq nsa germany british gchq targeted three german internet firms information internet traffic passing internet exchange points important customers german internet providers technology suppliers well future technical trends business sector company employees nsa granted foreign intelligence surveillance court authority blanket surveillance germany people institutions regardless whether affected suspected committed offense without individualized court order specifying march 7 2013 addition germany chancellor angela merkel listed surveillance search machine database named nymrod along 121 others foreign leaders intercept wrote nsa uses nymrod system 'find information relating targets would otherwise tough track according internal nsa documents nymrod sifts secret reports based intercepted communications well full transcripts faxes phone calls communications collected computer systems 300 'cites merkel listed available intelligence reports transcripts nsa operatives read towards end april edward snowden said united states surveillance agencies spy americans anyone else world contrary anything said government point article published ars technica shows nsa tailored access operations tao employees intercepting cisco router intercept wikileaks revealed information countries communications collected part mystic surveillance program may 19 intercept reported nsa recording archiving nearly every cell phone conversation bahamas system called somalget subprogram mystic mass surveillance occurring without bahamian government permission aside bahamas intercept reported nsa interception cell phone metadata kenya philippines mexico fifth country name due credible concerns could lead increased violence wikileaks released statement may 23 claiming afghanistan unnamed nation statement responding revelations nsa said implication nsa foreign intelligence collection arbitrary unconstrained false global surveillance operations nsa exploits flood images included emails text messages social media videoconferences communications harvest millions images images used nsa sophisticated facial recognition programs track suspected terrorists intelligence targets vodafone revealed secret wires allowed government agencies direct access networks access require warrants direct access wire often equipment locked room six countries vodafone operates law requires telecommunication companies install access allows governments vodafone name countries case governments retaliated imprisoning staff shami chakrabarti liberty said governments access phone calls flick switch unprecedented terrifying snowden revealed internet already treated fair game bluster well wearing pretty thin – analogue laws need digital overhaul vodafone published first law enforcement disclosure report june 6 2014 vodafone group privacy officer stephen deadman said pipes exist direct access model exists making call end direct access means government agencies obtaining people communication data without official warrant external visibility receive demand push back agency fact government issue piece paper important constraint powers used gus hosein director privacy international said never thought telcos would complicit brave step vodafone hopefully telcos become brave disclosure need braver fighting back illegal requests laws above-top-secret documentation covert surveillance program named overseas processing centre 1 opc-1 codenamed circuit gchq published register based documents leaked edward snowden gchq taps undersea fiber optic cables via secret spy bases near strait hormuz yemen bt vodafone implicated danish newspaper dagbladet information intercept revealed june 19 2014 nsa mass surveillance program codenamed rampart-a rampart-a 'third party countries tap fiber optic cables carrying majority world electronic communications secretly allowing nsa install surveillance equipment fiber-optic cables foreign partners nsa turn massive amounts data like content phone calls faxes e-mails internet chats data virtual private networks calls made using voice ip software like skype nsa return partners receive access nsa sophisticated surveillance equipment spy mass data flows territory among partners participating nsa mass surveillance program denmark germany week july 4 31-year-old male employee germany intelligence service bnd arrested suspicion spying united states employee suspected spying german parliamentary committee investigating nsa spying scandal former nsa official whistleblower william binney spoke centre investigative journalism conference london according binney least 80 audio calls metadata recorded stored us nsa lies stores also stated majority fiber optic cables run u.s. accident allows us view communication coming washington post released review cache provided snowden containing roughly 160,000 text messages e-mails intercepted nsa 2009 2012 newspaper concluded nine ten account holders whose conversations recorded agency intended surveillance targets caught net agency cast somebody else analysis post also noted many account holders americans july 9 soldier working within germany federal ministry defence bmvg fell suspicion spying united states result july 4 case one german government expelled cia station chief germany july 17 july 18 former state department official john tye released editorial washington post highlighting concerns data collection executive order 12333 tye concerns rooted classified material access state department though publicly released classified materials intercept reported nsa secretly providing data nearly two dozen u.s. government agencies 'google-like search engine called icreach database intercept reported accessible domestic law enforcement agencies including fbi drug enforcement administration built contain 850 billion metadata records phone calls emails cellphone locations text messages based documents obtained snowden intercept reported nsa gchq broken internal computer network gemalto stolen encryption keys used sim cards later 2010. company world largest manufacturer sim cards making two billion cards year keys intelligence agencies could eavesdrop cell phones without knowledge mobile phone operators foreign governments new zealand herald partnership intercept revealed new zealand government used xkeyscore spy candidates position world trade organization director general also members solomon islands government january 2015 dea revealed collecting metadata records telephone calls made americans 116 countries linked drug trafficking dea program separate telephony metadata programs run nsa april usa today reported dea data collection program began 1992 included telephone calls united states canada mexico current former dea officials described program precursor nsa similar programs dea said program suspended september 2013 review nsa programs ultimately terminated snowden provided journalists intercept gchq documents regarding another secret program karma police calling world biggest data mining operation formed create profiles every visible internet user browsing habits 2009 stored 1.1 trillion web browsing sessions 2012 recording 50 billion sessions per day 2017 disclosures wikileaks dubbed vault7 disclosure provided impetus creation social movements mass surveillance restore fourth actions like stop watching us day fight back legal front electronic frontier foundation joined coalition diverse groups filing suit nsa several human rights organizations urged obama administration prosecute protect whistleblower snowden amnesty international human rights watch transparency international index censorship among others economic front several consumer surveys registered drop online shopping banking activity result snowden revelations domestically president barack obama claimed spying americans white house press secretary jay carney asserted surveillance programs revealed snowden authorized congress international front u.s. attorney general eric holder stated target even foreign persons overseas without valid foreign intelligence purpose prime minister david cameron warned journalists n't demonstrate social responsibility difficult government stand back act deputy prime minister nick clegg emphasized media absolutely defend principle secrecy intelligence agencies foreign secretary william hague claimed take great care balance individual privacy duty safeguard public uk national security hague defended five eyes alliance reiterated british-u.s. intelligence relationship must endangered saved many lives former prime minister tony abbott stated every australian governmental agency every australian official home abroad operates accordance law abbott criticized australian broadcasting corporation unpatriotic due reporting documents provided snowden abbott described traitor foreign minister julie bishop also denounced snowden traitor accused unprecedented treachery bishop defended five eyes alliance reiterated australian–u.s intelligence relationship must endangered saves lives july 2013 chancellor angela merkel defended surveillance practices nsa described united states truest ally throughout decades nsa surveillance merkel revealed however chancellor compared nsa stasi according guardian berlin using controversy nsa spying leverage enter exclusive five eyes alliance interior minister hans-peter friedrich stated americans take data privacy concerns seriously testifying german parliament friedrich defended nsa surveillance cited five terrorist plots german soil prevented nsa however april 2014 another german interior minister criticized united states failing provide sufficient assurances germany reined spying tactics thomas de maiziere close ally merkel told der spiegel u.s. intelligence methods may justified large extent security needs tactics excessive over-the-top minister foreign affairs carl bildt defended fra described surveillance practices national necessity minister defence karin enström said sweden intelligence exchange countries critical security intelligence operations occur within framework clear legislation strict controls parliamentary oversight interior minister ronald plasterk apologized incorrectly claiming nsa collected 1.8 million records metadata netherlands plasterk acknowledged fact dutch intelligence services collected records transferred nsa danish prime minister helle thorning-schmidt praised american intelligence agencies claiming prevented terrorist attacks denmark expressed personal belief danish people grateful americans surveillance later claimed danish authorities basis assuming american intelligence agencies performed illegal spying activities towards denmark danish interests july 2013 german government announced extensive review germany intelligence services august 2013 u.s. government announced extensive review u.s. intelligence services october 2013 british government announced extensive review british intelligence services december 2013 canadian government announced extensive review canada intelligence services january 2014 u.s. president barack obama said sensational way disclosures come often shed heat light critics sean wilentz claimed nsa acted far responsibly claims made leakers publicized press wilentz view leakers gone far beyond justifiably blowing whistle abusive programs addition alarmism u.s. domestic surveillance many snowden documents released thus far nothing whatsoever domestic surveillance edward lucas former moscow bureau chief economist agreed asserting snowden revelations neatly suspiciously fits interests one country russia citing masha gessen statement russian propaganda machine gotten much mileage us citizen since angela davis murder trial 1971 bob cesca objected new york times failing redact name nsa employee specific location al qaeda group targeted series slides paper made publicly available russian journalist andrei soldatov argued snowden revelations negative consequences internet freedom russia russian authorities increased surveillance regulation pretext protecting privacy russian users snowden name invoked russian legislators supported measures forcing platforms google facebook twitter gmail youtube locate servers russian soil install sorm black boxes servers russian authorities could control soldatov also contended result disclosures international support national governments take powers organizations involved coordinating internet global architectures grown could lead balkanization internet restricted free access information montevideo statement future internet cooperation issued october 2013 icann organizations warned internet fragmentation national level expressed strong concern undermining trust confidence internet users globally due recent revelations late 2014 freedom house said ome states using revelations widespread surveillance u.s. national security agency nsa excuse augment monitoring capabilities frequently little oversight often aimed political opposition human rights activists
[ 6788, 363, 6419, 2913, 2566, 740, 3639, 7189, 7917, 1863, 1865, 5412, 5767, 60, 1501, 7586, 3671, 4014, 803, 1544, 820, 7646, 3716, 4429, 147, 860, 2337, 2343, 3426, 1998, 7346, 208, 6627, 1278, 5571, 3795, 224, 4522, 7754, 2054, 2059, ...
Test
5,510
9
Constructor_(object-oriented_programming):constructor object-oriented programming class-based object-oriented programming constructor abbreviation ctor special type subroutine called create object prepares new object use often accepting arguments constructor uses set required member variables constructor resembles instance method differs method explicit return type implicitly inherited usually different rules scope modifiers constructors often name declaring class task initializing object data members establishing invariant class failing invariant invalid properly written constructor leaves resulting object valid state immutable objects must initialized constructor languages allow overloading constructor one constructor class differing parameters languages take consideration special types constructors constructors concretely use single class create objects return new instance class abstracted factories also create objects various ways using multiple classes different allocation schemes object pool constructors take least one argument termed parameterized constructors.when object declared parameterized constructor initial values passed arguments constructor function normal way object declaration may work constructors called explicitly implicitly method calling constructor implicitly also called shorthand method.if want initialize fields class values use parameterized constructor programmer supply constructor instantiable class java compiler inserts default constructor code behalf constructor known default constructor would find source code java file would inserted code compilation exists .class file.the behavior default constructor language dependent may initialize data members zero values may nothing all.in java default constructor refer nullary constructor automatically generated compiler constructors defined class absence programmer-defined constructors e.g java.the default constructor implicitly calls superclass nullary constructor executes empty body fields left initial value 0 integer types 0.0 floating-point types false boolean type null reference types like c++ java also supports copy constructor unlike c++ java ’ create default copy constructor ’ write copy constructors define actions performed compiler copying class objects copy constructor one formal parameter type class parameter may reference object used create copy existing object class even though classes counts conversion constructor copy constructors usually abbreviated copy ctor cctor nothing class constructors used .net using abbreviation conversion constructors provide means compiler implicitly create object belonging one class based object different type constructors usually invoked implicitly convert arguments operands appropriate type may also called explicitly c++ move constructors take value reference object class used implement ownership transfer parameter object resources java c vb .net constructor creates reference type objects special memory structure called heap value types int double etc created sequential structure called stack vb .net c also allow use new operator create value type objects value type objects created stack regardless whether operator used c++ objects created stack constructor invoked without new operator created heap constructor invoked new operator stack objects deleted implicitly go scope heap objects must deleted implicitly destructor explicitly using delete operator java constructors differ methods java constructors perform following tasks following order java permit users call one constructor another constructor using codice_21 keyword codice_21 must first statement java provides access superclass constructor codice_23 keyword constructor taking zero number arguments called no-arguments no-arg constructor es6 javascript direct constructors like many programming languages written instantiated equivalent es6 creating function instantiates object instantiated way visual basic .net constructors use method declaration name codice_4 example c constructor c static constructor static data initializer static constructors also called class constructors since actual method generated name .cctor often also called cctors static constructors allow complex static variable initialization static constructors called implicitly class first accessed call class static constructor call triggers static constructor execution static constructors thread safe implement singleton pattern used generic programming class static constructors called every new generic instantiation one per type static variables instantiated well c++ name constructor name class returns nothing parameters like member function constructor functions usually declared public section also declared protected private sections user wants restrict access constructor two parts first initializer list follows parameter list method body starts colon entries comma-separated initializer list required offers opportunity provide values data members avoid separate assignment statements initializer list required const reference type data members members parameterless constructor logic assignments occur according order data members declared even order initializer list different second part body normal method body enclosed curly brackets c++ allows one constructor constructors must different parameters additionally constructors contain parameters given default values must adhere restriction parameters given default value situation matters default constructor constructor base class base classes also called derived class constructor functions inherited addresses referenced memory allocation required new delete operators called implicitly copy constructor parameter type passed const reference example vector const vector rhs provided explicitly compiler uses copy constructor member variable simply copies values case primitive types default implementation efficient class dynamically allocated members handles resources lead double calls delete double release resources upon destruction example invocations returning objects functions passing objects value objects copy constructor called implicitly unless return value optimization applies c++ implicitly generates default copy constructor call copy constructors base classes member variables unless programmer provides one explicitly deletes copy constructor prevent cloning one base classes member variables copy constructor deleted accessible private cases calling customized copy constructor e.g reference counting deep copy pointers also require customizing destructor copy assignment operator commonly referred rule three f constructor include codice_25 codice_26 statements defined class codice_25 statements define private fields codice_26 statements execute code additional constructors defined using codice_17 keyword eiffel routines initialize new objects called creation procedures creation procedures following traits although object creation involves subtleties creation attribute typical declaration codice_30 expressed creation instruction codice_31 consists following sequence steps first snippet class codice_35 defined procedure codice_33 coded keyword codice_37 keyword codice_38 introduces list procedures used initialize instances case list includes codice_39 procedure empty implementation inherited class codice_40 codice_33 procedure coded within class second snippet class client codice_35 declarations codice_43 codice_44 type codice_35 procedural code codice_43 created origin 0.0 0.0 creation procedure specified procedure codice_39 inherited class codice_40 used line could coded codice_49 procedures named creation procedures used instruction codice_38 keyword next creation instruction codice_44 providing initial values codice_44 coordinates third instruction makes ordinary instance call codice_33 procedure reinitialize instance attached codice_44 different values cfml uses method named 'codice_14 constructor method cheese.cfc create instance cheese since coldfusion 10 cfml also supported specifying name constructor method object pascal constructor similar factory method syntactic difference regular methods keyword codice_11 front name instead codice_57 codice_58 name though convention codice_12 prefix codice_60 creating instance class works like calling static method class codice_61 perl programming language version 5 default constructors factory methods methods create return object concretely meaning create return blessed reference typical object reference hash though rarely references types used convention constructor named new though allowed name otherwise multiple constructors example person class may constructor named new well constructor new_from_file reads file person attributes new_from_person uses another person object template moose object system perl boilerplate left default new created attributes specified well whether set reset required addition extra constructor functionality included build method moose generated constructor call checked arguments buildargs method specified handle constructor arguments hashref key value form cases person class instiated like perl 6 even boilerplate left given default new method inherited attributes specified well whether set reset required addition extra constructor functionality included build method get called allow custom initialization tweak method specified post-process attributes already implicitly initialized person class instantiated like alternatively named parameters specified using colon-pair syntax perl 6 set variables names identical named parameters use shortcut use name variable named parameter php version 5 constructor method named codice_62 notice double underscore keyword codice_17 automatically calls creating object usually used automatically perform initializations property initializations constructors also accept arguments case codice_17 statement written also need send constructor arguments parameters python constructors defined one codice_5 codice_6 methods new instance created calling class function calls codice_5 codice_6 methods constructor method defined class next one found class method resolution order called typical case codice_6 method need defined common exception immutable objects classes normally act factories new instances class callable object like function call constructor calling class returns instance class however codice_5 method permitted return something instance class specialised purposes case codice_6 invoked ruby constructors created defining method called codice_72 method executed initialize new instance ocaml one constructor parameters defined right class name used initialize instance variables accessible throughout class anonymous hidden method called codice_73 allows evaluate expression immediately object built
[ 1437, 2176, 2451, 5983, 6605, 1345, 7333, 4302, 109, 6428, 4053, 6277, 5043, 2661, 7005, 7370, 7460, 1016, 666, 3722, 6029, 4164, 1114, 231, 5855, 7844, 3729, 3898, 5510, 270, 2871, 7394, 2881, 4995, 5965, 1420, 1803 ]
Test
5,511
4
RSA_Conference:rsa conference rsa conference series security conferences approximately 45,000 people attend one conferences year founded 1991 small cryptography conference rsa conferences take place united states europe asia united arab emirates year conference also hosts educational professional networking awards programs name rsa refers public-key encryption technology developed rsa data security inc. founded 1982 abbreviation stands rivest shamir adleman inventors technique idea first rsa conference conceived 1991 phone call rsa security ceo jim bidzos executive director electronic privacy information center first conference one panel called des dss standards choice focused attendees adopt dss standard expected challenge rsa security status de facto standard digital signatures event steadily grew 1993 attracted 200 attendees known many years rsa data security conference eventually became rsa conference time conference grew business-oriented older demographic vendors led competitive issues time 1990s european competitors rsa security sometimes could get booth hired people pass flyers rsa conference encouraging attendees visit hotels nearby 1995 conference criticized clipper chip implemented chip would given u.s. government direct access evidence telecommunications devices chip installed conference put posters sink clipper big letters 1997 conference grown 2,500 attendees first european rsa conference took place 2000 started 5 tracks according network world conference focus expanded cryptography broader security conference larger attendance 2005 microsoft ceo bill gates keynote presentation according bidzos purpose conference became kinds things drive standards organize opposition government policies promote rsa name give customers opportunity 2008 conference 17,000 attendees 375 participating security vendors 18 tracks 230 sessions 2010 rsa conference obama administration publicly revealed comprehensive national cybersecurity initiative cnci created 2008 formerly kept secret 2011 california-based security company hbgary withdrew speaking exhibiting rsa conference citing safety concerns company announced plans reveal identities members hacktivist group anonymous received retaliatory threats hacks 2014 8 speakers boycotted rsa conference sponsor rsa security accused adding backdoor products national security agency could monitor users rsa security technology boycott began f-secure chief technology officer mikko hyppönen wanted rsa security apologize whereas company statement allegations true noted rsa conference rsa security company loosely connected discussion year conference focused heavily leaks edward snowden nsa involvement american technology companies first rsa conference asia-pacific introduced 2013 followed inaugural united arab emirates conference two years later 2015 conference added clause exhibitor contracts effectively prohibiting booth babes requiring professional attire exhibitor floor policy implemented response feedback booth babes made conference feel unprofessional fortune magazine called widespread practice booth babes professional conferences outdated unwelcoming female attendees following year rsa conference focused fbi–apple encryption dispute regarding attempts government gain access iphones containing evidence criminal investigations 2017 conference estimated 40,000–43,000 attendees united states rsa conference international conference series security takes place united states europe asia/japan united arab emirates also provides internet safety education consumers children security scholar program security students operates award programs typically bestowed conferences example one award innovation sandbox contest involves ten startups present technology panel judges 2017 conference u.s. 15 keynotes 700 speakers 500 sessions 550 exhibitors analysis session keywords conference suggest early conferences focused cryptography commerce topical focus conferences transitioned cloud cybersecurity early 2000s conference theme practice began 1995 additionally typically one two security topics conference organizers pick focus year speaking positions rsa conference highly competitive thousands submissions hundred speaking positions rsa conference provides annual awards recognize outstanding people organizations following areas following awards winners announced opening keynote sessions conference april year recent winners include tim jenkin michael assante professor ran canetti professor rafail ostrovsky admiral michael rogers
[ 4388, 8069, 6179, 1091, 2206, 8086, 2209, 2844, 1859, 3886, 3896, 6756, 3661, 6143, 1505, 1328, 1899, 1332, 1805 ]
Test
5,512
5
Digital_circuit_multiplication_equipment:digital circuit multiplication equipment digital circuit multiplication equipment dcme type voice compression equipment installed ends long-distance telecommunication link typically link via communications satellite submarine communications cable main characteristics dcme defined itu-t recommendation g.763 dcme consists time-assignment speech interpolation tasi voice interpolation stage form statistical multiplexor applied voiceband signals low rate encoding stage exploits correlation successive voiceband samples individual input channel reduce transmitted bitrate required pcm equivalent quality heavy loading conditions example large number channels show continuous activity due voiceband data group iii facsimile signals voice interpolation may able operate within satisfactory quality range discontinuous signals speech affected competitive clipping initial part activity combat dcme may incorporate dynamic load control range input channels dynamic load control form back busying telephone switch dcme functionality point view telephone switch attached local interface standardised itu-t recommendation q.50
[ 4970 ]
Test
5,513
4
Yersinia_(computing):yersinia computing yersinia network security/hacking tool unix-like operating systems designed take advantage weakness different network protocols yersinia considered valuable widely used security tool 2017 yersinia still development latest stable version number 0.8.2 available github source code repository attacks following network protocols implemented yersinia rated 59 sectools.org top 125 network security tools
[ 5965, 651, 5571, 2119, 3540, 4836, 3950, 3486 ]
Test
5,514
3
Barrett_Communications:barrett communications barrett communications specialist manufacturer supplier commercial high frequency hf tactical hf high frequency vhf communications equipment head office design manufacturing located perth western australia barrett communications founded 1976 company steadily grew began exporting first commercial hf radios 1987 range expanded include transceivers base portable mobile modems power supplies amplifiers antennas accessories may 2009 barrett communication acquired q-mac electronics increased barrett communications product range include vhf radio systems august 2011 barrett communications received certification joint interoperability test command jitc barrett 2050 hf mobile base station transceiver certification includes conformance mil-std-188-141b well automatic link establishment ale specifications mil-std-188-141b appendix 2012 barrett communications exports 150 countries global dealer network 65 countries company maintains quality assurance system covering design manufacturing approved iso 9001 2008 barrett communications also operates marketing office united kingdom barrett europe limited wholly owned subsidiary barrett communications located whiteley hampshire nvis communications/barrett consulting division north american systems integrator barrett communications usa canada barrett communications designs manufactures range hf communications equipment commercial tactical use range includes transceivers base portable mobile modems power supplies amplifiers antennas accessories barrett ’ range hf communications equipment ranges basic voice communication data email fax gps tracking barrett ’ prc-2090 tactical radio meets mil-std 180g fed-std 1045 mil-std 188-141b ale jitc certifiable as-nzs 4770:200 barrett communications designs manufactures range vhf communications equipment specifically tactical use range known barrett prc-2080 tactical vhf radio system includes vhf 30 88 mhz squad brigade base mobile transceivers rebroadcast units equipment provides digital voice encryption frequency hopping data positional awareness rebroadcast capability
[]
Test
5,515
9
MIT/GNU_Scheme:mit/gnu scheme mit/gnu scheme programming language dialect implementation language scheme type lisp produce native binary files x86 ia-32 x86-64 processor architecture supports standard r7rs mostly free open-source software released gnu general public license gpl first released developers massachusetts institute technology mit 1986 free software even free software foundation gnu gpl existed part gnu project features rich runtime software library powerful source code level debugger native code compiler built-in emacs-like editor named edwin books structure interpretation computer programs structure interpretation classical mechanics include software run mit/gnu scheme edwin built-in emacs-like editor comes mit/gnu scheme edwin normally displays codice_1 data buffer mode line mini-buffer starts emacs mode line gives information like name buffer whether buffer read-only modified unmodified
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 2559, 3623, 5734, 1478, 2218, 4704, 5757, 6116, 3981, 7559, 1116, 6471, 7573, 2599, 2600, 5077, 1885, 1889, 5787, 6507, 1523, 795, 6876, 6888, 1557, 5494, 5501, 4070, 6210, 144, 4074, 4085, 7298, ...
Test
5,516
4
Bare-metal_restore:bare-metal restore bare-metal restore technique field data recovery restoration backed data available form allows one restore computer system bare metal i.e without requirements previously installed software operating system typically backed data includes necessary operating system applications data components rebuild restore backed system entirely separate piece hardware configurations hardware receiving restore needs identical configuration hardware source backup although virtualization techniques careful planning enable bare-metal restore hardware configuration different original disk imaging applications enable bare-metal restores storing copies images entire contents hard disks networked external storage writing images physical disks disk image application include entire operating system bootable live cd network file server contains required application code create restore disk images dd utility linux boot cd used copy file systems disk images disk partitions effect bare-metal backup recovery disk images used input new partition type equal larger size alternatively variety virtualization technologies often represent accessible less efficient representation data original partition ibm vm/370 operating system provides command name ddr disk dump restore bit bit backup hard drive specified media typically tape many choices exist microsoft introduced new backup utility wbadmin windows server 2008 family operating system 2008 built-in support bare-metal recovery users software also recover system hyper-v virtual machine microsoft updated windows recovery environment features windows 8 family operating system set provide built-in support bare-metal recovery microsoft windows server 2012 r2 offers built-in bare-metal-recovery
[ 3837, 1536, 639, 4684, 2390, 5571, 3536, 6731, 578, 7738, 2936, 2666, 2687, 4464, 788 ]
Test
5,517
8
TumbleDeck:tumbledeck tumbledeck unofficial open-source desktop client application tumblr first version includes simple functions posting text images videos links chats quotes audio added version 1.1 beta compatible windows operating systems developed .net framework tumbledeck programmed visual basic .net 2008 name came mixing tumblr tumble tweetdeck deck makes tumbledeck
[ 2530, 4759 ]
Test
5,518
6
Tmpfs:tmpfs tmpfs temporary file storage paradigm implemented many unix-like operating systems intended appear mounted file system data stored volatile memory instead persistent storage device similar construction ram disk appears virtual disk drive hosts disk file system everything stored tmpfs temporary sense files directly created non-volatile storage hard drive although swap space used backing store case low memory situations reboot everything tmpfs lost memory used tmpfs grows shrinks accommodate files contains many unix distributions enable use tmpfs default /tmp branch file system shared memory observed df example linux distributions e.g debian ubuntu /tmp normal directory /dev/shm uses tmpfs several independent variants tmpfs concept one earliest developed sun microsystems sunos operating systems like bsds linux provided sunos 4 includes likely earliest implementation tmpfs first appeared sunos 4.0 late 1987 together new orthogonal address space management allowed object memory mapped solaris /tmp directory made tmpfs file system default starting solaris 2.1 released december 1992 output solaris codice_1 command show swap background storage tmpfs volume tmpfs supported linux kernel beginning version 2.4 linux tmpfs previously known shmfs based ramfs code used bootup also uses page cache unlike ramfs supports swapping less-used pages swap space well filesystem size inode limits prevent memory situations defaulting half physical ram half number ram pages respectively 4.2bsd introduced mfs memory-based file system implemented applying existing ffs disk filesystem virtual memory region tmpfs memory filesystem implemented using conventional in-memory data structures order improve performance mfs merged official netbsd source tree september 10 2005 available 4.0 later versions freebsd ported netbsd implementation available 7.0 later versions dragonfly bsd also ported netbsd implementation available 2.5.1 later versions openbsd ported netbsd tmpfs implementation well initially started pedro martelletto improved many others enabled builds december 17 2013 first release openbsd tmpfs included 5.5 openbsd 6.0 disabled tmpfs due lack maintenance
[ 3599, 2547, 7161, 4672, 7171, 6431, 3626, 5049, 6117, 759, 7581, 1133, 6854, 5437, 6149, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 2689, 5865, 4444, 6231, 869, 2704, 1605, 1...
Test
5,519
5
Multicast_DNS:multicast dns computer networking multicast dns mdns protocol resolves hostnames ip addresses within small networks include local name server zero-configuration service using essentially programming interfaces packet formats operating semantics unicast domain name system dns although stuart cheshire designed mdns stand-alone protocol work concert standard dns servers mdns protocol published uses ip multicast user datagram protocol udp packets implemented apple bonjour open source avahi software packages android contains mdns implementation mdns also implemented windows 10 initially limited discovering networked printers later becoming capable resolving hostnames well mdns work conjunction dns service discovery dns-sd companion zero-configuration technique specified separately rfc 6763 mdns client needs resolve hostname sends ip multicast query message asks host name identify target machine multicasts message includes ip address machines subnet use information update mdns caches host relinquish claim name sending response packet time live ttl equal zero default mdns exclusively resolves hostnames ending codice_1 top-level domain tld cause problems domain includes hosts implement mdns found via conventional unicast dns server resolving conflicts requires network-configuration changes violate zero-configuration goal mdns message multicast udp packet sent following locations payload structure based unicast dns packet format consisting two parts—the header data header identical found unicast dns sub-sections data part queries answers authoritative-nameservers additional records number records sub-section matches value corresponding *count field header wire format records query section slightly modified unicast dns adding one single-bit field unicast dns qname field consists series length/value sub-fields called labels label represents one dot-separated substrings fully qualified domain name fqdn list terminated single null-byte representing root dns unicast-response field used minimize unnecessary broadcasts network bit set responders send directed-unicast response directly inquiring node rather broadcasting response entire network qclass field identical found unicast dns records answers authoritative-nameservers additional records sections format collectively known resource records rr resource records mdns also slightly modified general format unicast dns cache-flush bit used instruct neighbor-nodes record overwrite rather appended onto existing cached entries rrname rrtype formats rdata fields found unicast dns however dns service discovery dns-sd common use-case mdns specifies slight modifications formats notably txt records trying codice_2 codice_3 host would cause mdns client computer multicast following udp packet appletv.local host would respond multicasting mdns response packet example header non-zero fields codice_4 word 84 00 codice_5 word 00 01 codice_6 word 00 02 data begin fqdn hex 07 61 70 70 6c 65 74 76 05 6c 6f 63 61 6c 00 appletv.local followed host dns information
[ 5847, 979, 2043, 3151, 2134, 170, 7866, 5181, 3946, 3819, 8152 ]
Train
5,520
0
Semantic_folding:semantic folding semantic folding theory describes procedure encoding semantics natural language text semantically grounded binary representation approach provides framework modelling language data processed neocortex semantic folding theory draws inspiration douglas r. hofstadter analogy core cognition suggests brain makes sense world identifying applying analogies theory hypothesises semantic data must therefore introduced neocortex form allow application similarity measure offers solution sparse binary vector employing two-dimensional topographic semantic space distributional reference frame theory builds computational theory human cortex known hierarchical temporal memory htm positions complementary theory representation language semantics particular strength claimed approach resulting binary representation enables complex semantic operations performed simply efficiently basic computational level analogous structure neocortex semantic folding theory posits implementation semantic space two-dimensional grid grid populated context-vectors way place similar context-vectors closer instance using competitive learning principles vector space model presented theory equivalence well known word space model described information retrieval literature given semantic space implemented described word-vector obtained given word employing following algorithm position x semantic map x represents cartesian coordinates result process word-vector containing contexts word appears therefore representative semantics word semantic space seen resulting word-vector also sparse distributed representation sdr format schütze 1993 sahlgreen 2006 properties word-sdrs particular interest respect computational semantics semantic spaces natural language domain aim create representations natural language capable capturing meaning original motivation semantic spaces stems two core challenges natural language vocabulary mismatch fact meaning expressed many ways ambiguity natural language fact term several meanings application semantic spaces natural language processing nlp aims overcoming limitations rule-based model-based approaches operating keyword level main drawback approaches brittleness large manual effort required create either rule-based nlp systems training corpora model learning rule-based machine learning-based models fixed keyword level break vocabulary differs defined rules training material used statistical models research semantic spaces dates back 20 years 1996 two papers published raised lot attention around general idea creating semantic spaces latent semantic analysis microsoft hyperspace analogue language university california however adoption limited large computational effort required construct use semantic spaces breakthrough regard accuracy modelling associative relations words e.g spider-web lighter-cigarette opposed synonymous relations whale-dolphin astronaut-driver achieved explicit semantic analysis esa 2007 esa novel non-machine learning based approach represented words form vectors 100,000 dimensions dimension represents article wikipedia however practical applications approach limited due large number required dimensions vectors recently advances neural networking techniques combination new approaches tensors led host new recent developments word2vec google glove stanford university semantic folding represents novel biologically inspired approach semantic spaces word represented sparse binary vector 16,000 dimensions semantic fingerprint 2d semantic map semantic universe sparse binary representation advantageous terms computational efficiency allow storage large numbers possible patterns topological distribution two-dimensional grid outlined lends bitmap type visualization semantics word text active semantic feature displayed e.g pixel seen images shown representation allows direct visual comparison semantics two linguistic items image 1 clearly demonstrates two disparate terms dog car expected obviously different semantics image 2 shows one meaning contexts jaguar jaguar car overlaps meaning porsche indicating partial similarity meaning contexts jaguar e.g jaguar animal clearly different non-overlapping contexts note also visualization semantic similarity using semantic folding bears strong resemblance fmri images produced research study conducted a.g. huth et al. claimed words grouped brain meaning
[ 5429, 6925 ]
Test
5,521
3
Scalar_processor:scalar processor scalar processors represent class computer processors scalar processor processes one data item time typical data items integers floating point numbers scalar processor classified sisd processor single instructions single data flynn taxonomy contrast vector processor single instruction operates simultaneously multiple data items referred simd difference analogous difference scalar vector arithmetic superscalar processor hand executes one instruction clock cycle simultaneously dispatching multiple instructions redundant functional units processor functional unit separate cpu core execution resource within single cpu arithmetic logic unit bit shifter multiplier
[ 5012, 6074, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 4365, 4370, 6148, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, ...
Test
5,522
2
Flashback_(1992_video_game):flashback 1992 video game flashback released flashback quest identity united states 1992 science fiction cinematic platform game developed delphine software france published u.s. gold united states europe sunsoft japan game directed written/designed partially programmed paul cuisset previously created adventure game future wars flashback initially released amiga 1992 although originally created mega drive/genesis ported ms-dos acorn archimedes super nes 1993 time sega mega drive/genesis version also released cd-rom versions flashback sega cd 3do cd-i ms-dos apple macintosh fm towns released 1994 1995 together cartridge version atari jaguar 1995 2017 game released worldwide sega dreamcast featuring graphic assets cutscenes taken ms-dos version music amiga version updated port nintendo switch titled flashback remastered edition released june 7 2018 north america europe australia flashback remastered edition ported playstation 4 released november 20 2018 north america europe australia originally advertised cd-rom game cartridge game features fully hand-drawn backdrops animation rotoscoped giving movements unusual fluidity similar earlier prince persia capture technique flashback invented independently prince persia used complicated method first tracing video images onto transparencies game commercial critical success listed guinness world records best-selling french game time followed sequel titled fade black 1995 2013 flashback remake vectorcell released pc consoles cinematic platformer flashback features gameplay similar 1989 prince persia delphine another world released 1991 level spans large number non-scrolling screens nearly feature multiple levels altitude – requiring player character conrad jump grab onto ledges climb use elevators drop onto lower levels conrad exhibits realistic human running speed jumping ability well realistic weakness – die falls great height conrad also carries pistol unlimited ammunition force shield absorbs certain number shots needing recharging acting conrad health many attacks survive dying portable force field unlimited use act temporary barrier block enemies shots conrad progresses game seven levels increasingly presented spatial puzzles requiring player discover guide toward destination late game conrad receives teleportation device able progress throwing device teleporting otherwise unreachable areas year 2140 amnesiac conrad b. hart chased mutants crash-lands hover bike jungle titan finds holocube fell pocket contains recorded message telling meet friend ian new washington makes way jungle purchases anti-gravity belt order enter new washington via chasm finds ian attacked police kills ian uses regenerator restore conrad memories end year thesis built glasses measure molecular density inadvertently discovered shapeshifting aliens called morphs distinguished high density mixed human population morphs realized investigating targeted anticipating memory erasure recorded holocube sent copy memory ian conrad determined return earth ian tells way afford ticket earth win one death tower game show contestants fight death false papers required pass pay forged papers conrad takes series dangerous jobs city finds continually targeted police presumably misled morph infiltrators conrad wins death tower travels earth false papers get past checkpoint morphs soon realize conrad pursued cops takes taxi paradise club conceals morphs hideout spies three morphs ceiling vent discuss plan conquer earth within hours conrad falls vent taken prison cell soon morphs enter cell kill conrad runs past picks discarded alien gun exploring facility discovers teleporter uses transport morphs home planet finds human prisoner named phillip howard clark opens prison morph appears executes phillip dying phillip gives conrad atomic charge phillip diary reveals planned destroy master brain controls aliens located planet core auxiliary brain must destroyed open communication pathways master brain conrad destroys auxiliary brain finds master brain pathway arrives certain spot hears phillip voice telling atomic charge placed loose platform throws switch awakening brain cause tremor drops charge towards core conrad escapes hangar takes morph spacecraft planet atmosphere detonates navigate home due morphs galaxy human star charts instead puts suspended animation ship drifts space leading events fade black pc version extended introductory sequence minor cut scenes amiga version picking items amiga version user see scenes enabling although seconds delay every time animations load playing game entirely hard drive amiga version also option zoom action whenever conrad opens fire due criticism look removed versions although option play game zoomed remained pc version message conrad writes ending also different release game originally released 3.5 floppy disk ms-dos re-release cd-rom sega cd later adapted pc cd-rom 3do cd-i featured redone pre-rendered cinematic fmvs voice acting sound effects sega cd version also voice work gameplay cd tracks level carried cd-rom conversions jaguar port title screen versions music different cutscenes original releases issue 118 retro gamer paul cussiet told magazine best version mega drive version game created platform north america genesis super nes sega cd versions featured marvel comic book within manual order explain initial story pal releases mega drive super nes versions mega cd version pal region omitted comic instead featured textual prologue super nes port featured minor censorship due nintendo content guidelines time changes included new washington bar becoming cafe death tower renamed cyber tower enemy mutants natural skin colors versions recolored green two-track cd soundtrack released featuring music inspired game directly flashback sold roughly 750,000 copies 1995 computer gaming world approved flashback superbly rotoscoped graphics fluid movement sound card audio criticizing awkward interface use save points magazine concluded excellent game truly creates sense reality electronic gaming monthly praised snes version improved graphics music genesis version remarked flashback slow-paced times retains player interest compelling plot involving puzzles megatech magazine conceded although five big levels finishing game take long nintendo power praised graphics story animation calling almost cinematic noting play control takes getting used electronic gaming monthly commented sega cd version virtually identical genesis version flashback still essential purchase already different version gamepro contrast argued reworked cutscenes look awesome even gamers 've already completed game another platform want play see new cd footage also praised addition cd-quality soundtrack voices reviewer next generation acknowledged sega cd version makes considerable improvements argued standard cartridge-to-sega cd enhancements impact gameplay however lauded flashback graphics animation fiendishly clever puzzles said though game superficially resembles another world heart alien class easily surpasses reviewing jaguar version gamepro noted merely straight port enhancements take advantage hardware game less enjoyable first released game consoles year reviewing macintosh version next generation critic applauded game animation story sequences plot level design longevity next generation reviewed 3do version game stated title still great game 've looking couple years one last note 3do controller n't interfere much game demanding control scheme flashback listed guinness world records best-selling french game time mega drive version became bestseller 1994 mega placed game number eight list top mega drive games time february 2011 wirtualna polska ranked 17th best amiga game polish edition chip ranked tenth best amiga game 2004 readers retro gamer voted flashback 65th top retro game 1994 pc gamer uk named flashback 17th best computer game time editors wrote flashback proves comes producing original stylish challenging games adept french entertainment weekly gave game b wrote finally limping onto sega cd almost two years genesis debut futuristic role-playing thriller still worth checking — n't game since matched unique almost hypnotic dynamic languorous stretches exploration problem-solving punctuated bursts realistic gunplay keep mind atmospheric soundtrack cinematic interludes original genesis flashback advertised cd game cartridge — sega cd flashback version many access delays improves marginally original 'll wonder format complimented sequel titled fade black produced delphine software international 1995 pc playstation 3d game third game series flashback legends development delphine software international adeline software international planned released 2003 cancelled company went bankrupt ceased operations end 2002 early 2013 game titled flashback origins rumoured development french website gameblog stating €300,000 government funding granted cuisset vectorcell 2011 april 11 2013 remake flashback announced reveal trailer reminiscence game engine recreation created gregory montoir cyx engine available amiga os4 dreamcast gp2x iphone linux microsoft windows mac os x maemo morphos nintendo ds wii palm os playstation 2 playstation portable sega saturn windows ce also one xbox 360 magicseb port symbian maemo 5 ronen k available
[ 405, 224, 6788, 4759, 6380, 7588, 578, 638 ]
Test
5,523
2
Lubuntu:lubuntu lubuntu lightweight linux distribution based ubuntu using lxqt desktop environment place ubuntu gnome desktop lubuntu originally touted lighter less resource hungry energy-efficient aims functional yet modular distribution focused getting way letting users use computer lubuntu originally used lxde desktop moved lxqt desktop release lubuntu 18.10 october 2018 name lubuntu portmanteau lxqt ubuntu lxqt name derives merger lxde razor-qt projects word ubuntu means humanity towards others zulu xhosa languages lubuntu received official recognition formal member ubuntu family 11 may 2011 commencing lubuntu 11.10 released 13 october 2011 lxde desktop first made available ubuntu october 2008 release ubuntu 8.10 intrepid ibex early versions lubuntu including 8.10 9.04 9.10 available separate iso image downloads could installed ubuntu separate lubuntu-desktop packages ubuntu repositories lxde also retroactively installed earlier ubuntu versions february 2009 mark shuttleworth invited lxde project become self-maintained project within ubuntu community aim leading dedicated new official ubuntu derivative called lubuntu march 2009 lubuntu project started launchpad mario behling including early project logo project also established official ubuntu wiki project page includes listings applications packages components august 2009 first test iso released live cd installation option initial testing september 2009 linux magazine reviewer christopher smart showed lubuntu ram usage half xubuntu ubuntu normal installation desktop use two thirds less live cd use 2014 project announced gtk+-based lxde qt-based razor-qt would merging new qt-based lxqt desktop lubuntu would consequently moving lxqt transition complete release lubuntu 18.10 october 2018 first regular release employ lxqt desktop lenny became lubuntu mascot 2014 2018 transition becoming lxqt-based aim lubuntu re-thought development team previously intended users older computers typically ten years old newer introduction windows vista pcs older computers gained faster processors much ram 2018 ten-year-old computers remained much capable case five years earlier result lubuntu development team simon quigley decided change focus emphasize well-documented distribution based lxqt give users functional yet modular experience lightweight default available language developers also decided stop recommending minimum system requirements 18.04 lts release developer simon quigley announced august 2018 lubuntu 20.10 switch wayland display server protocol default january 2019 developers formed lubuntu council new body formalize previous organization written constitution 30 december 2009 first alpha 1 preview version iso lubuntu 10.04 lucid lynx made available testing alpha 2 following 24 january 2010 first beta released 20 march 2010 stable version lubuntu 10.04 released 2 may 2010 four days behind main ubuntu release date 28 april 2010 lubuntu 10.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages lubuntu 10.04 intended long-term support lts release unlike ubuntu 10.04 lucid lynx going supported 18 months however since infrastructure ubuntu 10.10 maverick meerkat thus lubuntu 10.10 dropped support i586 processors including via c3 amd k6 amd geode/national semiconductor cpus release lubuntu 10.10 prompted community extend support april 2013 lubuntu 10.04 long term support version reviewing lubuntu 10.04 alpha 1 january 2010 joey sneddon omg ubuntu wrote many preconceptions regarding lxde/lubuntu found presently surprised pleasant look pleasant use although doubt would switch gnome lxde give excellent performance would benefit writing final 10.10 release 10 october 2010 sneddon termed nimble easy-to-use desktop writing lubuntu 10.04 may 2010 damien oh make tech easier said looking lightweight alternative install old pc netbook lubuntu great choice ’ get eye candy special graphical effects get fast speed low cost ’ time put old pc back work also reviewing lubuntu 10.04 may 2010 robin catling full circle magazine said first thing impresses running lubuntu modest compaq evo laptop pentium-m 512 mb ram small memory footprint ... beats karmic gnome xubuntu xfce mile evo used take 60 seconds-plus boot desktop lxde takes exactly 30 yet 're restricted gtk2 applications well supported synaptic hooks ubuntu repositories package management pull open office replace default abi-word without crippling machine catling note file manager pcmanfm file manager needs little maturity compete thunar competent robust application n't hog resources like nautilus dolphin june 2010 jim lynch reviewed lubuntu 10.04 saying one thing ’ notice using lubuntu desktop ’ fast fast even underpowered machine lubuntu perform well ’ one best things distro leaves behind bloated eye candy sometimes bog gnome kde ... ’ run noticeable problems lubuntu fast stable ’ see noticeable bugs problems hate happens since ’ much interesting readers run one nasty problem another hopefully next version lubuntu chock full horrendous problems bugs kidding september 2010 lead developer julien lavergne announced lubuntu project granted official status derivative ubuntu part ubuntu 10.04 release cycle work would continue goal ubuntu 10.10 lavergne explained reasons still resource problem canonical /ubuntu infrastructure resolved cycle also writing real process integrate new member ubuntu family ’ still finished lubuntu 10.10 released schedule 10 october 2010 day ubuntu 10.10 maverick meerkat built underlying infrastructure ubuntu 10.10 developer julien lavergne said lubuntu actually part ubuntu family build current ubuntu infrastructure release considered « stable beta » result could final stable release included ubuntu family version 10.10 introduced new artwork distribution including new panel menu backgrounds new openbox theme new lubuntu menu logo splash images desktop wallpaper lubuntu 10.10 accepted official ubuntu derivative release point due lack integration infrastructure canonical ubuntu work continuing towards goal lubuntu 10.10 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages developer julien lavergne wrote 10.10 incorporated many changes 10.04 changes considered improvements improvements included new theme designed rafael laguna incorporation xpad note taking ace-of-penguins games lxtask lxde task manager place xfce application replacing epdfview pdf reader evince due memory leak problem removing pyneighborhood minuses included last-minute rewrite installer integrate properly resulted installation instability raising minimum installation ram 180 mb 256 mb issue incorporation ubuntu update manager increased ram usage 10 mb lubuntu 10.04 indication updates available deemed necessary minimum system requirements lubuntu 10.10 described mario behling comparable pentium ii celeron systems 128 mb ram configuration may yield slow yet usable system lubuntu chief developer julien lavergne stated minimum ram install lubuntu 10.10 256 mb reviewing lubuntu 10.10 right release october 2010 jim lynch eye linux said lubuntu ’ biggest appeal speed ’ disappointment area applications load open quickly overall experience lubuntu quite positive detected stability problems lubuntu 10.10 quite solid reliable entire time used lynch fault choice synaptic package manager one strange things lubuntu offers synaptic package manager xubuntu 10.10 hand offers ubuntu software center well synaptic ’ sure ubuntu software center missing lubuntu would make lot sense include since much easier attractive way manage software synaptic gets job done ’ less friendly new users ’ match ubuntu software center terms usability comfort mid-december 2010 lubuntu risen 11th place distrowatch six month list popular linux distributions 319 distributions right behind puppy linux well ahead xubuntu 36th place reviewing linux distribution rankings distrowatch early january 2011 year 2010 versus 2009 ladislav bodnár noted looking tables interesting thing rise distributions use lightweight full-featured lxde desktop openbox window manager example lubuntu comfortably beats kubuntu terms page hits ... project announced development schedule november 2010 lubuntu 11.04 released time 28 april 2011 lubuntu 11.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages unofficial 64-bit iso 11.04 also released kendall weaver peppermint os improvements lubuntu 11.04 included replacing aqualung audacious default music player elimination hardware abstraction layer introducing movable desktop icons ubuntu font used default improved menu translations reorganized menus release also introduced new default theme artwork designed raphael laguna known ozone partly based xubuntu ’ default bluebird theme lubuntu 11.04 run little 128 mb ram requires 256 mb ram install using graphical installer lubuntu 11.04 completed process official status member ubuntu family mario behling stated next goals project clear apart constantly improving distribution lubuntu project aims become official flavour ubuntu mark shuttleworth remarked lubuntu developers upon release 11.04 reviewing lubuntu 11.04 release joey sneddon omg ubuntu commented look lubuntu ’ 'traditional interface comfort agitated interface revolution heralded gnome 3 ubuntu unity certainly ’ appeal 'bling fans ’ say attention ’ paid appearance new default theme raphael laguna use ubuntu font helps give sometimes-basic-feeling os distinctly professional look subject official status sneddon said lubuntu long sought official sanction ubuntu project family classed official 'derivative ubuntu earning place alongside kubuntu xubuntu accomplished release lubuntu 11.04 hold acceptance remains disappointing expected review 12 may 2011 jim lynch desktop linux reviews faulted 11.04 using ubuntu software center lack alternative wallpapers use abiword place libreoffice praise lubuntu saying speed one nice things lubuntu even slow older system ’ usually quite fast ’ amazing achieve cut unnecessary eye-candy bloat also 12 may 2011 koen vervloesem writing linux user developer criticized applications bundled lubuntu saying software choices rather odd however instance chromium default web browser sensible move distro aimed low-end computers developers also ship firefox lubuntu shows web browsers internet menu also default screenshot program scrot command-line program shown accessories menu everyone find another odd choice install applications synaptic default lubuntu ’ ubuntu software center preferred software installation program ubuntu good releases minor inconveniences though since get access full ubuntu software repositories meaning install favourite applications blink eye one month release lubuntu 11.04 risen ninth place distrowatch 30-day list popular distributions lubuntu 11.10 first version lubuntu official sanction member ubuntu family part status change lubuntu 11.10 used latest ubuntu infrastructure iso files hosted ubuntu release include many new features work focused integration ubuntu instead 11.10 released 13 october 2011 day ubuntu 11.10 released september 2011 announced work lubuntu software center progressing ubuntu software center resource intensive lubuntu lubuntu using less user-friendly synaptic package manager recent releases development new lightweight application manager lubuntu intended rectify problem although users course install ubuntu software center using synaptic changes lubuntu 11.10 include built ubuntu official build system using current packages default alternative install 64-bit isos provided use xfce4-power-manager new microblog client pidgin-microblog new theme rafael laguna lubuntu 11.10 requires minimum 128 mb ram run 256 mb ram install graphic installer recommended minimum ram run live cd session 384 mb lubuntu 11.10 iso file contains known issue causes fail load live cd session hardware instead loading command prompt users required enter codice_1 prompt run live cd session review lubuntu 11.10 pc mech writer rich menga described simple rock-solid reliable trustworthy added ubuntu point suffering major bloat interface side things even say xubuntu point – lubuntu gets back great linux distro end october 2011 lubuntu risen seventh place distrowatch one month popularity list review linux user developer november 2011 russell barnes praised lubuntu 11.10 low system hardware requirements providing alternative gnome kde saying aesthetic appeal functionality minimally compromised effort sleek light possible barnes noted mark shuttleworth may wise offer full status lubuntu release given fuss bluster surrounding unity aesthetics stated trademark pale blue desktop almost hypnotic ’ incredibly clean clear logically laid – user experience million miles away ubuntu 11.10 ’ unity gnome shell counterparts comparison ’ almost cleansing nature simplicity barnes rated 4/5 concluded ’ flexible pretty gnome 2 lubuntu 11.10 certainly got everything need keep computer happy desktop clean clutter-free igor ljubuncic dedoimedo said lubuntu 11.10 lubuntu meant offer valid alternative heavier kde unity flavors tries bravely fails heroically advantage somewhat reduced system resource usage triply negatively compensated drawbacks desktop environment well incomplete integration samba-related crashes laptop hotkeys jumbled system tray icons low battery life want really mean could add lack customization average software arsenal dozen smaller things get way ... lubuntu could work exciting spectacular way packages handsome bag problems easily avoid using main release ... would recommend edition ... grade 6/10 lubuntu 12.04 released 26 april 2012 planning release took place ubuntu developer summit held early november 2011 changes planned time release included use lightdm x display manager blueman instead gnome-bluetooth managing bluetooth devices lubuntu software center added release provide user-friendly graphical interface managing applications synaptic package manager still installed default allows users manage packages system gdebi allows installation downloaded .deb packages lubuntu 12.04 released linux v3.2.14 linux kernel also introduced large number bug fixes particularly lx panel pcmanfm file manager ubuntu backports repository enabled default meaning backport packages installed default installed automatically upgraded newer versions lubuntu 12.10 released 18 october 2012 includes new version session manager customization integration options also includes new version pcman file manager external thumbnail support version new artwork including new wallpaper new icon set entitled box adjusted gtk themes notification-daemon replaced xfce4-notifyd default installation previous versions lubuntu gui search function catfish search utility added default installation version lubuntu uses linux kernel 3.5.5 python 3.2 openjdk7 default java implementation installation requires cpu physical address extensions pae indicates intel pentium pro newer cpu except 400 mhz-bus versions pentium m. case powerpcs tested powerpc g4 running 867 mhz 640 mb ram also run intel-based apple macs also version supports arm architecture developers currently provide installation instructions one arm-based device toshiba ac100 netbook release lubuntu support uefi secure boot unlike ubuntu 12.10 would allowed run hardware designed windows 8 lubuntu 12.10 could run uefi secure boot hardware turning secure boot feature lubuntu 13.04 released 25 april 2013 version incorporated minor changes lubuntu 12.10 including new version pcmanfm file manager incorporates built-in search utility due particular file manager update catfish search utility longer required deleted lubuntu 13.04 also introduced artwork improvements new wallpaper offerings new icons new installation slideshow minimum system requirements lubuntu 13.04 pentium ii celeron cpu pae support 128 mb ram least 2 gb hard-drive space release also still supports powerpc architecture requiring g4 867 mhz processor 640 mb ram minimum julien lavergne announced june 2013 lubuntu 13.10 would ship firefox default browser place chromium release also used lightdm screen locking included zram reviewing beta release september 2013 joey sneddon omg ubuntu said lubuntu never looked good latest beta noted new box icon theme expanded progress bar colours softened window controls enlarged along sharpened start button final release incorporated minor changes 13.04 included new version pcmanfm includes file search function allowed catfish desktop search removed also new artwork included bug fixes gnome-mplayer gpicview image viewer reviewing lubuntu 13.10 jim lynch said sometimes less much much comes linux distributions lubuntu 13.10 offers advantages ubuntu much minimalist package tentative plans announced april 2013 make lubuntu 14.04 long term support release november 2013 confirmed 14.04 would first lubuntu lts release three years support release also saw xscreensaver replaced light-locker screen lock released 17 april 2014 lubuntu 14.04 included minor updates version 13.10 along featured file manager download media lubuntu 14.04 available pc 32 bit pc 64 bit mac intel 64 bit mac powerpc early intel macs 32 bit core solo processor 32-bit pc image available reviewing lubuntu 14.04 lts silviu stahie softpedia noted uses similar layout one found old defunct windows xp os considered good appropriate replacement microsoft operating system 1 june 2014 jim lynch reviewed lubuntu 14.04 lts concluded lubuntu 14.04 lts performed well fast quite stable using problems running applications system whole lived reputation great choice ubuntu minimalists ... lxde desktop environment different unity ubuntu gnome 3 ubuntu gnome ’ traditional desktop means ’ quick easy learn use someone ’ like unity gnome lxde lubuntu 14.04 lts might doctor ordered ’ get benefits ubuntu without discomfort unity interface release 23 october 2014 originally intended feature version lxde based upon qt toolkit called lxqt development latter delayed feature implemented time lubuntu 14.10 incorporated general bug fixes preparation implementation lxqt updated lxde components new artwork including icons theme update silviu stahie writing softpedia stated one main characteristics lubuntu fact fast even older computers basically lubuntu able run anything built last decade operating systems claim thing ... like ubuntu base lubuntu 14.10 seen important visual modifications although many packages updated hood theme icons updated developers preparing make switch lxqt project still works igor ljubuncic dedoimedo said lubuntu 14.10 nothing functionally wrong lubuntu bad simply interesting meat without flavor hybrid car accounting lessons local evening school morning news visit pompei blindfolded excitement ... liked desktop environment past stagnated n't evolved competitors left far behind reflects poorly lubuntu despite calm stable record spartan behavior left absolute zero emotional attachment toward released 23 april 2015 lubuntu 15.04 consisted primarily bug fixes project prepared planned switch lxqt lubuntu 15.10 lubuntu box theme updated merged ubuntu light theme incorporate recent gtk+ features including new header bars gnome native applications plus improved artwork icons minimum system requirements release include 512 mb ram 1 gb recommended plus pentium 4 pentium amd k8 processor release notes indicated graphics cards nvidia amd/ati/radeon intel work box marius nestor softpedia noted ... lubuntu 15.04 operating system comes updated artwork includes updated theme beautiful icons updated gtk+ infrastructure better compatibility qt applications released 22 october 2015 lubuntu 15.10 originally planned move lxqt qt libraries place gtk+ libraries used lxde june 2015 delayed future release release ended minor bug fix application version update changes versions included new artwork ibus replaced fcitx allowing fonts chinese japanese korean included lubuntu-extra-sessions optional instead default minimum system requirements release stated advanced internet services like google+ youtube google docs facebook computer needs 1 gb ram local programs like libre office simple browsing habits computer needs 512 mb ram ... minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video ... nvidia amd/ati/radeon intel work box system tweaked work fairly easily joey sneddon omg ubuntu humorously noted lubuntu 15.10 another highly minor bug fix release released 21 april 2016 lubuntu 16.04 long term support lts version supported three years april 2019 second lubuntu lts version preceded 14.04 april 2014 release retains lxde desktop make transition lxqt allow lxqt better tested later non-lts releases release large file fit cd requires dvd usb flash drive installation lubuntu 16.04 lts primarily bug-fix release includes new features updated artwork however system requirements include 512 mb ram 1 gb recommended pentium 4 pentium amd k8 newer cpu first point release 16.04.1 released 21 july 2016 release lubuntu 16.04.2 delayed number times eventually released 17 february 2017 lubuntu 16.04.3 released 3 august 2017 lubuntu 16.04.4 delayed 15 february 2018 released 1 march 2018 lubuntu 16.04.5 released 2 august 2018 8 march 2017 new version firefox 52.0 arrived update process version removed alsa audio support firefox favour pulseaudio something initially mentioned mozilla release notes since lubuntu 16.04 lts shipped alsa audio broke default lubuntu audio system default lubuntu browser response bug filed mozilla developers declined fix issue lubuntu 16.10 released 13 october 2016 uses lxde lxqt implementation lxqt delayed release 17.04 release also features small bug fixes updated lxde components updated artwork particularly wallpaper developers recommended system requirements release advanced internet services like google+ youtube google drive facebook computer needs least 1 gb ram local programs like libreoffice simple browsing habits computer needs least 512 mb ram minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video joey sneddon omg ubuntu noted new features lubuntu 16.10 longer uses lubuntu software centre switched gnome software ubuntu also sneddon wrote lubuntu 16.10 largely lubuntu 16.04 lts work switching lxqt desktop — expected next release — continues july 2016 article sneddon singled new wallpaper design lubuntu 16.10 saying jaggedy geometric layout new backdrop stands one visually distinct ship recent years marius nestor softpedia wrote appears lot known issues release 're using lubuntu 16.04 lts xenial xerus n't recommend upgrading lubuntu 16.10 least read attempting upgrade operation lubuntu 17.04 released 13 april 2017 like previous releases uses lxde lxqt implementation lxqt lubuntu delayed time 17.10 release incorporated linux kernel 4.10 updated lxde components general bug fixes new artwork recommended system requirements included 1 gb ram 512 mb minimum minimum pentium 4 pentium amd k8 processor joey sneddon omg ubuntu said release compromised mainly bug fixes core app system updates rather screenshot-able new features lubuntu 17.10 released 19 october 2017 release general bug fix release project prepares implementation lxqt also included new versions lxde components new artwork minimum system requirements release remained 512 mb ram 1 gb recommended least pentium 4 pentium amd k8 processor alternate version entitled lubuntu next 17.10 provided lxqt 0.11.1 desktop release available install ... recommend people use production unless aware somewhat critical bugs associated 10 point writing also ’ bad idea contact us well wrote lubuntu developer simon quigley lubuntu 18.04 long term support version released 26 april 2018 last release lubuntu use lxde desktop 18.10 moved using lxqt like past releases 18.04 lts used lxde desktop although work continued move towards deployment lxqt desktop referred lubuntu next release included new artwork including new star field wallpaper system requirements lubuntu 18.04 lts included minimum 1 gb ram although 2 gb recommended better performance plus pentium 4 pentium amd k8 cpu newer ram requirements increased lubuntu 17.10 point releases include 18.04.1 26 july 2018 18.04.2 14 february 2019 14 may 2018 announcement project developers confirmed lubuntu would transition lxqt desktop lubuntu 18.10 released 18 october 2018 included lxqt transition planned release lubuntu 18.04 lts allow testing development three regular releases first long term support version lubuntu 20.04 lts released lxqt project also changed logo early april 2018 anticipation move transitioning lxqt release uses lxqt 0.13.0 based upon qt 5.11.1 applications include libreoffice 6.1.1 office suite vlc media player 3.0.4 player discover software center 5.13.5 featherpad 0.9.0 text editor kde falkon 3.0.1 beta tested default web browser found lack stability replaced firefox 63.0 installer 18.10 calamares system installer place previous ubiquity installer starting release developers longer make recommendations minimum system requirements reviewing beta version 18.10 may 2018 marius nestor softpedia wrote took first lubuntu 18.10 daily build lxqt test drive say 're impressed ... layout simple yet stylish sleek dark theme default single panel bottom screen access everything need ... give five-star rating writing official release 20 october 2018 marius nestor softpedia noted many trials tribulations lot hard work lubuntu team finally managed ship release lxqt desktop environment default instead lxde lightweight x11 desktop environment used default lubuntu releases beginning project also believe lxqt future lxde desktop environment uses old soon deprecated technologies welcome lubuntu 18.10 cosmic cuttlefish shiny lxqt 0.13.0 desktop environment default built latest qt 5.11.1 libraries patched upstream improvements reviewing lubuntu 18.10 distrowatch jesse smith wrote mixed feelings release lubuntu one hand features worked well distribution easy install liked theme operating system pretty easy use aspects n't like usually programs settings modules felt overly complex confusing compared counterparts distributions part though lubuntu nice job capable relatively lightweight distribution ... whole think transition lxde lxqt gone smoothly choices n't like mostly changes minor think people able make leap two desktops fairly easily think settings modules still need polish 'd like see discover replaced modern software manager otherwise felt like graceful mostly positive move 18.04 18.10 lxde lxqt detailed review lubuntu 18.10 mahmudin asharin writing ubuntu buzz found faults release particular network manager concluded users recommend lubuntu 18.04 lts instead sake usability support duration first timer installed/want install 18.10 lxqt go ahead get beautiful user interface nice experience recommend use wicd instead default network manager lxqt desktop pursuer lubuntu 18.10 great example lxqt system try first review full circle magazine noted overall lxqt seen lubuntu 18.10 ready day-to-day use also still room ongoing refinement.introducing lxqt lubuntu 18.10 careful choice lubuntu developers coming right lubuntu 18.04 lts final lxde release gives developers three standard releases continue polish lxqt first lts release ... standard release made schedule 18 april 2019 release marked first lubuntu version without 32-bit support lubuntu developer simon quigley wrote december 2018 release featured lxqt 0.14.1 based upon qt 5.12.2 included working full-disk encryption easier customization calamares installer configurations employing xdg configuration variables austrian keymapping minimum installation ram reduced 500 mb changes include trash home computer network icons added desktop split view pcmanfm-qt exif data display image viewer lximage-qt touchpad settings fixed 18.10 review softpedia writer marius nestor described use lxqt 0.14.1 employed lubuntu 19.04 much-improved richer lxqt experience review full circle magazine concluded lubuntu 18.10 ’ ready prime time 19.04 lxqt looks fresh new everything works right installation even runs fine dvd live session ’ find anything needs fixing 19.04 nine month support period regular release could long term support release least quality user experience lack bugs standard release last one next lts release expected 17 october 2019 standard release expected october 2020 16 august 2018 lubuntu development team announced plans port openbox mir time lubuntu 20.10 allow lubuntu move away x display server implementation wayland instead lxde versions lubuntu 18.04 lts earlier included following applications user applications lxde including 18.04 lts lubuntu also access ubuntu software repositories lubuntu software center synaptic package manager apt allowing installation applications available ubuntu lxqt versions lubuntu 18.10 later include following applications internet applications office applications graphics applications accessories sound video 18.10 lubuntu also access ubuntu software repositories discover software center synaptic package manager apt allowing installation applications available ubuntu
[ 2179, 7159, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2581, 7193, 2585, 2228, 753, 1487, 58, 3996, 7581, 6489, 7587, 4008, 1893, 2260, 7954, 788, 5799, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3...
Test
5,524
2
UNetbootin:unetbootin unetbootin universal netboot installer cross-platform utility create live usb systems load variety system utilities install various linux distributions operating systems without cd installation mode creates bootable usb flash drives bootable usb hard disk drives live usb creator multiple installs device supported installation mode performs network installation frugal install without cd similar performed win32-loader unetbootin distinguishing features support great variety linux distributions portability ability load custom disk image including iso image files support windows linux unlike wubi similar win32-loader installing hard disk unetbootin installs partition disk image thus creating dual-boot setup linux windows
[ 6528, 204, 4496, 7075, 4759, 5571, 3919, 578, 4207, 3271 ]
Test
5,525
8
Broadjam:broadjam broadjam us-based music community website founded september 1999 service aimed primarily independent musicians users interact artists enter contests collaborate peers email reviews blogs social networking tools broadjam also works related industries provide various licensing opportunities including placement films tv shows advertising campaigns video games radio play professional reviews broadjam claims one world largest web communities catering independent musicians site online database 500,000 searchable songs home approximately 110,000 artists world company founded roy elkins assistance stephanie essex elkins former corporate sales marketing executive classical singer classical music radio deejay intention provide promotional services unsigned musicians company based madison wisconsin roy formerly vice president sales marketing sonic foundry prior roy training director ensoniq corporation broadjam offers variety services artists gain exposure feedback musicians make bulk site membership broadjam also offers template-based hosting services help members create website broadjam founded 1999 site initially launched 2000 broadjam originally headquartered new glarus wisconsin relocated 2003 madison wisconsin site originally developed provide services independent musicians hoping get foot door music industry time service evolved provides wide range services artists music industry professionals broadjam holds variety sponsored contests aim expose reward exceptional musicianship songwriting broadjam hosts song month contests every month artist reviews scoring system based good better best used determine winner members submit songs radio play professional reviews placement films tv shows commercials video games music supervisors film television utilize broadjam provide music feature films tv shows commercials members give another feedback reviewing mechanism review songs specific genre random songs entire site highest rated songs appear broadjam top 10s broadjam 200 different top 10 charts sortable genre region production style reviewer demographics broadjam calculates top 10s daily based factors include song plays downloads reviews star ratings broadjam offers site hosting services premium members artists host existing sites create one using templates artists mark songs download mp3 file format members browse broadjam library genre region production based fan picks part professional services group broadjam provides online mechanism tallies votes popular music award ceremonies current customers service include academy country music madison area music awards broadjam also provides music encoding service major record labels use service encode catalog control metadata
[]
Test
5,526
3
Neo_Geo_CD:neo geo cd march 1997 570,000 neo geo cd units sold worldwide neo geo cd first unveiled 1994 tokyo toy show console uses cpu set-up arcade cartridge-based neo geo systems facilitating conversions snk planned release neo geo cd versions every neo geo game still arcades three versions neo geo cd released front-loading version original console design top-loading version developed shortly neo geo cd launch scaled-down cheaper alternative model cdz released december 29 1995 japanese market replacement snk previous efforts front loader top loader neo geo cd met limited success due plagued slow loading times could vary 30 60 seconds loads depending game response criticism neo geo cd long load times snk planned produce model double speed cd-rom drive north america compared single speed drive japanese european models however system missed planned north american launch date october 1995 snk declined give specific reason delay announcement new january 1996 launch date stated decided using double speed drive japanese division produced excess number single speed units found modifying units double speed expensive initially thought snk opted sell postponing production double speed model sold stock single speed units cdz officially sold japan production however faster loading times lack region lock fact could play older cd software made popular import item enthusiasts europe north america system technical specs identical previous models except includes double-speed cd-rom drive response reader inquiries neo geo cd software gamepro reported issue cover dated may 1997 snk quietly discontinued console time criticism system generally long loading times began even launch report electronic gaming monthly neo geo cd unveiling noted show showing demo fatal fury 2 prototype machine showed single speed load time 14-28 seconds rounds see screen shot right load screen approximately one month launch snk reported sold neo geo cd entire initial shipment 50,000 units reviewing neo geo cd late 1995 next generation noted snk reputation fun games argued failure upgrade neo geo system 3d capabilities would keep producing truly cutting edge games limit console small cult following neo geo aes system although less expensive games gave 1 1/2 5 stars system also capable reading redbook standard compact disc audio addition multi-av port nearly identical one used sega genesis model 1 though interchangeable neo geo cd models composite rca a/v s-video jacks rear console cd system 56 mbit 7 mb ram split accordingly neo geo cd library consists primarily ports mvs aes titles mvs arcade games officially released neo geo aes ported instead neo geo cd include puzzle bobble janshin densetsu quest jongmaster mahjong game also released pc engine power spikes ii neo drift new technology futsal 5-on-5 mini soccer games unreleased mvs aes formats also released exclusively neo geo cd include ironclad tesshō rusha chōtetsu burikingā brikin'ger crossed swords ii zintrick oshidashi zintorikku adk world neo geo cd special king fighters '96 neo collection samurai shodown rpg shinsetsu samurai spirits bushidō retsuden rpg spin-off samurai shodown series also released sony playstation sega saturn idol-mahjong final romance 2 arcade game mvs game ported directly neo geo cd
[ 5822, 6330, 5079, 7583, 4006, 1237, 3313, 6217, 638, 683 ]
Test
5,527
5
Streamtuner:streamtuner streamtuner streaming media directory browser use c/python plugin system offers gtk+ 2.0 interface internet radio directories streamtuner actually play files downloads list online radio streams tells unix player user option play selected stream streamtuner offers hundreds thousands music resources common interface streamtuner free software released terms revised bsd license also version nokia 770 internet tablet
[ 5965, 7169, 5571 ]
Validation
5,528
0
Neural_machine_translation:neural machine translation neural machine translation nmt approach machine translation uses large artificial neural network predict likelihood sequence words typically modeling entire sentences single integrated model require fraction memory needed traditional statistical machine translation smt models furthermore unlike conventional translation systems parts neural translation model trained jointly end-to-end maximize translation performance deep learning applications appeared first speech recognition 1990s first scientific paper using neural networks machine translation appeared 2014 followed lot advances following years large-vocabulary nmt application image captioning subword-nmt multilingual nmt multi-source nmt character-dec nmt zero-resource nmt google fully character-nmt zero-shot nmt 2017 2015 first appearance nmt system public machine translation competition openmt'15 wmt'15 also first time nmt contender following year already 90 nmt systems among winners popularity nmt also owes events introducing nmt section nmt neural mt training annual wmt workshop machine translation first independent workshop nmt google continued afterwards year nmt departs phrase-based statistical approaches use separately engineered subcomponents neural machine translation nmt drastic step beyond traditionally done statistical machine translation smt main departure use vector representations embeddings continuous space representations words internal states structure models simpler phrase-based models separate language model translation model reordering model single sequence model predicts one word time however sequence prediction conditioned entire source sentence entire already produced target sequence nmt models use deep learning representation learning word sequence modeling first typically done using recurrent neural network rnn bidirectional recurrent neural network known encoder used neural network encode source sentence second rnn known decoder used predict words target language convolutional neural networks convnets principle somewhat better long continuous sequences initially used due several weaknesses successfully compensated 2017 using so-called attention -based approaches coverage models addressing issues traditional attention mechanism ignoring past alignment information leading over-translation under-translation 2016 best mt systems using neural networks google microsoft yandex promt translation services use nmt google uses google neural machine translation gnmt preference previous statistical methods microsoft uses similar technology speech translations including microsoft translator live skype translator open source neural machine translation system opennmt released harvard nlp group different linguistic knowledges different language families borrowed idea traditional statistical machine translation smt researchers focus one specific language pairs introducing linguistic knowledge nmt work apply chinese radicals reflecting meaning upper-level composed character sub-character level chinese-english nmt address rare word out-of-vocabulary translation issue
[ 3601, 1718, 1444, 2184, 4760, 8065, 715, 6724, 5304, 3292, 2215, 1751, 7372, 4337, 3651, 4349, 4089, 5429, 5612, 7138, 5885, 5008 ]
Validation
5,529
9
Ch_(computer_programming):ch computer programming ch proprietary cross-platform c c++ interpreter scripting language environment originally designed harry h. cheng scripting language beginners learn mathematics computing numerical analysis numeric methods programming c/c++ ch developed marketed softintegration inc. student edition freely available ch professional edition raspberry pi free non-commercial use ch embedded c/c++ application programs numerical computing graphical plotting features ch combined shell ide ch shell combines features common shell c language chide provides quick code navigation symbolic debugging based embedded ch scite scintilla ch written c runs windows linux macos freebsd aix solaris qnx hp-ux supports c90 major c99 features support full set c++ features c99 complex number ieee-754 floating-point arithmetic variable-length array features supported ch became part c99 standard article published computer reseller news crn named ch notable among c-based virtual machines functionality availability third-party libraries ch many toolkits extend functions example ch mechanism toolkit used design analysis commonly used mechanisms fourbar linkage five-bar linkage six-bar linkage crank-slider mechanism cam-follower system ch control system toolkit used modeling design analysis continuous-time discrete-time linear time invariant lti control systems toolkits includes source code ch used integrated curriculum many high schools universities teach computing programming c/c++ ch integrated free c-stem studio platform learning computing science technology engineering mathematics c-stem robotics c-stem studio developed uc davis center integrated computing stem education c-stem offers curriculum k-12 students ch supports lego mindstorms nxt ev3 arduino linkbot finch robot robotalk raspberry pi pi zero arm robot programming learning also embedded labview system-design platform development environment ch supports 1999 iso c standard c99 c++ classes superset c c++ classes several major features c99 supported complex numbers variable length arrays vlas ieee-754 floating-point arithmetic generic mathematical functions specification wide characters addendum 1 c90 also supported c++ features available ch include ch supports classes c++ added abilities including ch interact existing c/c++ libraries call c/c++ functions ch script c/c++ interpreter ch used scripting engine extension language applications pointers arrays variables passed shared c-compiled ch scripting contexts one example embedded ch scripting application mobile-c used collaborative visualization distributed mesh model ch built-in string type string_t automatic memory allocation de-allocation supports shell aliases history piping etc ch built-in 2d/3d graphical plotting features computational arrays numerical computing 2d linear equation form b a*x written verbatim ch
[ 1524, 3915, 578, 4759, 5571, 6778, 352, 3898, 7664, 971, 900, 1284, 154, 1435 ]
Test
5,530
3
Alpine_Linux:alpine linux alpine linux linux distribution based musl busybox designed security simplicity resource efficiency uses hardened kernel compiles user space binaries position-independent executables stack-smashing protection small size heavily used containers providing quick boot times postmarketos project designed run mobile devices based alpine linux originally alpine linux began fork leaf project members leaf wanted continue making linux distribution could fit single floppy disk whereas alpine linux wished include heavyweight packages squid samba well additional security features newer kernel one original goals create framework larger systems although usable purpose longer primary goal
[ 362, 2179, 5017, 2187, 2909, 5724, 6086, 4675, 7528, 7894, 2559, 2935, 6453, 2581, 7555, 2585, 2228, 1487, 1873, 58, 3996, 7587, 4008, 1893, 781, 7954, 1909, 5453, 5803, 6884, 7969, 1535, 6175, 7251, 4400, 1176, 3696, 7253, 474, 1933, 1...
Test
5,531
7
Peercasting:peercasting peercasting method multicasting streams usually audio and/or video internet via peer-to-peer technology used commercial independent amateur multicasts unlike traditional ip multicast peercasting facilitate on-demand content delivery peercasting usually works peers automatically relay stream peers p2p overlay network helps peers find relay specified stream connect method suffers poor quality service times relays disconnect peers need switch different relay referred churn another solution used minute swarming wherein live stream broken minute length files swarmed via p2p software bittorrent coral dijjer however suffers excessive overhead formation new swarm every minute new technique stripe live stream multiple substreams akin raid striping forward error correction timing information applied substreams original stream reformed using least one substreams fountain codes efficient way make combine substreams turn streams relayed using first method another solution permit clients connect new relay resume streaming left old relay relays would retain back buffer permit clients resume streaming anywhere within range said buffer would essentially extension icecast protocol
[ 2984, 3172, 7880, 7063, 2379, 7343, 8174, 7169, 6025, 7744, 499, 4434, 4891, 5414, 3573, 2430, 2696, 1329, 6499, 84 ]
Validation
5,532
3
Deep_Dungeon:deep dungeon dungeon crawler presented first person perspective similar wizardry players navigate nondescript maze-like corridors bid find princess game released exclusively japan april 15 2006 deep dungeon unofficially translated english madō senki set town dorl one day monsters raided town stealing treasures princess etna soul despite attempts brave warriors retrieve soul none successful dungeon player given command list player choose attack enemy vicinity view allocated items escape battle examine area items talk people nearby character effectiveness battle largely determined numerical values attacking power ap defensive power ac health hp values determined character experience level level raises character accumulated experience ex reaches certain point also called deep dungeon ii yūshi monshō second installment deep dungeon series according square enix first 3d dungeon crawler rpg famicom console game villain ruu returned player need explore eight floor tower consisting four ground floors four underground floors find defeat battles much faster paced sequel whereas first game could get slow high miss rate player enemies creating prolonged battle scenes game improved also much higher encounter rate player likely attacked within seconds stand still new feature game player significantly higher level enemies current floor attacked randomly walking hallways although still attacked step predetermined spaces map player gains experience level given attribute points allocate character stats wish unlike console rpgs era stat upgrades usually predetermined randomized beyond player control third installment deep dungeon series first released famicom first deep dungeon title offer player world explore spanning multiple dungeons multiple towns also allows player create party three companions addition hero character choice ranger magician priest character though player dismiss character game started able replace character meet another pre-created playable character one dungeons however game still end soon protagonist swordsman character defeated game retains player-adjustable level-up stats first game well feature removes randomized encounters player significantly higher experience level needed current location one exclusive rather annoying feature game engine sometimes player character fumble remove equipped weapon wasting character turn player wishes re-arm weapon cost player another turn game series award player money gold defeating enemies games force player re-enter maps collect respawning chests money items resale want gold farm fourth final installment deep dungeon series unfortunately game removed custom character feature previous game game player meet two additional playable characters predetermined class game also reverts standard practice randomizing characters stat growth gaining experience level new engine player eventually learn summon two monsters function temporary additional party member single battle also removed feature stops random battles player significantly powerful enemies n't bad seems maps game also much smaller whereas previous games used multi-floor dungeons 32x32 tiles dungeons game either single floor multiple floors fit within single 32x32 map game player accept requests non-player characters optional tasks reward player bonus items experience money finished
[ 423 ]
Train
5,533
1
SHERPA/RoMEO:sherpa/romeo sherpa/romeo service run sherpa show copyright open access self-archiving policies academic journals database uses colour-coding scheme classify publishers according self-archiving policy shows authors whether journal allows preprint postprint archiving copyright transfer agreements currently hold records 22,000 journals
[ 1290 ]
Validation
5,534
4
Google_hacking:google hacking google hacking also named google dorking computer hacking technique uses google search google applications find security holes configuration computer code websites use google hacking involves using advanced operators google search engine locate specific strings text within search results popular examples finding specific versions vulnerable web applications search query codice_1 would locate web pages particular text contained within normal default installations applications include running version every page serve example powered xoops 2.2.3 final one even retrieve username password list microsoft frontpage servers inputting given microscript google search field devices connected internet found search string codice_2 find public web cameras another useful search following codice_3 followed search keyword give list files servers example codice_4 give mp3 files available various servers many similar advanced operators used exploit insecure websites link search operator google used turned 2017 concept google hacking dates back 2002 johnny long began collect google search queries uncovered vulnerable systems and/or sensitive information disclosures labeling googledorks list google dorks grew large dictionary queries eventually organized original google hacking database ghdb 2004 since heyday concepts explored google hacking extended search engines bing shodan automated attack tools use custom search dictionaries find vulnerable systems sensitive information disclosures public systems indexed search engines
[ 3507, 3932, 4116, 5455, 3850, 5372, 7431, 6176, 993, 7346, 2107, 2475, 831, 5141, 136, 2317, 2673, 8107, 3309, 7924, 2591, 2683, 855, 3486, 860, 4636, 168, 6776, 80, 6950, 6153, 2712 ]
Test
5,535
2
IChat:ichat ichat previously ichat av discontinued instant messaging software application developed apple inc. use mac os x operating system supported instant text messaging xmpp/jingle oscar aim protocol audio video calling screen-sharing capabilities also allowed local network discussion users discovered bonjour protocols os x 10.8 mountain lion later releases ichat replaced messages ichat first released august 2002 part mac os x 10.2 featured integration address book mail applications first officially supported aim client native mac os x first-party aim application time still running classic emulation one episode first season hbo dramedy series entourage eric murphy ichat conversation ari gold marking first time application used television series ichat incorporated apple aqua interface used speech bubbles pictures personify online chatting experience ichat green available yellow idle red away icons could displayed next name connected user buddy list color-blind users could altered show different shapes circle available triangle idle squares away illustrate status shape rather color june 2003 apple announced ichat av second major version ichat added video audio conferencing capabilities based industry-standard session initiation protocol sip final version software shipped mac os x 10.3 became available separately day mac os x 10.2 february 2004 aol introduced aol instant messenger aim version 5.5 windows users enabled video audio chats aim protocol compatible apple ichat av day apple released public beta ichat av 2.1 allow mac os x users video conferencing aim 5.5 users june 2004 steve jobs announced next version ichat av would included mac os x 10.4. ichat av 3 provided additional support allow four people single video conference ten people audio conference additionally new version ichat used h.264/avc codec offered superior quality video compared older h.263 codec used previous versions release supported xmpp protocol could directly used connect google talk indirectly used connect users services including facebook chat yahoo messenger however support limited support several common xmpp features account creation service discovery full multi-user chat support ichat 3 included bonjour protocol previously called rendezvous allowed ichat automatically find users ichat bonjour messaging enabled local network october 2005 ichat received support encrypted communications paid subscribers .mac icloud service features part ichat 3.1 released part mac os x v10.4.3 update version also added support xmpp multi-user chat march 2007 apple released mac os x v10.4.9 update allowed usb video device class uvc cameras used ichat rather firewire cameras allowed wider range cameras used ichat av ichat 4 introduced part mac os x 10.5 received new features including ichat theater inspired chatfx product plum amazing backdrops screen sharing ichat theater allowed users share file supported quick look including photos keynote presentations movies video chat session backdrops allowed users insert movies photos backdrop video chats screen sharing allowed two users mac os x leopard control desktop work collaboratively minor features new release included multiple logins animated icons use photo booth effects live video chat tabbed chats ichat 5.0 released mac os x 10.6 reduced bandwidth required 640×480 video chats upgraded ichat theater resolution ichat 6.0 released mac os x 10.7 added support yahoo messenger account allowed ichat users text voice video chats using yahoo mail accounts also supported third-party plugins eventually allowing protocols compatible software ichat 6 last ichat version os x mountain lion replaced messages final release ichat 6.0.1 published february 1 2012 part os x mountain lion preview apple announced february 16 2012 os x messaging client would messages would support imessage protocol making compatible ios client messages also incorporates facetime support apple made messages immediately available downloadable beta version use mac os x 10.7. ichat aim support fully endorsed aol used official implementation aim oscar protocol using xmpp transport ichat could serve client aol instant messenger yahoo messenger mobileme icq xmpp ichat could also integrate google talk contacts xmpp pane
[ 7148, 6788, 3940, 713, 2555, 7170, 2201, 4320, 4690, 734, 405, 4337, 6832, 3989, 2597, 1123, 3322, 1502, 2609, 5786, 4740, 1897, 5091, 6505, 2627, 7609, 3350, 7967, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 1958, 502, 1210, ...
Train
5,536
9
Uniface_(programming_language):uniface programming language uniface development deployment platform enterprise applications run large range runtime environments including mobile mainframe web service-oriented architecture soa windows java ee .net uniface model-driven rapid application development rad environment used create mission-critical applications uniface applications database- platform-independent uniface provides integration framework enables uniface applications integrate major dbms products oracle microsoft sql server mysql ibm db2 addition uniface also supports file systems rms hp openvms sequential files operating system text files wide range technologies mainframe-based products cics ims web services smtp pop email ldap directories .net activex component object model com c ++ programs java uniface operates microsoft windows windows mobile various flavors unix linux vms ibm iseries z/os uniface used complex systems maintain critical enterprise data supporting mission-critical business processes point-of sale web-based online shopping financial transactions salary administration inventory control currently used thousands companies 30 countries effective installed base millions end-users uniface applications range client/server web data entry workflow well portals accessed locally via intranets internet originally developed netherlands inside automation later uniface b.v. product company acquired detroit-based compuware corp 1994 2014 acquired marlin equity partners independent company uniface b.v. global headquarters amsterdam uniface development environment—an integrated collection tools modeling implementing compiling debugging distributing applications uniface applications including use common runtime infrastructure consisting addition uniface anywhere formerly uniface jti java thin client interface deliver client/server uniface applications computer connected internet thin client solution uniface procedural scripting language called uniface proc used code application behavior uniface automates input/output operations kernel default code much fundamental behavior need coded uniface applications component-based infrastructure-independent software programs create use data stored one databases file-systems composite applications include non-uniface components created using development tools deployed distributed client/server web environments mobile applications web services mainframe environments uniface variety component types intended use different layers multi-tier application architecture components presentation tier responsible user interface include components business logic tier handle business rules task-specific behavior user interface data access tier contains physical database structures captured uniface application model uniface ensures physical data access encapsulating sql dbms connectors network middleware access encapsulated middleware drivers uniface router runtime engine executes application components displays presentation components using appropriate user interface connector either gui character-based sends receives data via dbms connector uniface applications developed uniface development environment originally possible develop apple dec platforms windows supported platform development uniface applications development model-driven component-based data structure business rules default behavior application captured application model model definitions reused inherited components override inherited definitions provide component-specific behavior characteristics templates improve productivity enforce consistency defining models application model defines entities tables fields keys indexes relationships together referential integrity entity field model properties set triggers business rules added model declaratively setting properties procedurally adding proc code uniface procedural language triggers triggers containers code triggers represent user system events example occurrence gets focus read leave field others cover matters validation act place holders methods associated particular object use model-level triggers enables uniface collect properties behavior within business objects separating logical physical data structures makes possible define default behavior reuse throughout application speeding development facilitating 3-tier application architecture entity table first defined application model exported physical database form create table scripts objects described application model reused components developers embed objects model component drawing layout canvas presentation components inserting tree view component structure also add component-level objects application model control fields menus component variables properties triggers defined application model inherited copied component definitions changed component level provide specific functionality breaks link application model component although possible restore link model model code properties changed model level components holding object need recompiled collect new definitions provides benefits maintenance ensures rules associated object available wherever used uniface maintains database metadata purposes reuse—application models component definitions component layouts procedural code repository proprietary intended access via uniface development environment ensure repository integrity however repository structure documented making possible though recommended interface directly example reporting using centralized repository application development shared teams software developers uniface integrate version control system vcs supports microsoft common source code control interface specification vcs functionality available within uniface depends vcs used software vendors interpreted implemented ms cscc api differently uniface applications deployed platforms mainframe mobile without changing code components objects startup shells menus toolbars panels glyphs global included proc entries compiled runtime objects packaged zip files deployed onto platform runtime objects executed using virtual machine platform-specific interpreter java later followed uniface respect components compiled one machine executed another providing uniface virtual machine present uniface router uniface server make uniface scalable balanceable make possible run processes asynchronously uniface accesses many databases file systems supports means database connectors drivers dbms connectors map convert uniface data types suitable format particular storage medium runtime possible pass parameters invoke disable database-specific extensions provided database connector licensed possible convert different data sources uniface also provides api database connector interface used create proprietary connectors sql-based database licensing managed compuware distributed license manager dlm server based system distributing licenses clients request precluding need held locally originally called unis product created netherlands 1984 inside automation company headed bodo douqué frits kress technical director 1986 product company changed name uniface early logo product included red capital reflected red capital inside automation logo uniface developed principles american national standards institute ansi 3-schema architecture first proposed 1975 standard approach building database management systems consisting 3 schema metamodels uniface developed dec vax machine using native vax file-management system rms vestige still seen today ’ product continued use “ gold ” key change modes dec vt terminals actually gold yellow key keyboard today “ gold ” simply mapped numeric keyboard key function key early versions product bundled sybase rdbms name fastbuild although limited accessing database uniface continuously evolved handle new technologies application architectures critical success applications built uniface migrated updated modernized without losing original development investment uniface version 3 1986 uniface 3 first public release featured support multiple databases rms oracle c_isam ingres rdb virtual machine interpretation structure editor uniface text command editor uniface version 4 1988 uniface 4 improved text editor form editor improved printing display support introduced support ms-dos added case tool interface uniface version 5 1990 uniface 5 enabled client/server deployment introduction remote database access polyserver introduced graphical user interface via universal presentation interface upi database support extended total 13 databases file systems available dos vms os/2 stratus vos unix japanese character support also introduced uniface six 1994 uniface six completed move fully graphical development environments included graphical form painter application model editor improved deployment dynamic object libraries added support microsoft object linking embedding ole included support apple macintosh added permissions control integrated version control added personal series reporting tools although later removed 3rd party decided enhance product wider platform support uniface seven 1997 uniface seven focused component integration uniface external components introduction uniface request broker urb architecture urb supports bi-directional synchronous asynchronous communication components well remote data access added partitioned application servers messaging uniface seven also delivered first uniface web development deployment tools web application server uniface request dispatcher enhancements included new component types services server pages reports signature editor assembly workbench subsystems operations non-modal forms component instances improved editors navigation enhanced editor plug-in new debugger integrated online help component templates web application server improved validation uniface name server graphical partitioning manager uniface seven also saw introduction several tools uniface 8 2001 uniface 8 brought major changes area process integration uniface router uniface server provided scalable balanced deployment web request dispatcher wrd replaced urd improving performance support web services soap xml introduced connectivity interoperability improved method implementing 3-tier application architecture introduced connectors soap com corba mqseries added window file management improved new deployment utility introduced improving application distribution component subtypes 3-tier architecture added handles added component instances automatic garbage collection added uniface 9 2006 uniface 9 release focused gui usability improvements thin deployment integration support windows mobile added configuration deployment simplified using zipped archives support unicode improved already impressive multilingual capability improvements web development xml handling brought uniface line industry standards dynamic field movement form components removed old barriers flexibility features included improved color handling dynamic menus xml api diagram editor application model cross-referencing functionality support refactoring deployment enhanced web services functionality uniface 9.4 2010 despite point release uniface 9.4 introduced enough major new functionality considered major release major focus rich internet application ria functionality making possible develop web 2.0 applications rich functionality client/server applications using tools methodologies used develop classic client/server applications language locale support substantially improved support html email security encryption uniface 9.5 2011 release uniface 9.5 improved product ’ integration world wide web introduction javascript api together improvements means client-side processing bring benefits areas performance integration functionality user-friendliness session management capability extended offer improved security processing web services fully supports complex datatypes soap restful services also improvements customers business-critical client/server applications particularly area grid widget uniface 9.6 2012 uniface 9.6 provided significant overhaul uniface client server gui capabilities functionality included html5 control leveraging javascript apis originally delivered web enhanced tab control updates image handling buttons plus improvements form container control enables 'forms within forms enabling development dynamic user experiences addition gui enhancements uniface 9.6 also delivered enhancements uniface web web services capabilities including ability dynamically change scope web transactions web pagination hitlist processing improved wsdl xml capabilities uniface 9.7 2015 uniface 9.7 delivered significant enhancements development web applications including extensions facilitate development deployment mobile applications based hybrid application enhancing multi-channel development/deployment capability uniface significantly extended uniface 9.7.02 release may 2016 providing integration build service provider enable hybrid applications packaged distribution via google play apple store addition mobile web enhancements uniface 9.7 delivered integration client server enhancements ms windows 10 uniface development environment ude modernized new look feel providing new look front screen refreshed visual user experience approach uniface took modernize ude shared developer conferences community website uniface.info help advise promote client server modernization existing customer base uniface 9.7 provides two new database drivers enabling connectivity postgresql sap hana uniface 10 2015 uniface 10 delivered rewritten development environment based core concepts integrated development environments ide initial release positioned preview early adopter release showed significant change proprietary development style highly productive implementation industry standard development enabling development web applications may 2015 first edition uniface 10 released early adopters test develop web applications full enterprise edition uniface 10 released september 2016 delivering mobile client server development migration path enable existing customer base move applications uniface 10
[ 4759, 7715, 6986, 6991, 5571, 6908, 578, 2866, 8117, 5956, 7213, 2519, 1435 ]
Train
5,537
2
Sbrk:sbrk brk sbrk basic memory management system calls used unix unix-like operating systems control amount memory allocated data segment process functions typically called higher-level memory management library function malloc original unix system brk sbrk ways applications could acquire additional data space later versions allowed also done using mmap call brk sbrk calls dynamically change amount space allocated data segment calling process change made resetting program break process determines maximum space allocated program break address first location beyond current end data region amount available space increases break value increases available space initialized value zero break value automatically rounded size appropriate memory management architecture brk subroutine sets program break value value end_data_segment parameter changes amount available space accordingly sbrk subroutine adds program break value number bytes contained increment parameter changes amount available space accordingly increment parameter negative number case amount available space decreased set increment parameter zero fetch current value program break upon successful completion brk subroutine returns value 0 sbrk subroutine returns prior value program break available space increased prior value also points start new area either subroutine unsuccessful value returned errno global variable set indicate error current mac os x implementation sbrk emulation maximum allocation 4 megabytes limit reached −1 returned errno set enomem error enomem set allocated space remains unchanged one following true
[ 790, 1857, 3493, 7260, 5537 ]
Train
5,538
4
Buck-security:buck-security buck-security security scanner linux first released june 2009 originally designed system administrators maintaining debian ubuntu servers program runs security checks like looking worldwriteable files directories listening services unwanted installed packages version 0.5 checksum feature included creates encrypted list checksums important system files buck-security claims concentrate important checks therefore usable security scanners like lynis tiger april 2010 buck-security featured sourceforge blog july 2013 added yocto project 20
[ 3915, 5571, 5857, 3042, 578 ]
Train
5,539
7
Open_Grid_Forum:open grid forum open grid forum ogf community users developers vendors standardization grid computing formed 2006 merger global grid forum enterprise grid alliance ogf models process internet engineering task force ietf produces documents many acronyms ogsa ogsi jsdl ogf two principal functions plus administrative function standards organization grid computing building communities within overall grid community including extending within academia industry function areas divided groups three types working groups generally tightly defined role usually producing standard research groups looser role bringing together people discuss developments within field generate use cases spawn working groups community groups restricted community functions three meetings organized per year divided approximately evenly averaging number years north america europe east asia many working groups organize face-to-face meetings interim concept forum bring together developers practitioners users distributed computing known grid computing time discussed birds feather session november 1998 sc98 supercomputing conference based response idea bof ian foster bill johnston convened first grid forum meeting nasa ames research center june 1999 drawing roughly 100 people mostly us group organizers nominated charlie catlett argonne national laboratory university chicago serve initial chair confirmed via plenary vote held 2nd grid forum meeting chicago october 1999 advice assistance internet engineering task force ietf ogf established process based ietf ogf managed steering group 1998 groups similar grid forum began organize europe called egrid japan discussions among leaders groups resulted combining form global grid forum met first time amsterdam march 2001 ggf-1 amsterdam followed five grid forum meetings catlett served ggf chair two 3-year terms succeeded mark linesch hewlett packard september 2004 enterprise grid alliance ega formed 2004 focused large data center businesses emc corporation netapp oracle corporation ggf-18 23rd gathering forum counting first five gf meetings september 2006 ggf became open grid forum ogf based merger ega september 2007 craig lee aerospace corporation became chair technologies specified ogf include addition technical standards ogf published community-developed informational experimental documents first version drmaa api implemented sun grid engine also university wisconsin-madison program condor cycle scavenger separate globus alliance maintains implementation standards globus toolkit release unicore based ogsa architecture jsdl
[ 6068, 8160, 7428, 374, 6887, 1923, 110, 3783, 2477, 736, 6199, 5313, 4159, 138, 6473, 7930, 5604, 72, 4905, 2899, 5093 ]
Test
5,540
2
Comparison_of_netbook-oriented_Linux_distributions:comparison netbook-oriented linux distributions netbooks small laptops screen sizes approximately 7 12 inches low power consumption use either ssd solid state disk hdd hard disk drive storage 2 gigabytes ram often less lack optical disk drive usually usb ethernet wifi often bluetooth connectivity name emphasizes use portable internet appliances special linux distributions called netbook distributions machines distributions purport optimized use small low-resolution displays tend include broad mix voip web-focused tools including proprietary applications rarely seen installed default mainstream desktop distributions instance nokia maemo asus customized xandros ship skype adobe flash installed ubuntu netbook edition offers option oems public numbers measuring install-base operating systems available google trends data handful indicate relative popularity
[ 1807, 3938, 3613, 6422, 7528, 3271, 2559, 1100, 6443, 7555, 6117, 3996, 2240, 7587, 6865, 7956, 5453, 5803, 7242, 462, 1535, 6892, 4400, 1176, 6549, 3384, 4435, 2329, 2689, 1227, 5523, 5530, 1260, 3780, 573, 578, 4877, 2765, 3133, 2426, ...
Validation
5,541
7
Stanford_DASH:stanford dash stanford dash cache coherent multiprocessor developed late 1980s group led anoop gupta john l. hennessy mark horowitz monica s. lam stanford university based adding pair directory boards designed stanford 16 sgi iris 4d power series machines cabling systems mesh topology using stanford-modified version torus routing chip boards designed stanford implemented directory-based cache coherence protocol allowing stanford dash support distributed shared memory 64 processors stanford dash also notable supporting helping formalize weak memory consistency models including release consistency stanford dash first operational machine include scalable cache coherence influenced subsequent computer science research well commercially available sgi origin 2000 stanford dash included 25th anniversary retrospective selected papers international symposium computer architecture several computer science books simulated university edinburgh used case study contemporary computer science classes
[ 1586, 3816, 3692 ]
Test
5,542
5
Line_Mode_Browser:line mode browser line mode browser also known lmb wwwlib www second web browser ever created browser first demonstrated portable several different operating systems operated simple command-line interface could widely used many computers computer terminals throughout internet browser developed starting 1990 supported world wide web consortium w3c example test application libwww library one fundamental concepts world wide web projects cern universal readership 1990 tim berners-lee already written first browser worldwideweb later renamed nexus program worked proprietary software next computers limited use berners-lee team could port worldwideweb application features—including graphical wysiwyg editor— widely deployed x window system since experience programming team recruited nicola pellow math student intern working cern write passive browser basic could run computers time name line mode browser refers fact ensure compatibility earliest computer terminals teletype machines program displayed text images line-by-line text input cursor positioning development started november 1990 browser demonstrated december 1990 development environment used resources priam project french language acronym projet interdivisionnaire d'assistance aux microprocesseurs project standardise microprocessor development across cern short development time produced software simplified dialect c programming language official standard ansi c yet available platforms line mode browser released limited audience vax rs/6000 sun-4 computers march 1991 release first publicly available version integrated cern program library cernlib used mostly high-energy physics-community first beta browser released 8 april 1991 berners-lee announced browser availability august 1991 alt.hypertext newsgroup usenet users could use browser anywhere internet telnet protocol info.cern.ch machine also first web server spreading news world wide web 1991 increased interest project cern laboratories desy germany elsewhere throughout world first stable version 1.1 released january 1992 since version 1.2l released october 1992 browser used common code library later called libwww main developer pellow started working macwww project browsers began share source code may 1993 world wide web newsletter berners-lee announced browser released public domain reduce work new clients 21 march 1995 release version 3.0 cern put full responsibility maintaining line mode browser w3c line mode browser libwww library closely tied together—the last independent release separate browser component 1995 browser became part libwww agora world wide web email browser based line mode browser line mode browser popular beginning web since web browser available operating systems statistics january 1994 show mosaic quickly changed web browser landscape 2 world wide web users browsed line mode browser new niche text-only web browser filled lynx made line mode browser largely irrelevant browser one reason lynx much flexible line mode browser became test application libwww simplicity line mode browser several limitations line mode browser designed work operating system using called dumb terminals user interface simple possible user began command-line interface specifying uniform resource locator url requested web page printed line line screen like teleprinter websites displayed using first versions html formatting achieved capitalization indentation new lines header elements capitalized centered separated normal text empty lines navigation controlled pointing device mouse arrow keys text commands typed program numbers brackets displayed link links opened typing corresponding number program led one journalist time write web way finding information typing numbers page scrolled empty command carriage return entered scrolled command codice_1 command codice_2 navigated backwards history new pages navigated codice_3 go url browser authoring functions pages could read edited considered unfortunate robert cailliau one developers think retrospect biggest mistake made whole project public release line-mode browser gave internet hackers immediate access point view passive browser — editing capabilities line mode browser designed able platform independent official ports apollo/domain ibm rs6000 decstation/ultrix vax/vms vax/ultrix ms-dos unix windows classic mac os linux mvs vm/cms freebsd solaris macos browser supports many protocols like file transfer protocol ftp gopher hypertext transfer protocol http network news transfer protocol nntp wide area information server wais features included rlogin telnet hyperlinks cyrillic support added 25 november 1994 version 2.15 ability set proxy client browser could run background process download files line mode browser problems recognizing character entities properly collapsing whitespace supporting tables frames
[ 4655, 6802, 5378, 2205, 7537, 6809, 393, 5041, 3291, 2574, 2577, 6452, 405, 4352, 4725, 1136, 6858, 2973, 3338, 4743, 2261, 84, 87, 445, 5450, 1152, 1525, 4759, 2281, 7628, 5821, 3363, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520...
Validation
5,543
8
Orion_Application_Server:orion application server orion application server java ee application server developed swedish company ironflare ab founded magnus stenman karl avedal first released 1999 orion claims first commercially available application server full java ee support current stable version 2.0.7 compliant java ee version 1.3 oracle corporation acquired license source orion 2001 developed oracle application server containers java ee oc4j oc4j documentation contains reference orion server orion developers involved maintenance enhancements source oracle ironflare became official java ee licensee 2003 enabled access sun microsystems compatibility testing tools ensure correct implementation java ee specification orion orion product ironflare hence orion marketed company
[]
Validation
5,544
1
SolidDB:soliddb soliddb in-memory relational database management system developed sold unicom global soliddb delivers extreme speed persistent relational in-memory database meets performance reliability demands real-time applications unicom global known unicom government inc. american information technology hardware solutions company founded 1983 provide microcomputer software federal government united states 1986 worked local state federal government agencies 1996 registered url engaged e-commerce soliddb includes in-memory database well traditional disk based database employ sql interface high availability option in-memory disk based engines coexist inside server process single sql statement access data engines high availability option maintains two copies data synchronized times case system failure applications recover access soliddb less second without loss data soliddb easy deploy administer ability embedded directly applications run virtually unattended lower total cost-of-ownership historically used embedded database telecommunications equipment network software similar systems companies using soliddb include alcatel-lucent ericsson cisco systems emc corporation hewlett-packard nokia siemens ag nokia networks solid acquired ibm late 2007 privately held company founded helsinki finland 1992 solid sold unicom global 2014
[ 3764, 3371, 4783, 2054, 7248 ]
Test
5,545
2
Zero_Install:zero install zero install means distributing packaging software multiple operating systems linux unix-like macos windows rather normal method downloading software package extracting installing used accompanying use destructive updates privilege escalation packages distributed using zero install need run first time software accessed downloaded internet cached subsequently software accessed cache inside cache application unpacks directory application directory systems system intended used alongside distribution native package manager two advantages zero install popular packaging systems cross-platform root password needed install software packages installed system locations writable user instead requiring administrator access thus package installation affects user installing makes possible users able install run new software among disadvantages 0install fact applications often need rewrite packager e.g absolute paths may use among requirements quality 0install repo content varies may contain unmaintained software
[ 8055, 1621, 2091, 5200, 5017, 631, 6609, 1723, 5904, 1260, 5726, 7619, 4675, 5912, 3366, 5480, 4778, 5571, 578, 2034, 4603, 4059, 7092, 2581, 7555, 6743, 3559, 2771, 326, 2594, 4441, 1406, 6663, 1684, 952, 4991, 523, 163, 6312, 3915, 55...
Test
5,546
4
Multiscanning:multiscanning multiscanning running multiple anti-malware antivirus engines concurrently traditionally single engine actively scan system given time using multiple engines simultaneously result conflicts lead system freezes application failures however number security applications application suites optimized multiple engines work together testing agencies published results showing single antivirus engine 100 effective every malware threat engine uses different scanning methodologies updates malware definition files various frequencies using multiple engines increases likelihood catching malware affect system network
[ 6644, 5144, 910, 2746, 4456, 5925, 7087, 2642 ]
Train
5,547
4
Abuse_Reporting_Format:abuse reporting format abuse reporting format arf standard format reporting spam via email draft describing standard format feedback loop fbl reports posted yakov shafranovich april 2005 evolved current aol pioneered field 2003 initially used different format converted de facto standard 2008 feedback loops n't use arf january 2010 ietf chartered new working group working towards goal standardizing arf format wg called messaging abuse reporting format wg marf produced rfc 5965 2012 extended rfc 6591 rfc 6692 define failure reports reporting email authentication failures 2015 latter report type extended rfc 7489 define dmarc forensic reports arf format designed extensible providing generic spam reporting e.g users anti-spam center help desk opt-out operations format defines new mime type included codice_1 attachment includes least headers offending message although draft description acknowledges operators may choose modify redact portion privacy legal reasons recommends entire original email message attached including unmodified recipient address arf-encapsulated fbl report comes subject offending message much like bounce messages abuse report consists human readable part followed machine readable part original message machine readable part type codice_2 whose definition core draft extensibility achieved including feedback-type field characterizes report possible values field iana registry provided feedback-type well field names field name may either relevant type feedback specified type fields may appear multiple times example source-ip field containing ip address original message received may appear type fbl report removal-recipient field indicating email addresses removed may appear opt-out reports one times addition dkim-failure subtype iana registry example report email abuse follows note first three lines machine readable part required
[ 5733, 5673, 5675, 4734, 1321, 5722, 6102, 1036 ]
Test
5,548
9
XploRe:xplore xplore commercial statistics software package developed german software company md*tech around prof. dr. wolfgang härdle xplore discontinued 2008 last version 4.8 available download cost user interacted software via xplore programming language derived c programming language individual xplore programs called quantlets besides standard functions one- multidimensional data analysis focus non- semiparametric modelling statistics financial markets xplore quantlet client users able run xplore java applet web browser applet sent user commands via tcp/ip based communication protocol xplore quantlet server computed necessary results sent back client technology also used enrich electronic books interactive examples
[ 3606, 2820, 1626, 4759, 1731, 5288, 5117, 4872, 4705, 4067, 3981, 3388, 4070, 3807, 1398, 6934, 1879, 7579, 3410, 256, 3915, 1435 ]
Validation
5,549
8
Goanna_(software):goanna software goanna open-source browser engine fork mozilla gecko used pale moon browser basilisk browser uxp-based applications fork k-meleon browser also uses goanna independent fork gecko first released january 2016 project founder lead developer m. c. straver technical legal motives context pale moon increasing divergence firefox two significant aspects goanna divergence rust language components added gecko mozilla quantum project applications use goanna always run single-process mode whereas firefox became multi-process application core web standards supported goanna
[ 1152, 4755, 893, 7975, 6802, 1190, 3548, 5263, 6368, 6458, 7015, 2049, 2415, 5506, 4352, 7850, 6221, 7028, 340, 5699, 7587, 84, 5887, 445, 4287 ]
Validation
5,550
1
BioSearch:biosearch biosearch web application developed manage marine biodiversity data indian waters recent demand indian marine biodiversity information increased manifolds owing mainly realization marine biodiversity potential biotechnology pollution control energy generation however recently web based open access database could provide comprehensive information indian coastal biodiversity lacking biosearch created address need biosearch enables access anyone anywhere time biosearch search page user search information organism name location presence recorded ecology economic importance user obtain information organism names image description ecology economic importance also referred literature biosearch web-based application user-end requirements minimal basic requirement includes computer system internet connection web browser biosearch designed enable easy access organism pages lowest internet connection speeds particularly important parts country rely dial–up 56kbit/s internet connections various applications biosearch anticipated biosearch basic level used fishermen information fish catch general public learn marine biodiversity browsing name indices students lecturers use description lifecycle reproduction taxonomic literature information project work activities conservationist obtain organism distribution diversity particular area iucn red list status organism biotechnologist use biosearch know distribution biotechnologically important organism may help future specimen collection advance applications anticipated fields pisciculture remote sensing geographical information systems gis ecological modeling
[]
Test
5,551
7
Imonggo:imonggo imonggo free cloud-based pos small businesses released international tech company movmento pte ltd. 2009 first free web-based pos system available small business imonggo used macos configured safari also supports major internet browsers internet explorer firefox google chrome imonggo version 2.0 first launched 2009 movmento pte ltd.. movmento saas company headquarters singapore sales marketing divisions united states research development teams located philippines imonggo released ipad app january 4 2013 app allows users sell items offline use ipad tablets showcase products customers imonggo downloadable software users must create account online accessed anywhere internet connection imonggo configured pos system well web-based retail management solution allows retailers manage hundreds stores inventory well providing sales analysis business intelligence imonggo allows stores create multiple users well business subsidiaries software also hack-proof ssl encryption protect data also uses several servers different geographical areas back data order ensure business data company lost destroyed software also support peripherals barcode scanners label printers cash drawers check readers receipt printers signature capture pads imonggo partnered authorize.net credit card processing also software partner star micronics co. ltd. imonggo awarded best business software award point sales software category apex 2009 2011 also listed one top 90 cloud computing companies watch
[ 330, 5571 ]
Test
5,552
4
Norton_Security:norton security norton security developed symantec corporation cross-platform security suite provides subscription-based real-time malware prevention removal addition identity theft protection performance tuning tools features include personal firewall email spam filtering phishing protection released september 23 2014 part symantec streamlined norton line replaces long-running norton internet security flagship antivirus product effort streamline large confusing norton product line symantec combined nine standalone norton products one all-purpose suite norton security supersedes norton internet security norton 360 overlapping release cycle saw version 22 initial release former final release latter however version 22 norton 360 norton internet security updates opposed full releases terms similarities differences predecessors norton security retains components norton internet security including antivirus firewall identity theft components adds optimization tools norton 360 norton security available three editions norton security standard one license valid single device norton security deluxe five licenses norton security premium offers ten licenses 25 gb hosted online backup premium subscription symantec parental control system editions include protection windows os x android ios devices however features may vary based operating system
[ 3842, 4759, 4398, 4138, 4594, 5571, 6107, 2032, 7738, 2488, 1666, 5856, 2789, 4645, 7597, 6962 ]
Test
5,553
0
Robby_Garner:robby garner robby garner born 1963 american natural language programmer software developer 1998 1999 loebner prize contests program called albert one listed 2001 guinness book world records written human computer program native cedartown georgia robby attended cedartown high school worked father television repair shop began programming family business age 15 commander afjrotc squadron junior high school attending joint-enrollment college classes local community college forming software company called robitron software research inc. 1987 father robert j. garner sister pam worked software developer 1997 father retired company disbanded one first web chatterbots named max headcold written garner 1995 max served two purposes collect data web chat behavior entertain customers fringeware online bookstore program eventually implemented java package called jfred written paco nathan based c++ fred cgi program influences stanford various corporations garner nathan took part world largest online turing test 1998 jfred program perceived human 17 participants computational behaviorist term coined dr. thomas whalen 1995 garner first attempts simulating conversation involved collections internet chat viewed sequence stimuli responses kevin copple ellaz systems collaborated garner several projects including copple ella garner contributed voice recordings music garner copple believe intelligence may built one facet time rather depending general purpose theory emerge competing six loebner prize contests used competition way test prototypes judges year winning contest twice 1998 1999 program called albert one began collaborating software developers variety conversational systems garner created robitron yahoo group 2002 forum virtual watering hole loebner prize contest participants discussion related topics multifaceted approach presented colloquium conversational systems november 2005 involves multiple chat bots working control master control program using technique strengths various web agents may united control java applet servlet control program categorizes stimuli delegates responses programs hierarchy spin-off technique turing hub automated turing test featuring four top loebner prize contest competitors
[]
Test
5,554
5
HMAC-based_One-time_Password_algorithm:hmac-based one-time password algorithm hmac-based one-time password algorithm hotp one-time password otp algorithm based hash-based message authentication codes hmac cornerstone initiative open authentication oath hotp published informational ietf rfc 4226 december 2005 documenting algorithm along java implementation since algorithm adopted many companies worldwide see hotp algorithm freely available open standard hotp algorithm provides method authentication symmetric generation human-readable passwords values used one authentication attempt one-time property leads directly single use counter value parties intending use hotp must establish typically specified authenticator either accepted authenticated parties compute hotpvalue authenticator checks locally-generated value value supplied authenticated authenticator authenticated increment counter independently latter may increase ahead former thus resynchronisation protocol wise rfc4426 n't actually require make recommendation simply authenticator repeatedly try verification ahead counter window size authenticator counter continues forward value verification succeeds requires actions authenticated recommendation made persistent throttling hotpvalue verification take place address relatively small size thus vulnerability brute force attacks suggested verification locked small number failed attempts failed attempt attracts additional linearly-increasing delay 6-digit codes commonly provided proprietary hardware tokens number vendors informing default value truncation extracts 31 bits formula_1 ≈ 9.3 decimal digits meaning 10 10th digit providing less extra variation taking values 0 1 2 i.e. 0.3 digits verification authenticator authenticate simply generating next hotpvalue returning authenticated generate hotpvalue verify note counters guaranteed synchronised point process hotpvalue human-readable design output -digit decimal number without omission leading 0s value least significant base-10 digits hotp hotp truncation hash-based message authentication code hmac counter c key k hash function h truncation first takes 4 least significant bits mac uses offset index used select 31 bits mac starting bit 1 note 31 bits single bit short 4-byte word thus value placed inside word without using sign bit significant bit done definitely avoid modular arithmetic negative numbers many differing definitions implementations hardware software tokens available various vendors see references hardware tokens implementing oath hotp tend significantly cheaper competitors based proprietary algorithms 2010 oath hotp hardware tokens purchased marginal price products used strong passwords well oath hotp software tokens available nearly major mobile/smartphone platforms j2me android iphone blackberry maemo macos windows mobile although reception computer press negative 2004 2005 ietf adopted hotp rfc 4226 december 2005 various vendors started produce hotp compatible tokens and/or whole authentication solutions according paper strong authentication entitled road map replacing passwords otp authentication published burton group division gartner inc. 2010 gartner expectation hardware otp form factor continue enjoy modest growth smartphone otps grow become default hardware platform time
[ 1544, 6788, 2346, 740, 3227 ]
Validation
5,555
2
TR-DOS:tr-dos tr-dos disk operating system zx spectrum beta disc beta 128 disc interfaces tr-dos beta disc developed technology research ltd uk 1984 became standard disk releases zx spectrum especially modern programs made tr-dos opposed disk systems current emulators support tr-dos disk images formats .trd .scl clone interface also used russian pentagon scorpion machines latest official firmware version 5.03 1986 unofficial versions various enhancements bug-fixes released since 1990 latest 6.10e 2006 tr-dos handles ss/ds sd/dd floppy disks modern versions support ram disk versions support hard disks
[ 5462, 2076, 3748 ]
Test
5,556
4
CyberCIEGE:cyberciege cyberciege serious game designed teach network security concepts development sponsored u.s. navy used training tool agencies u.s. government universities community colleges cyberciege covers broad range cybersecurity topics players purchase configure computers network devices keep demanding users happy e.g. providing internet access protecting assets variety attacks game includes number different scenarios focus basic training awareness others advanced network security concepts scenario development kit available creating customizing scenarios network security components include configurable firewalls vpn gateways vpn clients link encryptors authentication servers workstations servers include access control lists acls may configured operating systems enforce label-based mandatory access control policies players deploy public key infrastructure pki -based cryptography protect email web traffic vpns game also includes identity management devices biometric scanners card readers control access workstations physical areas cyberciege game engine consumes “ scenario development language ” describes scenario terms users goals assets values initial state scenario terms pre-existing components conditions triggers provide flow scenario game engine defined enough fidelity host scenarios ranging e-mail attachment awareness cyber warfare cyberciege scenarios place player situations player must make information assurance decisions interactive simulation illustrates potential consequences player choices terms attacks information assets disruptions authorized user access assets game employs hyperbole means engaging students scenario thus simulation intended always identify actual consequences specific choices game confronts student problems conflicts questions considered developing implementing security policy game designed construction management simulation set three-dimensional virtual world players build networks observe virtual users thoughts scenario divided multiple phases phase includes one objectives player must achieve prior moving next phase players view status virtual user ’ success achieving goals i.e. accessing enterprise assets via computers networks unproductive users express unhappy thoughts utter comic book style speech bubbles bang keyboards players see consequences attacks lost money pop-up messages video clips burning computers cyberciege includes sophisticated attack engine assesses network topologies component configurations physical security user training procedural security settings attack engine weighs resultant vulnerabilities attacker motives compromise assets network—and motive may vary asset thus assets might defended via firewall assets might require air gap high assurance protection mechanisms attack types include trojan horses viruses trap doors denial service insiders i.e. bribed users lack background checks un-patched flaws physical attacks attack engine coupled economy engine measures virtual user ’ ability achieve goals i.e. read write assets using computers networks combination supports scenarios illustrate real-world trade-offs use air-gaps versus risks cross-domain solutions accessing assets classified unclassified networks game engine includes defined set assessable conditions resultant triggers allow scenario designer provide players feedback e.g. bubble speech characters screen tickers pop-up messages etc transition game new phases fidelity game engine intended high enough players make meaningful choices respect deploying network security countermeasures high engulf player administrative minutiae cyberciege illustrates abstract functions technical protection mechanisms configuration-related vulnerabilities example attack might occur particular firewall port left open specific software service patched cyberciege designed provide fairly consistent level abstraction among various network computer components technical countermeasures seen considering several cyberciege game components cyberciege firewalls include network filters let players block traffic selected application “ ports ” e.g. telnet players configure filters different network interfaces different traffic directions lets players see consequences leaving ports open e.g. attacks allows players experience need open ports e.g. one characters might unable achieve goal unless filter configured allow ssh traffic cyberciege includes vpn gateways computer based vpn mechanisms players configure identify characteristics protection e.g. encryption authentication neither provided network traffic depending source destination allows cyberciege illustrate risks associated providing unprotected internet access workstation vpn tunnel corporate network network components e.g. workstations include configuration choices related type component cyberciege lets players select consequential password policies procedural configuration settings
[ 2489, 651 ]
Test
5,557
4
SkyGrabber:skygrabber skygrabber software russian company skysoftware accepts input digital satellite tuner card hard drive recording used iraqi insurgents group kata'ib hezbollah intercept mq-1 predator drone video feeds encrypted encryption feeds removed performance reasons
[ 6574, 726, 4759, 5571, 6419 ]
Test
5,558
8
Helicon_Ape:helicon ape helicon ape piece software helicon tech destined introduce apache functionality iis web servers helicon ape realized asp.net module iis 7 higher implementing functionality 35 apache modules allows using apache configurations leaving syntax intact iis extend standard iis capabilities aside realization apache modules helicon ape possesses proprietary modules server-side debugging profiling mod_developer seo optimization mod_linkfreeze hotlinking protection mod_hotlink helicon ape gui interface see screenshot allows easy configs editing directives auto-completion spell-check features supported browsing includes regular expressions tester password generation utility list modules currently supported helicon ape helicon ape designed specifically benefit advantages iis 7 architecture 100 operability ensured iis 7 higher windows vista windows server 2008 windows 7 windows server 2008 r2 iis6 windows server 2003 helicon ape offers slightly limited functionality see compatibility chart three license types available helicon ape
[ 2885, 4759, 5571, 3135, 6024 ]
Test
5,559
3
Bulldozer_(microarchitecture):bulldozer microarchitecture amd bulldozer family 15h microprocessor microarchitecture fx opteron line processors developed amd desktop server markets bulldozer codename family microarchitectures released october 12 2011 successor k10 microarchitecture bulldozer designed scratch development earlier processors core specifically aimed computing products tdps 10 125 watts amd claims dramatic performance-per-watt efficiency improvements high-performance computing hpc applications bulldozer cores bulldozer cores support instruction sets implemented intel processors available introduction including sse4.1 sse4.2 aes clmul avx well new instruction sets proposed amd abm xop fma4 f16c bulldozer gen4 excavator supports avx2 instruction sets according amd bulldozer-based cpus based globalfoundries 32 nm silicon insulator soi process technology reuses approach dec multitasking computer performance arguments according press notes balances dedicated shared computer resources provide highly compact high units count design easily replicated chip performance scaling words eliminating redundant elements naturally creep multicore designs amd hoped take better advantage hardware capabilities using less power bulldozer-based implementations built 32nm soi hkmg arrived october 2011 servers desktops server segment included dual chip 16-core opteron processor codenamed interlagos socket g34 single chip 4 6 8 cores valencia socket c32 zambezi 4 6 8 cores targeted desktops socket am3+ bulldozer first major redesign amd ’ processor architecture since 2003 firm launched k8 processors also features two 128-bit fma-capable fpus combined one 256-bit fpu design accompanied two integer clusters 4 pipelines fetch/decode stage shared bulldozer also introduced shared l2 cache new architecture amd calls design module 16-core processor design would feature eight modules operating system recognize module two logical cores modular architecture consists multithreaded shared l2 cache flexfpu uses simultaneous multithreading physical integer core two per module single threaded contrast intel hyperthreading two virtual simultaneous threads share resources single physical core bulldozer introduced clustered multithreading cmt parts processor shared two threads parts unique thread terms hardware complexity functionality bulldozer cmt module equal dual-core processor integer power either single-core processor dual core floating-point power depending whether code saturated floating point instructions threads running cmt module whether fpu performing 128-bit 256-bit floating point operations reason two integer cores floating-point unit consisting pair 128-bit fmac execution units cmt simpler similar design philosophy smt designs try utilize execution units efficiently either method two threads compete execution pipelines loss performance one threads due dedicated integer cores bulldozer family modules performed roughly like dual core dual thread processor sections code either wholly integer mix integer floating point yet due smt use shared floating point pipelines module would perform similarly single core dual thread smt processor smt2 pair threads saturated floating point instructions last two comparisons make assumption comparison processor possesses equally wide capable execution core integer-wise floating-point wise respectively cmt smt peak effectiveness running integer floating point code pair threads cmt stays peak effectiveness working pair threads consisting integer code smt one threads underperform due competition integer execution units disadvantage cmt greater number idle integer execution units single threaded case single threaded case cmt limited use half integer execution units module smt imposes limit large smt core integer circuitry wide fast two cmt cores could theory momentarily twice integer performance single thread case realistically general code whole pollack rule estimates speedup factor formula_1 approximately 40 increase performance cmt processors typical smt processor similar efficient shared use l2 cache pair threads longer pipeline allowed bulldozer family processors achieve much higher clock frequency compared k10 predecessors increased frequencies throughput longer pipeline also increased latencies increased branch misprediction penalties issue widths peak instruction executions per cycle jaguar k10 bulldozer core 2 3 4 respectively made bulldozer superscalar design compared jaguar/bobcat however due k10 somewhat wider core addition lack refinements optimizations first generation design bulldozer architecture typically performed somewhat lower ipc compared k10 predecessors refinements made piledriver steamroller ipc bulldozer family distinctly began exceed k10 processors phenom ii first revenue shipments bulldozer-based opteron processors announced september 7 2011 fx-4100 fx-6100 fx-8120 fx-8150 released october 2011 remaining fx series amd processors released end first quarter 2012 major sources cpu-world xbit-labs two series bulldozer-based processors servers opteron 4200 series socket c32 code named valencia four modules opteron 6200 series socket g34 code named interlagos 8 modules november 2015 amd sued california consumers legal remedies act unfair competition law allegedly misrepresenting specifications bulldozer chips class-action lawsuit filed 26 october us district court northern district california claims bulldozer module fact single cpu core dual-core traits rather true dual-core design 24 october 2011 first generation tests done phoronix confirmed performance bulldozer cpu somewhat less expected many tests cpu performed level older generation phenom 1060t performance later substantially increased various compiler optimizations cpu driver fixes released first bulldozer cpus met mixed response discovered fx-8150 performed poorly benchmarks highly threaded falling behind second-generation intel core i* series processors matched even outperformed amd phenom ii x6 lower clock speeds highly threaded benchmarks fx-8150 performed par phenom ii x6 intel core i7 2600k depending benchmark given overall consistent performance intel core i5 2500k lower price results left many reviewers underwhelmed processor found extremely power-hungry load especially overclocked compared intel sandy bridge 13 october 2011 amd stated blog community feel product performance meet expectations showed benchmarks actual applications outperformed sandy bridge i7 2600k amd x6 1100t january 2012 microsoft released two hotfixes windows 7 server 2008 r2 marginally improve performance bulldozer cpus addressing thread scheduling concerns raised release bulldozer 6 march 2012 amd posted knowledge base article stating compatibility problem fx processors certain games widely used digital game distribution platform steam amd stated provided bios update several motherboard manufacturers namely asus gigabyte technology msi asrock would fix problem september 2014 amd ceo rory read conceded bulldozer design game-changing part amd live design four years july 29 2015 microsoft released direct x 12 api dx12 windows 10 operating system api allows programmers achieve greater parallelism notably graphics intensive game titles dx12 titles make better use higher core counts high thread count processor bulldozer family fx-6300 fx-8100 series chips extending usability systems windows 10 31 august 2011 amd group well-known overclockers including brian mclachlan sami mäkinen aaron schradin simon solotko managed set new world record cpu frequency using unreleased overclocked fx-8150 bulldozer processor day record sat 8.309 ghz bulldozer combined liquid helium cooling reached new high 8.429 ghz record since overtaken 8.58 ghz andre yang using liquid nitrogen august 22 2014 using fx-8370 piledriver stilt team finland achieved maximum cpu frequency 8.722 ghz piledriver amd codename improved second-generation microarchitecture based bulldozer amd piledriver cores found socket fm2 trinity richland based series apus cpus socket am3+ vishera based fx-series cpus piledriver last generation bulldozer family available socket am3+ available l3 cache piledriver processors available fm2 mobile variant sockets come l3 cache l2 cache last-level cache fm2/fm2+ processors steamroller amd codename third-generation microarchitecture based improved version piledriver steamroller cores found socket fm2+ kaveri based series apus cpus excavator codename fourth-generation bulldozer core excavator implemented 'carrizo a-series apus athlon x4 cpus
[ 2539, 5371, 5737, 1465, 5042, 1481, 5055, 1881, 2961, 2248, 3667, 5431, 2969, 780, 441, 4742, 6502, 5447, 5799, 5804, 107, 6523, 3362, 1546, 4049, 3015, 5487, 1961, 3041, 6563, 1586, 515, 866, 4839, 5890, 553, 6616, 7726, 4154, 584, 593...
Validation
5,560
8
Sawmill_(software):sawmill software sawmill software package statistical analysis reporting log files dynamic contextual filtering 'live data zooming user interface customization custom calculated reports sawmill also incorporates real-time reporting real-time alerting available since 1997 time sawmill provides support approximately 850 server log file formats new formats added request sawmill also includes page tagging server javascript page tag analysis client side clicks client requests providing total view visitor traffic on-site behavioural activity sawmill analytics offered three forms software package user deployment turnkey on-premises system appliance saas sawmill analyzes device software package producing log file includes web servers firewalls proxy servers mail servers network devices switches routers etc syslog servers databases etc sawmill oem reporting engine sold blue coat systems bundled part proxy server product branded version also sold cisco systems sawmill ironport branded version also sold vicomsoft ltd intergate intelligence branded version also sold sonicwall sonicwall aventail advanced reporting sawmill second runner-up 2009 streaming media european readers choice awards sawmill listed ideal observer web analytics tool overview
[ 2488, 2858, 4382, 3915, 6233, 5571, 4600, 4783, 330, 2054, 3338, 6153, 1435 ]
Test
5,561
1
Database_forensics:database forensics database forensics branch digital forensic science relating forensic study databases related metadata discipline similar computer forensics following normal forensic process applying investigative techniques database contents metadata cached information may also exist servers ram requiring live analysis techniques forensic examination database may relate timestamps apply update time row relational table inspected tested validity order verify actions database user alternatively forensic examination may focus identifying transactions within database system application indicate evidence wrongdoing fraud software tools used manipulate analyse data tools also provide audit logging capabilities provide documented proof tasks analysis forensic examiner performed database currently many database software tools general reliable precise enough used forensic work demonstrated first paper published database forensics currently single book published field though destined additionally subsequent sql server forensics book kevvie fowler named sql server forensics well regarded also forensic study relational databases requires knowledge standard used encode data computer disk documentation standards used encode information well-known brands db sql server oracle contributed public domain others include apex analytix forensic analysis database executed isolation technological framework within subject database exists crucial understanding resolving questions data authenticity integrity especially relates database users
[ 1905, 1715, 5274, 6604, 7330, 3517, 3179, 7341, 6345, 2195, 4316, 906, 3700, 5217, 6098, 7825, 4054, 7181, 6636, 2663, 6020, 2124, 6737, 1756, 3119, 3801, 6739, 7999, 5943, 5150, 4523, 7105, 2054, 6932, 6386, 684, 6390, 3823, 7937, 5254, ...
Test
5,562
6
Block_availability_map:block availability map computer file systems block availability map bam data structure used track disk blocks considered free available new data used along directory manage files disk originally floppy disk later also hard disk terms commodore dos cbm dos compatible disk drives bam data structure stored reserved area disk size location varied based physical characteristics disk track bam consisted bitmap available blocks usually count available blocks count held single byte formats 256 fewer blocks per track count byte simply sum 1-bits bitmap bytes current track following table illustrates layout commodore 1541 bam table would larger higher-capacity disks described bitmap contained 3 bytes commodore 1541 format single-sided disks 17 20 sectors per track note 3 bytes hold least 20 bits similarly commodore 1571 used 3 bytes bitmap track bam twice size twice many tracks formatted double-sided contrast commodore 1581 disk drive used 5 bytes bitmap disk format 40 blocks per track note 5 bytes hold 40 bits bitmap format 1 bit indicated block available free 0 bit indicated block available used bitmap data stored low-byte first first byte held map blocks 0 7 second byte held map blocks 8 15 within byte bitmap ordered low-bit first example first byte would represent block 0 least significant bit block 7 significant bit storage devices creative micro designs intended use cbm computers also used block availability map served purpose however devices fd-2000 fd-4000 cmd-hd include count byte bits byte reversed high-bit first although bits reversed compared cbm formats bytes still stored order low-byte first
[ 2350, 2076, 2306, 4792, 3359 ]
Test
5,563
2
Bundling_of_Microsoft_Windows:bundling microsoft windows bundling microsoft windows installation microsoft windows computers purchase microsoft encourages original equipment manufacturers oems personal computers include windows licenses products agreements microsoft oems undergone antitrust scrutiny users opposed bundling microsoft windows sought refunds windows licenses arguing windows end-user license agreement entitles return unused windows licenses cash refund although customers successfully obtained payments cases litigation lengthy negotiations others less successful microsoft encourages original equipment manufacturers oems supply computers windows pre-installed saying consumers benefit install operating system analyst vishal tripathi said many consumers purchase pcs pre-installed operating systems want deal learning curve inconvenience installing operating system virtually large computer vendors bundle microsoft windows majority personal computers ranges 1999 maximum pc wrote non-windows users long griped machines large companies ca n't purchased without windows 1999 analyst rob enderle attributed lack computers without windows available individual purchase economic impracticality citing certification warranty requirements 1999 dell stated offered non-microsoft operating systems servers part customized large orders linux became popular enough make linux pre-installation cost-effective 'd foolish offer guardian computer editor jack schofield said significant overhead costs associated pre-installation linux part due linux small market share serdar yegulalp computerworld said late 1990s linux fully developed linux computers tough sell non-technical users microsoft historically engaged licensing practices discouraged installation non-microsoft operating systems microsoft assessed license fees based number computers oem sold regardless whether windows license included beginning 1983 microsoft sold ms-dos licenses oems individually-negotiated basis contracts required oems purchase number ms-dos licenses equal greater number computers sold result zero marginal cost oems include ms-dos installing operating system ms-dos would effectively require double payment operating system royalties also microsoft penalized oems installed alternative operating systems making license terms less favorable microsoft entered consent decree 1994 barred microsoft conditioning availability windows licenses varying prices based whether oems distributed operating systems microsoft general counsel brad smith said decree effective allowing dell hp offer linux computers jeremy reimer ars technica stated decree made fiscally realistic sell computers alternative operating systems 1999 microsoft representative stated contracts oems stop oem shipping operating system pcs 2010 microsoft stated agreements oems distribute windows nonexclusive oems free distribute computers different operating system without operating system 2001 article byte reported license agreements oems microsoft forbade oems including windows alongside another operating system computer according 1999 new york times article critics assert company continues use market clout ensure nearly new personal computers come windows pre-installed 2009 microsoft stated always charged oems 50 windows license 1,000 computer 2007 dell stated computers ubuntu installed would priced 50 lower comparable systems windows installed 2010 zdnet article chris clay wrote dell computers ubuntu preinstalled priced higher identical systems windows preinstalled even though ubuntu free open source claimed increase price computer resulting inclusion windows license called windows tax microsoft tax opposing computer users computer purchasers request refunds windows licenses included purchased computers want use windows preferring operating system linux instead jeff walsh infoworld said businesses site licenses save money requesting refunds windows licenses included purchased computers users avoid windows tax altogether assembling computer individually purchased parts purchasing computer oem bundle windows smaller oems larger retail chains system76 taken specializing linux-based systems advantage major suppliers paucity non-windows offerings beginning 2007 dell offered computers ubuntu pre-installed 2014 hewlett-packard stated sells units bundled built-in os without linux distributors also run 'partnership programs endorse suppliers machines system pre-installed vendors purchase computers major oems install linux resell chris clay zdnet wrote employee discount programs create financial incentive purchase computers large manufacturer even manufacturer offer computers without windows microsoft requires oems support uefi secure boot products qualify windows 8 logo program concerns raised oems might ship systems allow users disable secure boot install signing keys alternative operating systems computers would unable boot non-windows operating system unless operating system signed keys included computer complicating issue windows refunds microsoft claims oems would free decide keys include manage competing os vendors relative lack influence desktop os market compared microsoft might mean even signed versions operating systems available might face difficulties getting hardware vendors include keys especially end users wo n't able manage keys boot locking required arm devices microsoft provide refunds windows licenses sold oem including licenses come purchase computer pre-installed computer microsoft denmark representative stated microsoft windows license terms allow oems offer refund windows license microsoft end user license agreement windows 10 states 1999 relevant text read 1999 according infoworld users taking eula literally plan demand cash refund 1999 microsoft representative described requesting windows refund basis rejecting license technicality someone twisting language little bit come idea run back oem laurie j. flynn new york times characterized license refund argument using loophole license agreement oem policies refunding unused windows licenses vary oems programs specifically allow user receive refund unused windows license acer us windows refund program user ship computer unused copy windows acer service center computer returned without windows refund acer policy requires customer return items expense balance received customer low €30 applies eu reported refund 2014 €40 windows 8 vendors like dell ad hoc procedures users request refund windows license one user received £55.23 refund dell said process pretty gob-smacked easy cases vendors asked customers requesting refunds sign non-disclosure agreements 1999 toshiba representative stated case user obtained 110 refund typical policy people run try vendors issue refunds windows licenses february 1999 infoworld reported pc manufacturers currently offering refunds users use windows according 1999 maximum pc article dell provide refunds windows licenses interpreting license agreement treat hardware software single package must returned 2009 sony refused offer partial refund customer declined windows vista eula instead offering refund entire computer consumer declined litigation users denied partial refund unused windows license resulted rulings france italy bundling microsoft windows refusing offer partial refunds windows license violates applicable law september 2014 supreme court italy ruling 19161/2014 decided laptop buyer entitled receive refund €140 price microsoft windows license microsoft works license computer saying bundling commercial policy forced distribution slammed practice monopolistic tendency india bundling challenged users violation competition act 2002 one sent legal notice hp however another license refund case french appellate court ruled favor oem holding sale issue constitute unfair commercial practice coercive selling permitted circumstances unfair commercial tying practice misleading aggressive commercial practice case pending court cassation september 2016 court justice european union ruled sale computer equipped pre-installed software constitute unfair commercial practice within meaning directive 2005/29 offer contrary requirements professional diligence distort economic behaviour consumers court also ruled directive 2005/29 require oems include separate price operating system license websites created specific purpose spreading information issue educating others options getting refund 1999 rally opposing bundling windows attracted 100 protesters gained media attention worldwide overall goal events get oems expand selection computers without copy windows pre-installed additional goal getting revise improve refund policies first goal met analyst stated refund actions individual users publicity stunt impact
[ 183, 3076, 8054, 4293, 3764, 4759, 1536, 2550, 7619, 7715, 2283, 5644, 8076, 5475, 5213, 644, 3958, 2739, 8085, 4500, 7734, 6110, 578, 5141, 3028, 134, 2492, 6294, 4524, 7660, 3395, 6839, 7848, 8118, 3135, 522, 2066, 6580, 432, 6054, 66...
Validation
5,564
5
WAN_optimization:wan optimization wan optimization collection techniques increasing data transfer efficiencies across wide-area networks wans 2008 wan optimization market estimated 1 billion grow 4.4 billion 2014 according gartner technology research firm 2015 gartner estimated wan optimization market 1.1 billion market common measures tcp data-transfer efficiencies i.e. optimization throughput bandwidth requirements latency protocol optimization congestion manifested dropped packets addition wan classified regards distance endpoints amounts data transferred two common business wan topologies branch headquarters data center data center dc2dc general branch wan links closer use less bandwidth support simultaneous connections support smaller connections short-lived connections handle greater variety protocols used business applications email content management systems database application web delivery comparison dc2dc wan links tend require bandwidth distant involve fewer connections connections bigger 100 mbit/s 1 gbit/s flows longer duration traffic dc2dc wan may include replication back data migration virtualization business continuity/disaster recovery bc/dr flows wan optimization subject extensive academic research almost since advent wan early 2000s research private public sectors turned improving end-to-end throughput tcp target first proprietary wan optimization solutions branch wan recent years however rapid growth digital data concomitant needs store protect presented need dc2dc wan optimization example optimizations performed increase overall network capacity utilization meet inter-datacenter transfer deadlines minimize average completion times data transfers another example private inter-datacenter wans benefit optimizations fast efficient geo-replication data content newly computed machine learning models multimedia content component techniques branch wan optimization include deduplication wide area file services wafs smb proxy https proxy media multicasting web caching bandwidth management requirements dc2dc wan optimization also center around deduplication tcp acceleration however must occur context multi-gigabit data transfer rates
[ 2111, 458, 5599, 6130, 6042 ]
Test
5,565
1
GEPIR:gepir gepir publicly available cost limits number requests per/day ip 30 gs1 offers similar paid service gs1 data hub provides additional capabilities without traffic limitations imposed gepir search 111 gs1 member organizations gepir since 2013 first digits gtin code called gs1 prefix used route query corresponding gs1 member organization results returned html xml countries soap webservice provides return code indicating error occurred gepir accessible free almost countries number request per day limited 20 30 since october 2013 gs1 france restricts access gepir companies registration siren number required use premium access created gs1 france january 2010 allows companies use gs1 web soap interface without limit price access public gepir lookup service coordinated gs1 go provides end users ability look information gs1 identification keys depending service systems provided gs1 member organisations mos 3rd party service providers gs1 mo choose provide service directly end users gs1 global office may provide service geography services involve technical component deployed gs1 global office coordinates systems provided gs1 mos and/or 3rd party service providers gepir service provided systems deployed gs1 mos gs1 go providing central point coordination federate local systems gs1 go also provides mo-level service mos wish deploy system nature synchronization gepir requires users know quality issues exceptions conformance program introduced gs1 2013
[ 2054, 7315 ]
Validation
5,566
6
Everything_is_a_file:everything file everything file describes one defining features unix derivatives—that wide range input/output resources documents directories hard-drives modems keyboards printers even inter-process network communications simple streams bytes exposed filesystem name space advantage approach set tools utilities apis used wide range resources number file types file opened file descriptor created file path becoming addressing system file descriptor byte stream i/o interface file descriptors also created things like anonymous pipes network sockets via different methods therefore accurate description feature everything file descriptor additionally range pseudo virtual filesystems exists exposes information processes system information hierarchical file-like structure mounted single file hierarchy example purely virtual filesystem /proc exposes many system properties files files broader sense word standard unix file attributes owner access permissions queried classic unix tools filters however universally considered fast portable approach operating systems even mount /proc default due security speed concerns though used heavily widely installed busybox embedded systems procps used linux systems cases used implementations process-related posix shell commands similarly used android systems operating system toolbox program unix successor plan 9 took concept distributed computing 9p protocol
[ 6620, 362, 3236, 1745, 8092, 2528, 3751, 5931, 578, 8175, 4771 ]
Test
5,567
3
Way_of_the_Tiger:way tiger way tiger series adventure gamebooks mark smith jamie thomson set fantasy world orb reader takes part young monk/ninja avenger initially quest avenge foster father recover stolen scrolls later books presented challenges avenger overcome notably taking ruling city world orb originally created mark smith dungeons dragons game ran pupil brighton college mid-1970s orb also used setting fighting fantasy gamebook talisman death smith thomson book disclaimer front performing ninja related feats book could lead serious injury death untrained user sixth book inferno ends cliffhanger avenger trapped web black widow orb darkest blight new books released fate avenger orb unknown mark smith confirmed cliffhanger ending deliberate august 2013 original creators series working megara entertainment develop re-edited hardcover collector editions gamebooks including new prequel book 0 sequel book 7 potentially role-playing game based series two new books plus six re-edited original books reprinted paperback format megara entertainment 2014 made available pdfs 2019 december 2013 announced tin man games would releasing original six books series digital platforms 2014 2015 however 2017 nothing released original series comprises six books books could played sequence standalone adventures although playing sequence preserves continuity storyline played sequence abilities bonuses penalties special items avenger acquired carried next book expanded eight-book series consists following titles first last printed many years original six series featured combat system based unarmed fighting moves colourful names cobra strike punch leaping tiger kick avenger could also choose list ninja skills acrobatics poison needle spitting used variety appropriate weaponry garotte shuriken luck also played part form fate tests see fate smiled turned back avenger could also enhance skill using inner force similar qi energy series avenger could learn new skills shinren means understanding people intentions observing subtle clues books large number opponents recurring characters aside certain ancient titans called elder gods orb ruled various deities two video games based books released first way tiger beat 'em released gremlin graphics amstrad cpc zx spectrum commodore 16 commodore 64 game avenger fighting staves swords well utilizing unarmed combat avenger rarely used weapons apart shuriken books way tiger ii avenger action-adventure made gremlin graphics 1986 computers commodore 64 amstrad cpc zx spectrum msx game story yaemon grand master flame killed player foster-father naijish stolen scrolls kettsuin recover scrolls player find enough keys penetrate quench heart keep kill three guards game viewed top-down perspective superficially resembles gauntlet
[]
Test
5,568
4
Information_assurance:information assurance information assurance ia practice assuring information managing risks related use processing storage transmission information data systems processes used purposes information assurance includes protection integrity availability authenticity non-repudiation confidentiality user data uses physical technical administrative controls accomplish tasks focused predominantly information digital form full range ia encompasses digital also analog physical form protections apply data transit physical electronic forms well data rest various types physical electronic storage facilities ia best thought superset information security i.e umbrella term business outcome information risk management information assurance ia process getting right information right people right time ia benefits business use information risk management trust management resilience appropriate architecture system safety security increases utility information authorized users reduces utility information unauthorized strongly related field information security also business continuity ia relates business level strategic risk management information related systems rather creation application security controls therefore addition defending malicious hackers code e.g. viruses ia practitioners consider corporate governance issues privacy regulatory standards compliance auditing business continuity disaster recovery relate information systems information security draws primarily computer science ia interdisciplinary field requiring expertise business accounting user experience fraud examination forensic science management science systems engineering security engineering criminology addition computer science information assurance also term used governments including government united kingdom provision holistic security information systems use term interdisciplinary approach set somewhat lessened security/ systems engineering business continuity/ enterprise resilience forensic investigation threat analysis considered management science accounting criminology considered developing mitigation risks developed risk assessments conducted hmg information assurance standard 1 2 replaced hmg information security standard 2 sets principles requirements risk management accordance principles one information assurance standards currently used within uk public sector information assurance process typically begins enumeration classification information assets protected next ia practitioner perform risk assessment assets vulnerabilities information assets determined order enumerate threats capable exploiting assets assessment considers probability impact threat exploiting vulnerability asset impact usually measured terms cost asset stakeholders sum products threats impact probability occurring total risk information asset risk assessment complete ia practitioner develops risk management plan plan proposes countermeasures involve mitigating eliminating accepting transferring risks considers prevention detection response threats framework published standards organization nist rmf risk cobit pci dss iso/iec 27002 may guide development countermeasures may include technical tools firewalls anti-virus software policies procedures requiring controls regular backups configuration hardening employee training security awareness organizing personnel dedicated computer emergency response team cert computer security incident response team csirt cost benefit countermeasure carefully considered thus ia practitioner seek eliminate risks possible manage cost-effective way risk management plan implemented tested evaluated often means formal audits ia process iterative one risk assessment risk management plan meant periodically revised improved based data gathered completeness effectiveness number international national bodies issue standards information assurance practices policies procedures uk include information assurance advisory council information assurance collaboration group information assurance also evolved due social media
[ 3932, 3433, 1531, 3939, 4036, 1353, 7139, 4945, 7815, 6100, 1844, 6189, 6998, 7181, 4608, 7558, 8109, 4617, 7106, 6035, 8010, 4440, 943, 8121, 3486, 7576, 2513, 6391, 1228, 429, 4554, 3241, 4648 ]
Test
5,569
2
SchoolTool:schooltool schooltool gpl licensed free student information system schools around world goals project create simple turnkey student information system including demographics gradebook attendance calendaring reporting primary secondary schools well framework building customized applications configurations individual schools states schooltool built free software/open source software stack licensed gnu general public license version 2 written python using zope 3 framework sub-projects school tool follows schooltool configured default act often called student information system sis focus tracking information related students demographics enrollment grades attendance reporting subset complete “ management information system ” mis schools might also cover systems like accounting schooltool learning management system lms moodle although share overlapping feature sets gradebook schooltool contain curriculum learning objects post product news page october 2016 titled future sielibre schooltool indicates primary schooltool developers moved things accompanied google document explaining decision thanking contributors efforts
[ 2810, 5571, 2026, 7459, 753, 6211, 7473, 417, 7669, 7581, 6489, 8137, 5965, 5704, 6061, 84 ]
Test
5,570
8
Search_engine_scraping:search engine scraping search engine scraping process harvesting urls descriptions information search engines google bing yahoo specific form screen scraping web scraping dedicated search engines commonly larger search engine optimization seo providers depend regularly scraping keywords search engines especially google monitor competitive position customers websites relevant keywords indexing status search engines like google allow sort automated access service legal point view known case broken law process entering website extracting data automated fashion also often called crawling search engines like google bing yahoo getting almost data automated crawling bots google far largest search engine users numbers well revenue creative advertisements makes google important search engine scrape seo related companies google take legal action scraping likely self-protective reasons however google using range defensive methods makes scraping results challenging task search engine defense thinks access might automated search engine react differently first layer defense captcha page user prompted verify real person bot tool solving captcha create cookie permits access search engine one day captcha page removed second layer defense similar error page without captcha case user completely blocked using search engine temporary block lifted user changes ip third layer defense longterm block entire network segment google blocked large network blocks months sort block likely triggered administrator happens scraping tool sending high number requests forms detection may also happen normal user especially users sharing ip address network class ipv4 ranges well ipv6 ranges scrape search engine successfully two major factors time amount keywords user needs scrape smaller time job difficult scraping developed scraping script tool needs scraping scripts need overcome technical challenges example open source scraping software makes use mentioned techniques googlescraper framework controls browsers devtools protocol makes hard google detect browser automated developing scraper search engine almost programming language used depending performance requirements languages favorable php commonly used language write scraping scripts websites backend services powerful capabilities built dom parsers libcurl memory usage typical 10 times factor similar c/c++ code ruby rails well python also frequently used automated scraping jobs highest performance c++ dom parsers considered even bash scripting used together curl command line tool scrape search engine developing search engine scraper several existing tools libraries available either used extended analyzed learn scraping websites services legal part often big concern companies web scraping greatly depends country scraping user/company well data website scraped many different court rulings world however comes scraping search engines situation different search engines usually list intellectual property repeat summarize information scraped websites largest public known incident search engine scraped happened 2011 microsoft caught scraping unknown keywords google rather new bing service even incident result court case one possible reason might search engines like google getting almost data scraping millions public reachable websites also without reading accepting terms legal case google microsoft would possibly put whole business risk
[ 2086, 6029, 5987, 80, 6997, 6024 ]
Test
5,571
2
Operating_system:operating system operating system os system software manages computer hardware software resources provides common services computer programs time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources hardware functions input output memory allocation operating system acts intermediary programs computer hardware although application code usually executed directly hardware frequently makes system calls os function interrupted operating systems found many devices contain computer cellular phones video game consoles web servers supercomputers dominant desktop operating system microsoft windows market share around 82.74 macos apple inc. second place 13.23 varieties linux collectively third place 1.57 mobile smartphone tablet combined sector use 2017 70 google android according third quarter 2016 data android smartphones dominant 87.5 percent growth rate 10.3 percent per year followed apple ios 12.1 percent per year decrease market share 5.2 percent operating systems amount 0.3 percent linux distributions dominant server supercomputing sectors specialized classes operating systems embedded real-time systems exist many applications single-tasking system run one program time multi-tasking operating system allows one program running concurrency achieved time-sharing available processor time divided multiple processes processes interrupted repeatedly time slices task-scheduling subsystem operating system multi-tasking may characterized preemptive co-operative types preemptive multitasking operating system slices cpu time dedicates slot programs unix-like operating systems solaris linux—as well non-unix-like amigaos—support preemptive multitasking cooperative multitasking achieved relying process provide time processes defined manner 16-bit versions microsoft windows used cooperative multi-tasking 32-bit versions windows nt win9x used preemptive multi-tasking single-user operating systems facilities distinguish users may allow multiple programs run tandem multi-user operating system extends basic concept multi-tasking facilities identify processes resources disk space belonging multiple users system permits multiple users interact system time time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources multiple users distributed operating system manages group distinct computers makes appear single computer development networked computers could linked communicate gave rise distributed computing distributed computations carried one machine computers group work cooperation form distributed system os distributed cloud computing context templating refers creating single virtual machine image guest operating system saving tool multiple running virtual machines technique used virtualization cloud computing management common large server warehouses embedded operating systems designed used embedded computer systems designed operate small machines like pdas less autonomy able operate limited number resources compact extremely efficient design windows ce minix 3 examples embedded operating systems real-time operating system operating system guarantees process events data specific moment time real-time operating system may single- multi-tasking multitasking uses specialized scheduling algorithms deterministic nature behavior achieved event-driven system switches tasks based priorities external events time-sharing operating systems switch tasks based clock interrupts library operating system one services typical operating system provides networking provided form libraries composed application configuration code construct unikernel specialized single address space machine image deployed cloud embedded environments early computers built perform series single tasks like calculator basic operating system features developed 1950s resident monitor functions could automatically run different programs succession speed processing operating systems exist modern complex forms early 1960s hardware features added enabled use runtime libraries interrupts parallel processing personal computers became popular 1980s operating systems made similar concept used larger computers 1940s earliest electronic digital systems operating systems electronic systems time programmed rows mechanical switches jumper wires plug boards special-purpose systems example generated ballistics tables military controlled printing payroll checks data punched paper cards programmable general purpose computers invented machine languages consisting strings binary digits 0 1 punched paper tape introduced sped programming process stern 1981 early 1950s computer could execute one program time user sole use computer limited period time would arrive scheduled time program data punched paper cards punched tape program would loaded machine machine would set work program completed crashed programs could generally debugged via front panel using toggle switches panel lights said alan turing master early manchester mark 1 machine already deriving primitive conception operating system principles universal turing machine later machines came libraries programs would linked user program assist operations input output generating computer code human-readable symbolic code genesis modern-day operating system however machines still ran single job time cambridge university england job queue one time washing line clothes line tapes hung different colored clothes-pegs indicate job-priority improvement atlas supervisor introduced manchester atlas commissioned 1962 considered many first recognisable modern operating system brinch hansen described significant breakthrough history operating systems 1950s many major features pioneered field operating systems mainframe computers including batch processing input/output interrupt buffering multitasking spooling runtime libraries link-loading programs sorting records files features included included application software option application programmers rather separate operating system used applications 1959 share operating system released integrated utility ibm 704 later 709 7090 mainframes although quickly supplanted ibsys/ibjob 709 7090 7094 1960s ibm os/360 introduced concept single os spanning entire product line crucial success system/360 machines ibm current mainframe operating systems distant descendants original system applications written os/360 still run modern machines os/360 also pioneered concept operating system keeps track system resources used including program data space allocation main memory file space secondary storage file locking update process terminated reason resources re-claimed operating system alternative cp-67 system s/360-67 started whole line ibm operating systems focused concept virtual machines operating systems used ibm s/360 series mainframes included systems developed ibm cos/360 compatibility operating system dos/360 disk operating system tss/360 time sharing system tos/360 tape operating system bos/360 basic operating system acp airline control program well non-ibm systems mts michigan terminal system music multi-user system interactive computing orvyl stanford timesharing system control data corporation developed scope operating system 1960s batch processing cooperation university minnesota kronos later nos operating systems developed 1970s supported simultaneous batch timesharing use like many commercial timesharing systems interface extension dartmouth basic operating systems one pioneering efforts timesharing programming languages late 1970s control data university illinois developed plato operating system used plasma panel displays long-distance time sharing networks plato remarkably innovative time featuring real-time chat multi-user graphical games 1961 burroughs corporation introduced b5000 mcp master control program operating system b5000 stack machine designed exclusively support high-level languages machine language assembler indeed mcp first os written exclusively high-level language espol dialect algol mcp also introduced many ground-breaking innovations first commercial implementation virtual memory development as/400 ibm made approach burroughs license mcp run as/400 hardware proposal declined burroughs management protect existing hardware production mcp still use today unisys clearpath/mcp line computers univac first commercial computer manufacturer produced series exec operating systems like early main-frame systems batch-oriented system managed magnetic drums disks card readers line printers 1970s univac produced real-time basic rtb system support large-scale time sharing also patterned dartmouth bc system general electric mit developed general electric comprehensive operating supervisor gecos introduced concept ringed security privilege levels acquisition honeywell renamed general comprehensive operating system gcos digital equipment corporation developed many operating systems various computer lines including tops-10 tops-20 time sharing systems 36-bit pdp-10 class systems widespread use unix tops-10 particularly popular system universities early arpanet community rt-11 single-user real-time os pdp-11 class minicomputer rsx-11 corresponding multi-user os late 1960s late 1970s several hardware capabilities evolved allowed similar ported software run one system early systems utilized microprogramming implement features systems order permit different underlying computer architectures appear others series fact 360s 360/40 except 360/165 360/168 microprogrammed implementations enormous investment software systems made since 1960s caused original computer manufacturers continue develop compatible operating systems along hardware notable supported mainframe operating systems include first microcomputers capacity need elaborate operating systems developed mainframes minis minimalistic operating systems developed often loaded rom known monitors one notable early disk operating system cp/m supported many early microcomputers closely imitated microsoft ms-dos became widely popular operating system chosen ibm pc ibm version called ibm dos pc dos 1980s apple computer inc. apple inc. abandoned popular apple ii series microcomputers introduce apple macintosh computer innovative graphical user interface gui mac os introduction intel 80386 cpu chip october 1985 32-bit architecture paging capabilities provided personal computers ability run multitasking operating systems like earlier minicomputers mainframes microsoft responded progress hiring dave cutler developed vms operating system digital equipment corporation would lead development windows nt operating system continues serve basis microsoft operating systems line steve jobs co-founder apple inc. started next computer inc. developed nextstep operating system nextstep would later acquired apple inc. used along code freebsd core mac os x macos latest name change gnu project started activist programmer richard stallman goal creating complete free software replacement proprietary unix operating system project highly successful duplicating functionality various parts unix development gnu hurd kernel proved unproductive 1991 finnish computer science student linus torvalds cooperation volunteers collaborating internet released first version linux kernel soon merged gnu user space components system software form complete operating system since combination two major components usually referred simply linux software industry naming convention stallman free software foundation remain opposed preferring name gnu/linux berkeley software distribution known bsd unix derivative distributed university california berkeley starting 1970s freely distributed ported many minicomputers eventually also gained following use pcs mainly freebsd netbsd openbsd unix originally written assembly language ken thompson wrote b mainly based bcpl based experience multics project b replaced c unix rewritten c developed large complex family inter-related operating systems influential every modern operating system see history unix-like family diverse group operating systems several major sub-categories including system v bsd linux name unix trademark open group licenses use operating system shown conform definitions unix-like commonly used refer large set operating systems resemble original unix unix-like systems run wide variety computer architectures used heavily servers business well workstations academic engineering environments free unix variants linux bsd popular areas four operating systems certified open group holder unix trademark unix hp hp-ux ibm aix descendants original system v unix designed run respective vendor hardware contrast sun microsystems solaris run multiple types hardware including x86 sparc servers pcs apple macos replacement apple earlier non-unix mac os hybrid kernel-based bsd variant derived nextstep mach freebsd unix interoperability sought establishing posix standard posix standard applied operating system although originally created various unix variants subgroup unix family berkeley software distribution family includes freebsd netbsd openbsd operating systems commonly found webservers although also function personal computer os internet owes much existence bsd many protocols commonly used computers connect send receive data network widely implemented refined bsd world wide web also first demonstrated number computers running os based bsd called nextstep 1974 university california berkeley installed first unix system time students staff computer science department began adding new programs make things easier text editors berkeley received new vax computers 1978 unix installed school undergraduates modified unix even order take advantage computer hardware possibilities defense advanced research projects agency us department defense took interest decided fund project many schools corporations government organizations took notice started use berkeley version unix instead official one distributed steve jobs upon leaving apple inc. 1985 formed next inc. company manufactured high-end computers running variation bsd called nextstep one computers used tim berners-lee first webserver create world wide web developers like keith bostic encouraged project replace non-free code originated bell labs done however sued two years legal disputes bsd project spawned number free derivatives netbsd freebsd 1993 openbsd netbsd 1995 macos formerly mac os x later os x line open core graphical operating systems developed marketed sold apple inc. latest pre-loaded currently shipping macintosh computers macos successor original classic mac os apple primary operating system since 1984 unlike predecessor macos unix operating system built technology developed next second half 1980s apple purchased company early 1997 operating system first released 1999 mac os x server 1.0 followed march 2001 client version mac os x v10.0 cheetah since six distinct client server editions macos released two merged os x 10.7 lion prior merging macos server edition macos server architecturally identical desktop counterpart usually ran apple line macintosh server hardware macos server included work group management administration software tools provide simplified access key network services including mail transfer agent samba server ldap server domain name server others mac os x v10.7 lion server aspects mac os x server integrated client version product re-branded os x dropping mac name server tools offered application linux kernel originated 1991 project linus torvalds university student finland posted information project newsgroup computer students programmers received support assistance volunteers succeeded creating complete functional kernel linux unix-like developed without unix code unlike bsd variants open license model linux kernel code available study modification resulted use wide range computing machinery supercomputers smart-watches although estimates suggest linux used 1.82 desktop laptop pcs widely adopted use servers embedded systems cell phones linux superseded unix many platforms used supercomputers including top 385 many computers also green500 different order linux runs top 10 linux also commonly used small energy-efficient computers smartphones smartwatches linux kernel used popular distributions red hat debian ubuntu linux mint google android chrome os chromium os microsoft windows family proprietary operating systems designed microsoft corporation primarily targeted intel architecture based computers estimated 88.9 percent total usage share web connected computers latest version windows 10 2011 windows 7 overtook windows xp common version use microsoft windows first released 1985 operating environment running top ms-dos standard operating system shipped intel architecture personal computers time 1995 windows 95 released used ms-dos bootstrap backwards compatibility win9x could run real-mode ms-dos 16-bit windows 3.x drivers windows released 2000 last version win9x family later versions based windows nt kernel current client versions windows run ia-32 x86-64 32-bit arm microprocessors addition itanium still supported older server version windows server 2008 r2 past windows nt supported additional architectures server editions windows widely used recent years microsoft expended significant capital effort promote use windows server operating system however windows usage servers widespread personal computers windows competes linux bsd server market share reactos windows-alternative operating system developed principles windows without using microsoft code many operating systems significant day longer amigaos os/2 ibm microsoft classic mac os non-unix precursor apple macos beos xts-300 risc os morphos haiku baremetal freemint still used niche markets continue developed minority platforms enthusiast communities specialist applications openvms formerly dec still active development hewlett-packard yet operating systems used almost exclusively academia operating systems education research operating system concepts typical example system fulfills roles minix example singularity used purely research another example oberon system designed eth zürich niklaus wirth jürg gutknecht group students former computer systems institute 1980s used mainly research teaching daily work wirth group operating systems failed win significant market share introduced innovations influenced mainstream operating systems least bell labs plan 9 components operating system exist order make different parts computer work together user software needs go operating system order use hardware whether simple mouse keyboard complex internet component aid firmware device drivers kernel provides basic level control computer hardware devices manages memory access programs ram determines programs get access hardware resources sets resets cpu operating states optimal operation times organizes data long-term non-volatile storage file systems media disks tapes flash memory etc operating system provides interface application program computer hardware application program interact hardware obeying rules procedures programmed operating system operating system also set services simplify development execution application programs executing application program involves creation process operating system kernel assigns memory space resources establishes priority process multi-tasking systems loads program binary code memory initiates execution application program interacts user hardware devices interrupts central operating systems provide efficient way operating system interact react environment alternative operating system watch various sources input events polling require action found older systems small stacks 50 60 bytes unusual modern systems large stacks interrupt-based programming directly supported modern cpus interrupts provide computer way automatically saving local register contexts running specific code response events even basic computers support hardware interrupts allow programmer specify code may run event takes place interrupt received computer hardware automatically suspends whatever program currently running saves status runs computer code previously associated interrupt analogous placing bookmark book response phone call modern operating systems interrupts handled operating system kernel interrupts may come either computer hardware running program hardware device triggers interrupt operating system kernel decides deal event generally running processing code amount code run depends priority interrupt example person usually responds smoke detector alarm answering phone processing hardware interrupts task usually delegated software called device driver may part operating system kernel part another program device drivers may relay information running program various means program may also trigger interrupt operating system program wishes access hardware example may interrupt operating system kernel causes control passed back kernel kernel processes request program wishes additional resources wishes shed resources memory triggers interrupt get kernel attention modern microprocessors cpu mpu support multiple modes operation cpus capability offer least two modes user mode supervisor mode general terms supervisor mode operation allows unrestricted access machine resources including mpu instructions user mode operation sets limits instruction use typically disallows direct access machine resources cpus might modes similar user mode well virtual modes order emulate older processor types 16-bit processors 32-bit one 32-bit processors 64-bit one power-on reset system begins supervisor mode operating system kernel loaded started boundary user mode supervisor mode also known kernel mode established supervisor mode used kernel low level tasks need unrestricted access hardware controlling memory accessed communicating devices disk drives video display devices user mode contrast used almost everything else application programs word processors database managers operate within user mode access machine resources turning control kernel process causes switch supervisor mode typically transfer control kernel achieved executing software interrupt instruction motorola 68000 codice_1 instruction software interrupt causes microprocessor switch user mode supervisor mode begin executing code allows kernel take control user mode programs usually access restricted set microprocessor instructions generally execute instructions could potentially cause disruption system operation supervisor mode instruction execution restrictions typically removed allowing kernel unrestricted access machine resources term user mode resource generally refers one cpu registers contain information running program n't allowed alter attempts alter resources generally causes switch supervisor mode operating system deal illegal operation program attempting example forcibly terminating killing program among things multiprogramming operating system kernel must responsible managing system memory currently use programs ensures program interfere memory already use another program since programs time share program must independent access memory cooperative memory management used many early operating systems assumes programs make voluntary use kernel memory manager exceed allocated memory system memory management almost never seen since programs often contain bugs cause exceed allocated memory program fails may cause memory used one programs affected overwritten malicious programs viruses may purposefully alter another program memory may affect operation operating system cooperative memory management takes one misbehaved program crash system memory protection enables kernel limit process access computer memory various methods memory protection exist including memory segmentation paging methods require level hardware support 80286 mmu n't exist computers segmentation paging certain protected mode registers specify cpu memory address allow running program access attempts access addresses trigger interrupt cause cpu re-enter supervisor mode placing kernel charge called segmentation violation seg-v short since difficult assign meaningful result operation usually sign misbehaving program kernel generally resorts terminating offending program reports error windows versions 3.1 level memory protection programs could easily circumvent need use general protection fault would produced indicating segmentation violation occurred however system would often crash anyway use virtual memory addressing paging segmentation means kernel choose memory program may use given time allowing operating system use memory locations multiple tasks program tries access memory n't current range accessible memory nonetheless allocated kernel interrupted way would program exceed allocated memory see section memory management unix kind interrupt referred page fault kernel detects page fault generally adjusts virtual memory range program triggered granting access memory requested gives kernel discretionary power particular application memory stored even whether actually allocated yet modern operating systems memory accessed less frequently temporarily stored disk media make space available use programs called swapping area memory used multiple programs memory area contains swapped exchanged demand virtual memory provides programmer user perception much larger amount ram computer really multitasking refers running multiple independent computer programs computer giving appearance performing tasks time since computers one two things one time generally done via time-sharing means program uses share computer time execute operating system kernel contains scheduling program determines much time process spends executing order execution control passed programs control passed process kernel allows program access cpu memory later control returned kernel mechanism another program may allowed use cpu so-called passing control kernel applications called context switch early model governed allocation time programs called cooperative multitasking model control passed program kernel may execute long wants explicitly returning control kernel means malicious malfunctioning program may prevent programs using cpu hang entire system enters infinite loop modern operating systems extend concepts application preemption device drivers kernel code operating system preemptive control internal run-times well philosophy governing preemptive multitasking ensuring programs given regular time cpu implies programs must limited much time allowed spend cpu without interrupted accomplish modern operating system kernels make use timed interrupt protected mode timer set kernel triggers return supervisor mode specified time elapsed see sections interrupts dual mode operation many single user operating systems cooperative multitasking perfectly adequate home computers generally run small number well tested programs amigaos exception preemptive multitasking first version windows nt first version microsoft windows enforced preemptive multitasking n't reach home user market windows xp since windows nt targeted professionals access data stored disks central feature operating systems computers store data disks using files structured specific ways order allow faster access higher reliability make better use drive available space specific way files stored disk called file system enables files names attributes also allows stored hierarchy directories folders arranged directory tree early operating systems generally supported single type disk drive one kind file system early file systems limited capacity speed kinds file names directory structures could use limitations often reflected limitations operating systems designed making difficult operating system support one file system many simpler operating systems support limited range options accessing storage systems operating systems like unix linux support technology known virtual file system vfs operating system unix supports wide array storage devices regardless design file systems allowing accessed common application programming interface api makes unnecessary programs knowledge device accessing vfs allows operating system provide programs access unlimited number devices infinite variety file systems installed use specific device drivers file system drivers connected storage device hard drive accessed device driver device driver understands specific language drive able translate language standard language used operating system access disk drives unix language block devices kernel appropriate device driver place access contents disk drive raw format may contain one file systems file system driver used translate commands used access specific file system standard set commands operating system use talk file systems programs deal file systems basis filenames directories/folders contained within hierarchical structure create delete open close files well gather various information including access permissions size free space creation modification dates various differences file systems make supporting file systems difficult allowed characters file names case sensitivity presence various kinds file attributes makes implementation single interface every file system daunting task operating systems tend recommend using support natively file systems specifically designed example ntfs windows ext3 reiserfs linux however practice third party drivers usually available give support widely used file systems general-purpose operating systems example ntfs available linux ntfs-3g ext2/3 reiserfs available windows third-party software support file systems highly varied among modern operating systems although several common file systems almost operating systems include support drivers operating systems vary file system support disk formats may installed windows file system usually limited application certain media example cds must use iso 9660 udf windows vista ntfs file system operating system installed possible install linux onto many types file systems unlike operating systems linux unix allow file system used regardless media stored whether hard drive disc cd dvd ... usb flash drive even contained within file located another file system device driver specific type computer software developed allow interaction hardware devices typically constitutes interface communicating device specific computer bus communications subsystem hardware connected providing commands and/or receiving data device end requisite interfaces operating system software applications specialized hardware-dependent computer program also operating system specific enables another program typically operating system applications software package computer program running operating system kernel interact transparently hardware device usually provides requisite interrupt handling necessary necessary asynchronous time-dependent hardware interfacing needs key design goal device drivers abstraction every model hardware even within class device different newer models also released manufacturers provide reliable better performance newer models often controlled differently computers operating systems expected know control every device future solve problem operating systems essentially dictate every type device controlled function device driver translate operating system mandated function calls device specific calls theory new device controlled new manner function correctly suitable driver available new driver ensures device appears operate usual operating system point view versions windows vista versions linux 2.6 driver execution co-operative meaning driver entered infinite loop would freeze system recent revisions operating systems incorporate kernel preemption kernel interrupts driver give tasks separates process receives response device driver gives tasks currently operating systems support variety networking protocols hardware applications using means computers running dissimilar operating systems participate common network sharing resources computing files printers scanners using either wired wireless connections networks essentially allow computer operating system access resources remote computer support functions could resources connected directly local computer includes everything simple communication using networked file systems even sharing another computer graphics sound hardware network services allow resources computer accessed transparently ssh allows networked users direct access computer command line interface client/server networking allows program computer called client connect via network another computer called server servers offer host various services network computers users services usually provided ports numbered access points beyond server ip address port number usually associated maximum one running program responsible handling requests port daemon user program turn access local hardware resources computer passing requests operating system kernel many operating systems support one vendor-specific open networking protocols well example sna ibm systems decnet systems digital equipment corporation microsoft-specific protocols smb windows specific protocols specific tasks may also supported nfs file access protocols like esound esd easily extended network provide sound local applications remote system sound hardware computer secure depends number technologies working properly modern operating system provides access number resources available software running system external devices like networks via kernel operating system must capable distinguishing requests allowed processed others processed systems may simply distinguish privileged non-privileged systems commonly form requester identity user name establish identity may process authentication often username must quoted username may password methods authentication magnetic cards biometric data might used instead cases especially connections network resources may accessed authentication reading files network share also covered concept requester identity authorization particular services resources accessible requester logged system tied either requester user account variously configured groups users requester belongs addition allow disallow model security system high level security also offers auditing options would allow tracking requests access resources reading file internal security security already running program possible possibly harmful requests must carried interrupts operating system kernel programs directly access hardware resources secured external security involves request outside computer login connected console kind network connection external requests often passed device drivers operating system kernel passed onto applications carried directly security operating systems long concern highly sensitive data held computers commercial military nature united states government department defense dod created trusted computer system evaluation criteria tcsec standard sets basic requirements assessing effectiveness security became vital importance operating system makers tcsec used evaluate classify select trusted operating systems considered processing storage retrieval sensitive classified information network services include offerings file sharing print services email web sites file transfer protocols ftp compromised security front line security hardware devices known firewalls intrusion detection/prevention systems operating system level number software firewalls available well intrusion detection/prevention systems modern operating systems include software firewall enabled default software firewall configured allow deny network traffic service application running operating system therefore one install running insecure service telnet ftp threatened security breach firewall would deny traffic trying connect service port alternative strategy sandbox strategy available systems meet popek goldberg virtualization requirements operating system running user programs native code instead either emulates processor provides host p-code based system java internal security especially relevant multi-user systems allows user system private files users tamper read internal security also vital auditing use since program potentially bypass operating system inclusive bypassing auditing every computer operated individual requires user interface user interface usually referred shell essential human interaction supported user interface views directory structure requests services operating system acquire data input hardware devices keyboard mouse credit card reader requests operating system services display prompts status messages output hardware devices video monitor printer two common forms user interface historically command-line interface computer commands typed line-by-line graphical user interface visual environment commonly wimp present modern computer systems support graphical user interfaces gui often include computer systems original implementation classic mac os gui integrated kernel technically graphical user interface operating system service incorporating support one operating system kernel allow gui responsive reducing number context switches required gui perform output functions operating systems modular separating graphics subsystem kernel operating system 1980s unix vms many others operating systems built way linux macos also built way modern releases microsoft windows windows vista implement graphics subsystem mostly user-space however graphics drawing routines versions windows nt 4.0 windows server 2003 exist mostly kernel space windows 9x little distinction interface kernel many computer operating systems allow user install create user interface desire x window system conjunction gnome kde plasma 5 commonly found setup unix unix-like bsd linux solaris systems number windows shell replacements released microsoft windows offer alternatives included windows shell shell separated windows numerous unix-based guis existed time derived x11 competition among various vendors unix hp ibm sun led much fragmentation though effort standardize 1990s cose cde failed various reasons eventually eclipsed widespread adoption gnome k desktop environment prior free software-based toolkits desktop environments motif prevalent toolkit/desktop combination basis upon cde developed graphical user interfaces evolve time example windows modified user interface almost every time new major version windows released mac os gui changed dramatically introduction mac os x 1999 real-time operating system rtos operating system intended applications fixed deadlines real-time computing applications include small embedded systems automobile engine controllers industrial robots spacecraft industrial control large-scale computing systems early example large-scale real-time operating system transaction processing facility developed american airlines ibm sabre airline reservations system embedded systems fixed deadlines use real-time operating system vxworks pikeos ecos qnx montavista linux rtlinux windows ce real-time operating system shares similar apis desktop windows shares none desktop windows codebase symbian os also rtos kernel eka2 starting version 8.0b embedded systems use operating systems palm os bsd linux although operating systems support real-time computing operating system development one complicated activities computing hobbyist may engage hobby operating system may classified one whose code directly derived existing operating system users active developers cases hobby development support homebrew computing device example simple single-board computer powered 6502 microprocessor development may architecture already widespread use operating system development may come entirely new concepts may commence modeling existing operating system either case hobbyist his/her developer may interact small sometimes unstructured group individuals like interests examples hobby operating system include syllable templeos application software generally written use specific operating system sometimes even specific hardware porting application run another os functionality required application may implemented differently os names functions meaning arguments etc requiring application adapted changed otherwise maintained unix first operating system written assembly language making portable systems different native pdp-11 cost supporting operating systems diversity avoided instead writing applications software platforms java qt abstractions already borne cost adaptation specific operating systems system libraries another approach operating system vendors adopt standards example posix os abstraction layers provide commonalities reduce porting costs
[ 0, 5717, 3, 5, 5724, 9, 10, 12, 13, 5728, 5732, 5734, 5735, 22, 5738, 26, 27, 5743, 5745, 5747, 35, 37, 5753, 5755, 5757, 42, 43, 45, 46, 53, 55, 5769, 5771, 58, 64, 65, 68, 5780, 5782, 5783, 74, 5784, 5786, 5787, 5789, 82, ...
Test
5,572
5
Boot_Service_Discovery_Protocol:boot service discovery protocol boot service discovery protocol bsdp apple-developed standards-conforming extension dhcp allows macintosh computers boot bootable images network instead local storage media cd dvd hard disk dhcp options used vendor-specific information option number 43 vendor class identifier option number 60 three versions bsdp though usually version 1.0 used versions enable client choose several bootable images offered server reference implementation bsdp darwin bootp server part mac os netboot feature dhcp server client send vendor class option contains ascii-encoded string three parts delimited character first part aaplbsdpc advertises bsdp capability second part client architecture ppc i386 third part system identifier example intel-based imac sends vendor class list microsoft vendor classes found according dhcp option carrying number 43 reserved vendor specific information information stored following format vendor wants convey multiple options within option field done encapsulated vendor-specific extensions vendor encapsulated extensions contain one concatenated fields field consists following table describes possible field types numeric fields interpreted unsigned big endian integers following example illustrates construction vendor encapsulated option first field 01 01 02 means packet bsdp select message 01 declares field specifies bsdp message type next 01 indicates field contents one byte long — 02 code select following 08 04 81 00 07 e5 means boot image id 2164262885 selected finally 82 0a 4e 65 74 42 6f 6f 74 30 30 31 means string 0x0a 10 characters namely netboot001 name system boot
[ 7148, 456, 3172, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 7091, 2219, 3383, 3640, 3797, 2043, 588, 3312, 5859, 2057, 3819, 3820, 3821, 2335, 7214, 7217, 7765, 259, 5880, 352, 1992 ]
Test
5,573
4
Simple_Certificate_Enrollment_Protocol:simple certificate enrollment protocol simple certificate enrollment protocol scep internet draft internet engineering task force ietf protocol used numerous manufacturers network equipment software developing simplified means handling certificates large-scale implementation everyday users well referenced industry standards protocol designed make issuing digital certificates scalable possible idea standard network user able request digital certificate electronically simply possible processes usually required intensive input network administrators suited large-scale deployments simple certificate enrollment protocol popular widely available tested certificate enrollment protocol although widely used example cisco ios operating system concerns raised able strongly authenticate certificate requests made users devices since exactly issues apply certificate issue protocols certificate management protocol certificate management cms clear real concern effectively abandoned original sponsors around 2010 internet draft describing protocol revived 2015 due widespread use industry standards updating algorithms used correcting numerous issues original specification accumulated considerable amount detritus time
[ 4071, 4693, 6795, 7953, 38 ]
Test
5,574
3
DOS_Shell:dos shell dos shell file manager debuted ms-dos ibm pc dos version 4.0 june 1988 discontinued ms-dos version 6.22 remained part supplemental disk supplemental disk could ordered could downloaded microsoft ftp server dos shell retained pc dos pc dos 2000 dos shell one first successful attempts create basic graphical user interface gui type file manager dos although properly referred text user interface tui character-oriented windows cow even though graphical modes available supported hardware vga-equipped pcs additionally one first guis developed microsoft later inspired design windows shell much like dos version file manager found windows versions 3.11 nt 3.51 file explorer later versions ms-dos 4.x 5.x program implemented com file codice_1 ms-dos 6 executable .exe filename extension codice_2 shell includes common features seen file managers copying moving renaming files well ability launch applications double-click shell could run command codice_3 ability set simple colours styles shell also help system program list task swapper like many modern file managers ability display dual hierarchy directory file lists i.e left right panes displaying list directory contents hierarchical file path current working directory mouse supported however like dos application required appropriate device driver one feature ability list files hard drive single alphabetized list along path attributes permitted user compare versions file different directories attributes easily spot duplicates dos shell incapable full multitasking supported rudimentary task switching could switch programs running memory cost performance hit however running programs fit conventional memory area support swapping disk time windows 3.1x graphical user interface became much popular among computer users windows capable multitasking system performance much higher complete access extended memory
[ 448, 4291, 7512, 4843, 4759, 8087, 5571, 3976, 405, 6380, 1670, 3915, 5784, 3920 ]
Validation
5,575
8
Vibe.d:vibe.d vibe.d open-source software web framework asynchronous i/o toolkit written programming language vibe.d deal requests per second common platforms
[ 2451, 5983, 1445, 6701, 1819, 103, 6428, 7347, 6095, 2740, 3368, 5571, 6191, 486, 3543, 6029, 933, 417, 54, 2870, 4535, 5965, 3915, 6061, 2619 ]
Test
5,576
3
Scorpion_(CPU):scorpion cpu scorpion central processing unit cpu core designed qualcomm use snapdragon mobile systems chips socs released 2008 designed in-house many architectural similarities arm cortex-a8 cortex-a9 cpu cores
[ 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6874, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 136, 3397, 1977, 2339, 1237, 2711, 1995, 550, 4847, 3786, 2024, 4879, 7376, 5585, 4166, 4537,...
Validation
5,577
4
List_of_security_assessment_tools:list security assessment tools list available software hardware tools designed particularly suited various kinds security assessment security testing several operating systems tool suites provide bundles tools useful various types security assessment
[ 6574, 1461, 7487, 588, 1893, 848, 2747, 7830, 1942, 3088, 5664, 5051, 1805 ]
Validation
5,578
4
Kristina_Svechinskaya:kristina svechinskaya kristina vladimirovna svechinskaya born february 16 1989 former russian money mule hacker studying new york university 2010 accused plot defraud british u.s. banks usage false passports according charges svechinskaya used zeus trojan horse attack thousands bank accounts opened least five accounts bank america wachovia received 35,000 £22,000 stolen money estimated nine people svechinskaya skimmed 3 million total svechinskaya dubbed media world sexiest computer hacker raunchy casual appearance compared anna chapman upcoming russian film botnet partially based svechinskaya story fluent english svechinskaya originally studied stavropol state university according svechinskaya mother death kristina father family living 12,000 ruble us 400 time salary third year kristina chose work travel program summer 2010 arrived massachusetts started work fast food outlet earnings small moved new york worked hacker money mule svechinskaya offered 8–10 share taken money sentence expected announced june 2011 svechinskaya signed personal recognizance bond released 25,000 bail case conviction svechinskaya could imprisoned 40 years would included fraud charge 30 years 1 million fine false passports charge 10 years 250,000 fine 2016 svechinskaya made youtube presentation smartflash marketed secure cloud-based usb flash drive store unlimited amount data
[ 7186, 2961, 3486 ]
Validation
5,579
2
IOS_SDK:ios sdk ios sdk software development kit formerly iphone sdk software development kit developed apple inc kit allows development mobile apps apple ios operating system originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios operating system instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 17 2007 apple would software development kit sdk available developers february 2008 sdk released march 6 2008 ios sdk free download mac users available microsoft windows personal computers test application get technical support distribute applications app store developers required subscribe apple developer program sdk contents separated following sets sdk also contains iphone simulator program used simulate look feel iphone developer computer new sdk versions accompany new ios versions ios sdk combined xcode helps developers write ios applications using officially supported programming languages including swift objective-c. .ipa ios app store package file ios application archive file stores ios app 2008 sun microsystems announced plans release java virtual machine jvm ios based java platform micro edition version java would enable java applications run iphone ipod touch soon announcement developers familiar sdk terms agreement believed allowing third-party applications run background answer phone call still run application example allowing application download code another source allowing application interact third-party application sun development efforts could hindered without apple cooperation sun also worked third-party company called innaworks attempts get java iphone despite apparent lack interest apple firmware leak 2007 iphone release revealed arm chip processor jazelle support embedded java execution novell announced september 2009 successfully developed monotouch software framework let developers write native iphone applications c .net programming languages still maintaining compatibility apple requirements xamarin.ios visual studio tools xamarin open-source app development platform lets build apps many operating systems single shared .net code base xamarin allows write apps take full advantage power features performance platform xamarin.ios one xamarin frameworks use create fully native ios apps using c visual studio ios support adobe flash although adobe two versions software – flash flash lite – apple views neither suitable iphone claiming full flash slow useful flash lite capable used web october 2009 adobe announced upcoming update creative suite would feature component let developers build native iphone apps using company flash development tools software officially released part company creative suite 5 collection professional applications april 2010 apple made controversial changes iphone developer agreement requiring developers use approved programming languages order publish apps app store banning applications used third-party development tools developer backlash news potential antitrust investigation apple revised agreement september allowing use third-party development tools
[ 6788, 3940, 7890, 2564, 2926, 4320, 4690, 5391, 734, 5752, 6113, 405, 6119, 5062, 6125, 2954, 5068, 1123, 2240, 6479, 424, 6847, 6142, 2609, 5786, 1895, 1897, 5091, 5794, 4749, 6158, 7601, 7956, 5101, 4759, 2284, 4400, 2294, 120, 7637, ...
Test
5,580
2
Read-copy-update:read-copy-update computer science read-copy-update rcu synchronization mechanism based mutual exclusion used performance reads crucial example space–time tradeoff enabling fast operations cost space read-copy-update allows multiple threads efficiently read shared memory deferring updates pre-existing reads later time simultaneously marking data ensuring new readers read updated data makes readers proceed synchronization involved hence fast also making updates difficult key property rcu readers access data structure even process updated rcu updaters block readers force retry accesses overview starts showing data safely inserted deleted linked structures despite concurrent readers first diagram right depicts four-state insertion procedure time advancing left right first state shows global pointer named initially colored red indicate might accessed reader time thus requiring updaters take care allocating memory new structure transitions second state structure indeterminate state indicated question marks inaccessible readers indicated green color structure inaccessible readers updater may carry desired operation without fear disrupting concurrent readers initializing new structure transitions third state shows initialized values structure fields assigning reference new structure transitions fourth final state state structure accessible readers therefore colored red primitive used carry assignment ensures assignment atomic sense concurrent readers either see pointer valid pointer new structure mash-up two values additional properties described later article procedure demonstrates new data may inserted linked data structure even though readers concurrently traversing data structure insertion second diagram right depicts four-state deletion procedure time advancing left right first state shows linked list containing elements three elements colored red indicate rcu reader might reference time using remove element list transitions second state note link element b c left intact order allow readers currently referencing element traverse remainder list readers accessing link element either obtain reference element element either way reader see valid correctly formatted linked list element colored yellow indicate pre-existing readers might still reference element new readers way obtain reference wait-for-readers operation transitions third state note wait-for-readers operation need wait pre-existing readers new readers element colored green indicate readers longer referencing therefore safe updater free element thus transitioning fourth final state important reiterate second state different readers see two different versions list either without element words rcu provides coordination space different versions list well time different states deletion procedures stark contrast traditional synchronization primitives locking transactions coordinate time space procedure demonstrates old data may removed linked data structure even though readers concurrently traversing data structure deletion given insertion deletion wide variety data structures implemented using rcu rcu readers execute within read-side critical sections normally delimited statement within rcu read-side critical section said quiescent state statements permitted hold references rcu-protected data structures wait-for-readers operation required wait threads quiescent states time period thread resides least quiescent state called grace period definition rcu read-side critical section existence beginning given grace period must complete end grace period constitutes fundamental guarantee provided rcu addition wait-for-readers operation must wait least one grace period elapse turns guarantee provided extremely small read-side overheads fact limiting case actually realized server-class linux-kernel builds read-side overhead exactly zero rcu fundamental guarantee may used splitting updates removal reclamation phases removal phase removes references data items within data structure possibly replacing references new versions data items run concurrently rcu read-side critical sections reason safe run removal phase concurrently rcu readers semantics modern cpus guarantee readers see either old new version data structure rather partially updated reference grace period elapsed longer readers referencing old version safe reclamation phase free reclaim data items made old version splitting update removal reclamation phases allows updater perform removal phase immediately defer reclamation phase readers active removal phase completed words grace period elapsed typical rcu update sequence goes something like following procedure matches earlier diagram updater performing removal reclamation step often helpful entirely different thread reclamation reference counting used let reader perform removal even thread performs update step step 2 reclamation step step 4 often helpful think separately early 2008 almost 2,000 uses rcu api within linux kernel including networking protocol stacks memory-management system 9,000 uses since 2006 researchers applied rcu similar techniques number problems including management metadata used dynamic analysis managing lifetime clustered objects managing object lifetime k42 research operating system optimizing software transactional memory implementations dragonfly bsd uses technique similar rcu closely resembles linux sleepable rcu srcu implementation ability wait readers done allows rcu readers use much lighter-weight synchronization—in cases absolutely synchronization contrast conventional lock-based schemes readers must use heavy-weight synchronization order prevent updater deleting data structure reason lock-based updaters typically update data place must therefore exclude readers contrast rcu-based updaters typically take advantage fact writes single aligned pointers atomic modern cpus allowing atomic insertion removal replacement data linked structure without disrupting readers concurrent rcu readers continue accessing old versions dispense atomic read-modify-write instructions memory barriers cache misses expensive modern smp computer systems even absence lock contention lightweight nature rcu read-side primitives provides additional advantages beyond excellent performance scalability real-time response example provide immunity deadlock livelock conditions course rcu also disadvantages example rcu specialized technique works best situations mostly reads updates often less applicable update-only workloads another example although fact rcu readers updaters may execute concurrently enables lightweight nature rcu read-side primitives algorithms may amenable read/update concurrency despite well decade experience rcu exact extent applicability still research topic technique covered u.s. software patent 5,442,758 issued august 15 1995 assigned sequent computer systems well 5,608,893 expired 2009-03-30 5,727,209 expired 2010-04-05 6,219,690 expired 2009-05-18 6,886,162 expired 2009-05-25 now-expired us patent 4,809,168 covers closely related technique rcu also topic one claim sco v. ibm lawsuit rcu available number operating systems added linux kernel october 2002 user-level implementations liburcu also available implementation rcu version 2.6 linux kernel among better-known rcu implementations used inspiration rcu api remainder article core api application programming interface quite small diagram right shows api communicates among reader updater reclaimer rcu infrastructure observes time sequence codice_9 codice_10 codice_1 codice_4 invocations order determine 1 codice_1 invocations may return callers 2 codice_4 callbacks may invoked efficient implementations rcu infrastructure make heavy use batching order amortize overhead many uses corresponding apis rcu extremely simple toy implementations aid understanding rcu section presents one toy implementation works non-preemptive environment void call_rcu void *callback void void *arg void synchronize_rcu void code sample codice_7 codice_5 ignored without missing much however needed order suppress harmful compiler optimization prevent cpus reordering accesses smp_wmb /* order previous writes */ typeof p _value access_once p note codice_9 codice_10 nothing great strength classic rcu non-preemptive kernel read-side overhead precisely zero codice_19 empty macro dec alpha cpus memory barriers needed modern cpus codice_20 macro volatile cast generates additional code cases way codice_9 participate deadlock cycle cause realtime process miss scheduling deadline precipitate priority inversion result high lock contention however toy rcu implementation blocking within rcu read-side critical section illegal blocking holding pure spinlock implementation codice_1 moves caller synchronize_cpu cpu thus blocking cpus able perform context switch recall non-preemptive environment blocking within rcu read-side critical section illegal imply preemption points within rcu read-side critical section therefore given cpu executes context switch schedule another process know cpu must completed preceding rcu read-side critical sections cpus executed context switch preceding rcu read-side critical sections completed although rcu used many different ways common use rcu analogous reader-writer locking following side-by-side code display shows closely related reader-writer locking rcu differences two approaches quite small read-side locking moves codice_9 codice_10 update-side locking moves reader-writer lock simple spinlock codice_1 precedes codice_26 however one potential catch read-side update-side critical sections run concurrently many cases problem necessary check carefully regardless example multiple independent list updates must seen single atomic update converting rcu require special care also presence codice_1 means rcu version codice_28 block problem codice_4 could used like codice_30 place codice_1 especially useful combination reference counting name comes way rcu used update linked structure place thread wishing uses following steps thread made copy awakened kernel safely deallocate old structure structure read concurrently thread copying order update hence name read-copy update abbreviation rcu one many contributions linux community names similar techniques include passive serialization mp defer vm/xa programmers generations k42 tornado programmers techniques mechanisms resembling rcu independently invented multiple times bauer r.t. june 2009 operational verification relativistic program psu tech report tr-09-04 http //www.pdx.edu/sites/www.pdx.edu.computer-science/files/tr0904.pdf
[ 3256, 2182, 3613, 7528, 7532, 5744, 6443, 2942, 6117, 4341, 2226, 5762, 412, 415, 3666, 2970, 7956, 5453, 5460, 7242, 1535, 1924, 6892, 1176, 1933, 5829, 1208, 6211, 4435, 5865, 7669, 3404, 1227, 1596, 165, 7312, 1607, 5884, 1991, 1616, ...
Validation
5,581
8
Pimp_My_Search:pimp search pimp search novelty website create google lookalike webpage replacing word google word phrase user choice non-commercial website connected google inc. pimp search started 2006 became popular 2008 featured many media websites youtube videos site closed later 2009 citing dispute 'trademark issues february 2009 pimp search ended google search facilities posted message read trademark issues google longer allowing searches us ... currently site remains closed following message displayed trademark issues pimp search closed ever linking another website shinysearch.com
[ 84 ]
Test
5,582
4
Password_fatigue:password fatigue password fatigue feeling experienced many people required remember excessive number passwords part daily routine logon computer work undo bicycle lock conduct banking automated teller machine atm concept also known password chaos broadly identity chaos increasing prominence information technology internet employment finance recreation aspects people lives ensuing introduction secure transaction technology led people accumulating proliferation accounts passwords according 2002 survey british online-security consultant nta monitor typical intensive computer user 21 accounts require password factors causing password fatigue aside contributing stress password fatigue may encourage people adopt habits reduce security protected information example account holder might use password several different accounts deliberately choose easy-to-remember passwords vulnerable cracking rely written records passwords many sites attempt prevent users choosing easy-to-guess passwords add restrictions password length composition contribute password fatigue many cases restrictions placed passwords actually serve decrease security account either preventing good passwords making password complex user ends storing insecurely post-it note sites also block non-ascii non-alphanumeric characters password fatigue typically affect users also affect technical departments manage user accounts constantly reinitializing passwords situation ends lowering morale cases many cases users end typing passwords cleartext text files remember even writing post-it notes stick desk drawer companies well organized respect implemented alternative authentication methods adopted technologies user credentials entered automatically others may focus ease use even worsen situation constantly implementing new applications authentication system
[ 2489, 6483, 4759, 3589, 1078, 2399, 3795 ]
Validation
5,583
9
Racket_features:racket features racket active development vehicle programming language research since mid-1990s accumulated many features years article describes demonstrates features note one racket main design goals accommodate creating new languages domain-specific languages completely new languages therefore following examples different languages implemented racket please refer main article information core racket implementation highly flexible even without using dialects function full-featured scripting language capable running without windows-native gui capable tasks web server creation graphics racket use three different garbage collectors like implementations scheme family racket implements full tail call elimination racket takes language made fully safe-for-space via live variable analysis complements precise garbage collector cases like implementation lazy racket two features crucial proper execution addition additional compiler optimizations lambda lifting just-in-time compilation racket system interface includes asynchronous non-blocking i/o green threads synchronization channels semaphores sub-processes tcp sockets following program starts echo server port 12345 combination dynamic compilation rich system interface makes racket capable scripting language similar perl python following example demonstrates walking directory tree starting current directory uses codice_1 function construct sequence walks tree codice_2 form binds codice_3 path sequence codice_4 tests paths given regexp pattern next example uses hash table record previously seen lines print unique ones programs run drracket command line via codice_5 executable racket ignores initial shebang line making possible turn programs executable scripts following script demonstrates addition using racket library command-line argument parsing script grep-like utility expecting three command-line arguments base directory filename extension perl-compatible regular expression scans base directory files given suffix print lines matching regexp pattern racket features concept custodian kind value acts resource manager often used network servers connection dealt new custodian making easy clean-up resources might left open handler e.g. open ports following extends echo server example custodian use custodians combined memory accounting feature 3m garbage collector number additional runtime parameters control additional aspects runtime make possible create completely safe sandboxed execution contexts codice_6 library provides kind functionality simple way following example creates repl server specified port connecting port look like plain racket repl except evaluation subject various protection aspects sandbox example possible access filesystem repl create network connection run subprocesses use much time memory fact repl safe enough given publicly next example implements web server using codice_7 language time connection made server codice_8 function called get html send back client racket also includes functions would need write scrapers robots example following function would list google results search string library also includes support protocols http graphic capabilities come several different flavors intended different audiences codice_9 library provides convenient functions constructing images library mainly used students htdp-based courses following example codice_10 function defined called time generate sierpinski triangle depth 8 drracket editors contain images drracket displays image values like type value integers lists running program example actually displays sierpinski triangle cut pasted another program codice_11 library constructs image values mature audiences needs example following program plots sum two formula_1 three-dimensional gaussians concentric partially transparent surfaces codice_12 function requires three-argument function first argument curried codice_13 supplies besides constructing image values codice_11 also write files png pdf postscript svg formats racket implements portable gui layer libraries mentioned build implemented via native windows api via cocoa mac os x via gtk+ linux others racket api class-based toolkit somewhat related wxwidgets used originally following simple guessing game demonstrates coding gui toolkit codice_15 class implements top-level window codice_16 implements button codice_17 function defined produces function used button callback action gui hand-coded way help gui designer program available planet slide-based presentations also developed racket using codice_18 language much like beamer racket programmatic facilities elements slides pictures combined example following program displays full-screen title slide followed slide pictures codice_19 codice_20 functions combine pictures vertically horizontally respectively centered axis extension packages also exist planet example include latex elements racket features foreign function interface based libffi interface allows writing unsafe low-level c-like code allocate memory dereference pointers call functions shared libraries send callbacks racket functions using libffi closures core implementation thin layer atop libffi written c full interface implemented via racket code interface uses macros extensively resulting expressive racket-based interface description language language number useful features uniform representation higher-order functions avoiding pitfalls callbacks callouts different struct definitions similar plain racket structs custom function types represent input output pointers implicit arguments e.g. argument provides number elements vector passed another argument using interface access underlying gui toolkits racket implements gui layer completely racket ffi used number different ways writing complete glue layer library done racket opengl binding quickly pulling single foreign function example latter approach racket notable feature ability build new domain-specific general-purpose languages result combining number important features module system plays important role combining features making possible write code spans across number modules written different language languages used extensively racket distribution user libraries fact creating new language straightforward languages less handful uses racket comes number useful languages different racket default language scribble racket documentation system comes form number languages used write prose used racket documentation well writing books articles actually rather single scribble language family similar dialects different purpose run following example copy drracket click one two scribble rendering buttons appear pdf rendering requires pdftex alternatively use codice_21 executable file striking feature scribble languages use new syntax designed specifically textually rich code syntax allows free-form text string interpolation customizable quotations useful applications preprocessing text generating text html template systems note syntax extends plain s-expressions implemented alternative input expressions typed racket statically typed variant racket type system implements unique motivation developing accommodating much idiomatic racket code possible—as result includes subtypes unions much another goal typed racket allow migration parts program typed language accommodates calling typed code untyped code vice versa generating dynamic contracts enforce type invariants considered desirable feature application lifetime stages matures script application static typing helps maintenance large body code codice_22 language language lazy evaluation semantics similar haskell following example codice_23 infinite list whose 1000th element computed value needed printout racket comes three logic programming languages racklog prolog-like language datalog implementation minikanren port unlike scribble syntax first two languages use completely new syntax rather extension s-expressions use drracket 'll see provides proper highlighting usual host tools check syntax prolog/datalog repl plt group develops racket traditionally involved education levels one earliest research ideas group promoted use language levels restrict new students providing helpful error messages fit student level knowledge approach heavily used design programs textbook several plt developers authored well programbydesign project following program uses codice_24—the beginning student language uses codice_9 library creating pictures teaching languages codice_26 library interactive animations racket comes complete implementation algol 60 language another supported language plai like racket typed untyped modules written plai export every definition unlike scheme typed plai language differs traditional racket importantly statically typed also gives useful new constructs define-type type-case test finally following example implementation new language language code stored codice_28 file use follows
[ 1616, 5983, 4573, 3515, 6002, 2740, 7637, 6016, 1114, 3895, 7299, 7032, 1889, 5786, 8142 ]
Test
5,584
9
Lisp-based_Intelligent_Software_Agents:lisp-based intelligent software agents lisa project platform development lisp-based intelligent software agents lisa production-rule system implemented common lisp object system clos heavily influenced clips java expert system shell jess core reasoning engine based object-oriented implementation rete algorithm efficient mechanism solving difficult many-to-many matching problem intrinsic lisa ability reason clos objects without imposing special class hierarchy requirements thus possible easily augment existing clos applications reasoning capabilities lisa extension common lisp full power lisp environment always available lisa-enabled applications run ansi-compliant common lisp platform
[ 4543, 1445, 6337, 6888 ]
Test