node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
5,785 | 4 | Trusted_system:trusted system security engineering subspecialty computer science trusted system system relied upon specified extent enforce specified security policy equivalent saying trusted system one whose failure would break security policy policy exists trusted system trusted enforce meaning word trust critical carry meaning might expected everyday usage system trusted user one user feels safe use trusts tasks without secretly executing harmful unauthorised programs trusted computing refers whether programs trust platform unmodified expected whether programs innocent malicious execute tasks undesired user trusted system also seen level base security system protection provided handled according different levels.this commonly found military information categorized unclassified u confidential c secret top secret ts beyond.these also enforces policies no-read no-write subset trusted systems division b division implement mandatory access control mac labels often assumed used processing classified information however generally untrue four modes one operate multilevel secure system multilevel mode compartmented mode dedicated mode system-high mode national computer security center yellow book specifies b3 a1 systems used processing strict subset security labels operated according particularly strict configuration central concept u.s. department defense-style trusted systems notion reference monitor entity occupies logical heart system responsible access control decisions ideally reference monitor tamper-proof b always invoked c small enough subject independent testing completeness assured per u.s. national security agency 1983 trusted computer system evaluation criteria tcsec orange book set evaluation classes defined described features assurances user could expect trusted system key provision highest levels assurance b3 a1 dedication significant system engineering toward minimization complexity size often cited trusted computing base tcb defined combination hardware software firmware responsible enforcing system security policy inherent engineering conflict would appear arise higher-assurance systems smaller tcb larger set hardware software firmware lies outside tcb therefore untrusted although may lead technically naive sophists arguments nature trust argument confuses issue correctness trustworthiness contrast tcsec precisely defined hierarchy six evaluation classes—the highest a1 featurally identical b3 differing documentation standards—the recently introduced common criteria cc —which derive blend less technically mature standards various nato countries—provide tenuous spectrum seven evaluation classes intermix features assurances arguably non-hierarchical manner lack philosophic precision mathematical stricture tcsec particular cc tolerate loose identification target evaluation toe support—even encourage—an inter-mixture security requirements culled variety predefined protection profiles strong case made even seemingly arbitrary components tcsec contribute chain evidence fielded system properly enforces advertised security policy even highest e7 level cc truly provide analogous consistency stricture evidentiary reasoning mathematical notions trusted systems protection classified information derive two independent interrelated corpora work 1974 david bell leonard lapadula mitre working close technical guidance economic sponsorship maj. roger schell ph.d. u.s. army electronic systems command ft. hanscom devised known bell-lapadula model less trustworthy computer system modeled terms objects passive repositories destinations data files disks printers subjects active entities—perhaps users system processes threads operating behalf users—that cause information flow among objects entire operation computer system indeed regarded history serializability-theoretic sense pieces information flowing object object response subjects requests flows time dorothy denning purdue university publishing ph.d. dissertation dealt lattice-based information flows computer systems mathematical lattice partially ordered set characterizable directed acyclic graph relationship two vertices either dominates dominated neither defined generalized notion labels —corresponding less full security markings one encounters classified military documents e.g top secret wnintel tk dumbo—that attached entities bell lapadula integrated denning concept landmark mitre technical report—entitled secure computer system unified exposition multics interpretation —whereby labels attached objects represented sensitivity data contained within object though often subtle semantic difference sensitivity data within object sensitivity object labels attached subjects represented trustworthiness user executing subject concepts unified two properties simple security property subject read object dominates greater close enough—albeit mathematically imprecise—interpretation confinement property *-property subject write object dominates properties loosely referred no-read-up no-write-down respectively jointly enforced properties ensure information flow downhill repository whence insufficiently trustworthy recipients may discover extension assuming labels assigned subjects truly representative trustworthiness no-read-up no-write-down rules rigidly enforced reference monitor provably sufficient constrain trojan horses one general classes attack sciz popularly reported worms viruses specializations trojan horse concept bell-lapadula model technically enforces confidentiality secrecy controls i.e address problem sensitivity objects attendant trustworthiness subjects inappropriately disclose dual problem integrity i.e. problem accuracy even provenance objects attendant trustworthiness subjects inappropriately modify destroy addressed mathematically affine models important named creator k. j. biba integrity models include clark-wilson model shockley schell program integrity model seaview model important feature macs entirely beyond control user tcb automatically attaches labels subjects executed behalf users files access modify contrast additional class controls termed discretionary access controls dacs direct control system users familiar protection mechanisms permission bits supported unix since late 1960s and—in flexible powerful form—by multics since earlier still access control lists acls familiar examples dacs behavior trusted system often characterized terms mathematical model—which may less rigorous depending upon applicable operational administrative constraints—that takes form finite state machine fsm state criteria state transition constraints set operations correspond state transitions usually necessarily one descriptive top-level specification dtls entails user-perceptible interface e.g api set system calls unix parlance system exits mainframe parlance element engenders one model operations trusted computing group creates specifications meant address particular requirements trusted systems including attestation configuration safe storage sensitive information trusted systems context national homeland security law enforcement social control policy systems conditional prediction behavior people objects within system determined prior authorizing access system resources example trusted systems include use security envelopes national security counterterrorism applications trusted computing initiatives technical systems security use credit identity scoring systems financial anti-fraud applications general include system probabilistic threat risk analysis used assess trust decision-making authorizing access allocating resources likely threats including use design systems constraints control behavior within system ii deviation analysis systems surveillance used ensure behavior within systems complies expected authorized parameters widespread adoption authorization-based security strategies default state default=deny counterterrorism anti-fraud purposes helping accelerate ongoing transformation modern societies notional beccarian model criminal justice based accountability deviant actions occur – see cesare beccaria crimes punishment 1764 – foucauldian model based authorization preemption general social compliance ubiquitous preventative surveillance control system constraints – see michel foucault discipline punish 1975 alan sheridan tr. 1977 1995 emergent model security geared towards policing risk management surveillance exchange information auditing communication classification developments led general concerns individual privacy civil liberty broader philosophical debate appropriate forms social governance methodologies trusted systems context information theory based definition trust 'trust essential communication channel transferred source destination using channel ed gerck information theory information nothing knowledge meaning context information theory information simply transferred source destination using communication channel transmission information available destination transfer zero information received party party expect—as measured uncertainty party message likewise trust defined gerck nothing friendship acquaintances employee-employer relationships loyalty betrayal overly-variable concepts trust taken purely subjective sense either feeling something purely personal psychological—trust understood something potentially communicable definition trust abstract allowing different instances observers trusted system communicate based common idea trust otherwise communication would isolated domains necessarily different subjective intersubjective realizations trust subsystem man machines may coexist taken together model information theory information expect trust know linking concepts trust seen qualified reliance received information terms trusted systems assertion trust based record information information channels deepening questions leads complex conceptions trust thoroughly studied context business relationships also leads conceptions information quality information integrates trust trustworthiness structure information information system conceived higher quality terms particular definitions accuracy precision means higher trustworthiness introduction calculus trust example 'if connect two trusted systems less trusted taken together given ibm federal software group suggested provides useful definition trust application information technology environment related information theory concepts provides basis measuring trust network centric enterprise services environment notion trust considered requisite achieving desired collaborative service-oriented architecture vision see also trusted systems project part global information society project gisp joint research project world policy institute wpi center advanced studies sci tech policy cas | [
181,
287,
2384,
5149,
6208,
3037,
2879,
1047,
2251,
4550,
1698,
6862,
1805
] | Test |
5,786 | 2 | Cocoa_(API):cocoa api | [
6788,
7517,
1445,
3940,
713,
379,
6428,
3955,
2202,
1840,
26,
2568,
4690,
734,
405,
6116,
6832,
3989,
2597,
7573,
3322,
3663,
1502,
2609,
5787,
1895,
4740,
1897,
4017,
5091,
445,
5450,
6505,
1152,
1154,
2627,
7609,
5101,
4759,
1171,
263... | Test |
5,787 | 2 | GNUstep:gnustep gnustep free software implementation cocoa formerly openstep objective-c frameworks widget toolkit application development tools unix-like operating systems microsoft windows part gnu project gnustep features cross-platform object-oriented ide apart default objective-c interface gnustep also bindings java ruby gnu guile scheme gnustep developers track additions apple cocoa remain compatible roots gnustep application interface roots cocoa nextstep openstep gnustep thus predates cocoa emerged apple acquired next technology incorporated development original mac os x gnustep initially effort gnu developers replicate technically ambitious nextstep programmer-friendly features gnustep began paul kunz others stanford linear accelerator center wanted port hippodraw nextstep another platform instead rewriting hippodraw scratch reusing application design decided rewrite nextstep object layer application depended first version libobjcx enabled port hippodraw unix systems running x window system without changing single line application source openstep specification released public 1994 decided write new objcx would adhere new apis software would become known gnustep gnustep contains set graphical control elements written objective-c programming language graphical user interface gui gnumail composed graphics control elements gnumail interact windowing system e.g x11 wayland graphical user interface rendered gnustep backend provides small set functions used user interface library interface actual windowing system also rendering engine emulates common postscript functions package gnustep-back provides following backends gnustep inherits design principles proposed openstep gnustep predates cocoa cocoa based openstep well objective-c language examples applications written ported gnustep foundation kit provides basic classes wrapper classes data structure classes application kit provides classes oriented around graphical user interface capabilities | [
707,
6414,
7517,
1445,
6085,
6428,
2559,
2202,
1840,
2568,
405,
5757,
6116,
7559,
3981,
5065,
761,
7573,
2599,
5780,
5786,
1895,
4017,
5091,
5450,
4020,
1152,
6159,
1154,
1523,
2985,
6876,
5101,
4759,
2639,
5116,
7259,
3368,
2300,
486,
... | Train |
5,788 | 2 | How_does_one_patch_KDE2_under_FreeBSD?:one patch kde2 freebsd one patch kde2 freebsd internet meme russian internet culture question originally posted anime channel rusnet irc network may 8 2004 original post followed translation здравствуйте это канал об аниме -- да -- как мне пропатчить kde2 под freebsd hello anime channel — yes — patch kde2 freebsd first question rhetorical satirized disproportionate amount technical geeky conversations often occurring channel nothing anime later popularized became widely cited russophone chats 2006 phenomenon first received public attention asked many people prior july 6 online conference russian president vladimir putin due provoking campaigns became third popular question proposed asked conference first preved vladimir vladimirovich regard medved however hosts ask question 2007 revived number one frequently asked question similar conference president kazakhstan nursultan nazarbayev nazarbayev answered question seriously describing developments industry kazakhstan possible use open-source software december 2007 question became popular one preceding internet conference ukrainian president viktor yushchenko gave answer saying programmers secretariat able help patch kde2 different operating systems also recommended adoption newer software possible reference existence kde3 time february 2014 openbsd ports developer gave overview linux vacation eastern europe conference belarus patch kde4 openbsd reviving long-lived meme new light | [] | Validation |
5,789 | 6 | Mkfs:mkfs computer operating systems mkfs command used format block storage device specific file system command part unix unix-like operating systems unix block storage device must formatted file system mounted accessed operating system filesystem hierarchy command originally implemented first version unix method initialize either dectape using argument rk03 disk pack using r argument initialization process would write formatting data device contained empty file system created super-block i-list free list storage device established root directory entries .. self parent respectively rk03 disk packs 4872 available blocks initialization tapes 578 blocks 512 bytes/block mkfs executable kept /etc directory instead binary directory would inadvertently called destroy information later implementations unix-like operating systems included mkfs command including hp-ux minix sunos linux basic syntax command common modern implementations 'codice_1 type filesystem 'codice_2 target unix device write filesystem data usually device drive partition often command simply wrapper another command performs formatting specific file system example would call command codice_3 passing along appropriate arguments format device codice_4 ext3 filesystem default options command stored file codice_5 usually codice_6 directory depending implementation specific file system requested command may many options specified inode size block size volume label features see file system details filesystem-specific commands mkfs calls may invoked directly user command line linux convention name filesystem-specific commands codice_7 codice_8 abbreviation file system e.g. codice_9 codice_10 codice_11 etc file systems supported command vary implementation include msdos sco bfs cpm ext2 ext3 ext4 minix fat vfat hfs vxfs rf disk rk disk dectape ntfs | [
2717,
361,
6789,
2817,
1537,
900,
5480,
3106,
5571,
8092,
578,
923,
5138,
667,
7378,
5946,
2589,
6033,
7667,
4987,
4447,
346,
1793,
3417,
3587,
6404,
4283,
4020
] | Test |
5,790 | 4 | Firewall_pinhole:firewall pinhole computer networking firewall pinhole port protected firewall allow particular application gain access service host network protected firewall leaving ports open firewall configurations exposes protected system potentially malicious abuse fully closed firewall prevents applications accessing services side firewall protection mechanism opening pinhole firewall implement user validation authorization firewalls performing network address translation nat function mapping external ip address port socket internal ip address port socket often called pinhole pinholes created manually programmatically temporary created dynamically specific duration dynamic connection permanent signaling functions firewalls sometimes automatically close pinholes period time typically minutes minimize security exposure applications require pinhole kept open often need generate artificial traffic pinhole order cause firewall restart timer | [
2128,
8,
2231,
2681,
1354,
2664
] | Validation |
5,791 | 8 | Website_correlation:website correlation website correlation website matching process used identify websites similar related websites inherently easy duplicate led proliferation identical websites similar websites purposes ranging translation internet marketing especially affiliate marketing internet crime locating similar websites inherently problematic may different languages different servers different countries different top-level domains website correlation used several known types correlation demonstrating different strengths weaknesses practical website correlation process may require combining two methods save time effort website owners duplicate major portions website code across many domains similarity code structure provide enough information correlation organizations known publicly search-able databases kind correlation include note websites sometimes utilize structure relationship websites coincidentally utilize content management system also known correlated reverse dns lookup websites may served server one ip address one subnet several organizations retain archives ip address data correlate data examples include note correlation via method may misleading websites frequently exist server aka shared hosting relationship websites may authored person organization website owners required provide contact information registrar obtain domain name domain ownership determined via whois protocol provides mechanism searching correlating ownership several organizations retain archives whois information provide searching correlation services examples include note website ownership information falsified outdated hidden public view website correlation via method accurate misleading impossible depending information contained whois records search engines provide search-able databases indexed website content search engine results lists correlated content similarity note method correlation inherently slow one must guess phrases search also related websites may contain literally similar content site translated another language websites frequently categorized tagged similarly via automated manual means examples publicly accessible website categorization databases include note manual categorization tag metadata methods inherently subjective automated categorization tagging methods inherently subject varying weaknesses strengths underlying categorization algorithms tracking ids used analytics affiliate identification frequently embedded website code ids used correlation imply common management websites publicly available websites correlating tracking id include | [
4600
] | Test |
5,792 | 1 | Merchant_Navy_(United_Kingdom):merchant navy united kingdom merchant navy maritime register united kingdom comprises seagoing commercial interests uk-registered ships crews merchant navy vessels fly red ensign regulated maritime coastguard agency mca king george v bestowed title merchant navy british merchant shipping fleets following service first world war number nations since adopted title merchant navy existence significant period english british history owing growth trade imperial expansion dated back 17th century attempt made register seafarers source labour royal navy times conflict registration merchant seafarers failed successfully implemented 1835 merchant fleet grew successive years become world foremost merchant fleet benefiting considerably trade british possessions india far east lucrative trades sugar contraband opium china spices tea carried ships cutty sark helped entrench dominance 19th century first second world wars merchant service suffered heavy losses german u-boat attacks policy unrestricted warfare meant merchant seafarers risk attack enemy ships tonnage lost u-boats first world war around 7,759,090 tons around 14,661 merchant seafarers killed honour sacrifice made merchant seafarers first world war george v granted title merchant navy companies 1928 george v gave edward prince wales title master merchant navy fishing fleets retained accession throne january 1936 relinquished abdication december since edward viii title held sovereigns george vi elizabeth ii united kingdom british empire entered second world war september 1939 george vi issued message anxious days would like express officers men british merchant navy british fishing fleets confidence unfailing determination play vital part defence one would say task less essential people experience allotted navy army air force upon nation depends much foodstuffs raw materials transport troops overseas long glorious history proud bear title master merchant navy fishing fleets know carry duties resolution fortitude high chivalrous traditions calling safe hands god keep prosper great task second world war german u-boats sank nearly 14.7 million tons allied shipping amounted 2,828 ships around two thirds total allied tonnage lost united kingdom alone suffered loss 11.7 million tons 54 total merchant navy fleet outbreak second world war 32,000 merchant seafarers killed aboard convoy vessels war along royal navy convoys successfully imported enough supplies allow allied victory honour sacrifices made two world wars merchant navy lays wreaths remembrance alongside armed forces annual remembrance day service 11 november following many years lobbying bring official recognition sacrifices made merchant seafarers two world wars since merchant navy day became official day remembrance 3 september 2000 ensigns displayed stern vessel displayed gaff yardarm red ensigns defaced flown warrant onboard vessel house flags personal designed company displayed port halyard yardarm despite maintaining dominant position many decades decline british empire rise use flag convenience foreign competition led decline merchant fleet example 1939 merchant navy largest world 33 total tonnage 2012 merchant navy — yet still remaining one largest world — held 3 total tonnage 2010 merchant navy consisted 504 uk registered ships addition uk merchant marine interests possessed 308 ships registered countries 271 foreign-owned ships registered uk 2012 british merchant marine interests consisted 1,504 ships included ships either directly uk-owned parent-owned managed british company amounted alternatively according annual maritime shipping statistics provided british government department transport signatory stcw convention uk ships commanded deck officers engineering officers officers undergo 3 years training known cadetship one approved maritime colleges united kingdom include warsash maritime academy south tyneside college fleetwood plymouth university city glasgow college cadets usually choice two academic routes foundation degree higher national diploma successful completion results qualification marine operations marine engineering generally costs cadetship met sponsorship uk shipping company three years training cadets also go sea period year usually spread across cadetship affords practical education along academic time college prepares candidate separate final oral exam oral exam carried master mariner office maritime coastguard agency successful completion oral exam result award certificate competency international qualification issued uk government allows officer work qualified capacity onboard ship certificates issued different ranks officer usually return complete subsequent series studies reach highest qualification first uk deck officer certificates competency issued 1845 conducted final oral exam master mariner training regime officers set official syllabus merchant navy training board training still encompasses traditional trades celestial navigation ship stability general cargo seamanship includes training business legislation law computerisation deck officers marine engineering principles workshop technology steam propulsion motor diesel propulsion auxiliaries mechanics thermodynamics engineering drawing ship construction marine electrics well practical workshop training engineering officers historically person wishing become captain master prior 1973 five choices attend one three elite naval schools age 12 fixed-base hms conway hms worcester pangbourne nautical college would automatically lead apprenticeship seagoing cadet officer apply one several training programmes elsewhere go sea immediately applying directly merchant shipping company age 17 would three years prior training four years without seagoing experience aboard ship work-clothes mates deck crew direction bo'sun cleaning bilges chipping paint polishing brass cement washing freshwater tanks holystoning teak decks studying navigation seamanship bridge uniform direction officer taking exams become second mate historically composition crew uk ships diverse characteristic extant shipping companies trade extent british empire availability crew different ports one ship might largely british crew another might crew composed many indians chinese african sailors crews outside britain usually drawn areas ship traded far east trading ships either singapore hong kong crews banana boats west indian crews ships trading west africa southern africa african crews ships trading indian ocean including east africa crews indian subcontinent crews made recruits britain commonly used ships trading across north atlantic south america australia new zealand traditionally still ships crew run bosun overseen responsible deck officer usually chief mate ship may also different sub-departments galley radio department hospitality services overseen chief cook radio officer chief steward many roles changed ships crews become smaller commercial shipping ships radio department disappeared along radio officer colloquially known 'sparks replaced changes technology requirement stcw convention deck officers hold individual certification gmdss system electro-technical officers eto also serve aboard ships trained fix maintain complex systems number notable merchant navy personnel include members uk merchant navy awarded victoria cross george cross george medal distinguished service order distinguished service cross actions serving merchant navy canadian philip bent ex-british merchant navy joined british army outbreak world war victoria cross members merchant navy served either world war also received relevant campaign medals second world war many merchant navy members received king commendation brave conduct lloyd london awarded lloyd war medal bravery sea 541 merchant navy personnel bravery 1939–45 many royal humane society medals awards conferred merchant navy seafarers acts humanity war peacetime september 2016 uk government introduced merchant navy medal meritorious service medal awarded serving served merchant navy fishing fleets uk isle man channel islands exemplary service devotion duty rewarding set outstanding example others first state award meritorious service history merchant navy recipients must nominated someone least two written letters support normally required completed 20 years service merchant navy although exceptional circumstances may less british merchant navy consists various private shipping companies decades many companies come gone merged changed name changed owners british shipping represented nationally globally uk chamber shipping headquartered london list british shipping companies past present | [
2188
] | Test |
5,793 | 7 | Sinch_(company):sinch company sinch telecommunications cloud communications platform service paas company headquartered stockholm sweden sinch also offices 30 cities worldwide including atlanta london madrid san francisco singapore sydney sinch initially founded may 2014 andreas bernström stockholm san francisco originally technology behind rebtel sinch spun-out 12 million funding focusing mobile first app developer market sinch launched voice instant messaging products may 2014 quickly launched sms api product end 2014 2016 clx communications acquired sinch total consideration sek 138.9 million debt-free basis founded 2008 clx acquired numerous companies industry 2009 2018 february 2019 announced clx launched new corporate brand visual identity unify business units name acquiring sinch 2016 leveraged brand name encompass entire company accurately immediately depict current offerings mission sinch effectively inherited history clx communications considered different brand one launched 2014 clx completed initial public offering ipo listed nasdaq stockholm october 2015 since february 2019 company found mid cap list technology sector ticker 'sinch sinch platform based voice ip webrtc pstn sms verification instant messaging technologies power products provides sdk developers add app get access sinch product range available ios android javascript since sinch brand name leveraged clx communications product portfolio grown encompass services rich communications services rcs thanks strategic partnership clx google 2017 well operator portfolio inherited symsoft company acquired clx 2009 sinch listed lead411 2014 hottest san francisco companies ceo founder andreas announced one 9 innovative people voip 2014 | [
6228
] | Validation |
5,794 | 2 | Windows_XP_editions:windows xp editions windows xp released several editions since original release 2001 windows xp available many languages addition add-ons translating user interface also available certain languages first two editions released microsoft windows xp home edition designed home users windows xp professional designed business power users windows xp professional offers number features unavailable home edition including march 2004 european commission fined microsoft €497 million £395 million 784 million ordered company provide version windows without windows media player commission concluded microsoft broke european union competition law leveraging near monopoly market pc operating systems onto markets work group server operating systems media players unsuccessful appeals 2004 2005 microsoft reached agreement commission would release court-compliant version windows xp edition n. version include company windows media player instead encourages users pick download media player microsoft wanted call version reduced media edition eu regulators objected suggested edition n name n signifying media player home professional editions windows xp sold price version windows media player included dell hewlett-packard lenovo fujitsu siemens chosen stock product however dell offer operating system short time consumer interest low roughly 1,500 units shipped oems reported sales consumers n editions windows xp also include windows movie maker microsoft made available separate download december 2005 korean fair trade commission ordered microsoft make available editions windows xp windows server 2003 contain windows media player windows messenger like european commission decision decision based grounds microsoft abused dominant position market push products onto consumers unlike decision however microsoft also forced withdraw non-compliant versions windows south korean market k kn editions windows xp home edition professional edition released august 2006 available english korean editions contain links third-party instant messenger media player software edition windows xp home intended sale certain low-cost netbooks appear labeled windows xp home edition ulcpc ulcpc standing ultra-low-cost personal computer version comes preinstalled oem solutions providing desktops blade pc hardware addition copy windows xp professional includes remote desktop license windows xp starter edition lower-cost version windows xp available thailand vietnam turkey indonesia india philippines russia colombia brazil argentina peru bolivia chile mexico ecuador uruguay malaysia venezuela similar windows xp home limited low-end hardware run 3 programs time features either removed disabled default according microsoft press release windows xp starter edition low-cost introduction microsoft windows xp operating system designed first-time desktop pc users developing countries starter edition includes special features certain markets consumers may computer literate found home edition include localised help features may speak english country-specific computer wallpaper screensavers default settings designed easier use typical windows xp installations malaysian version example contains desktop background kuala lumpur skyline addition starter edition also unique limitations prevent displacing expensive versions windows xp three applications run starter edition application may open maximum three windows maximum screen resolution 1024×768 support workgroup networking domains addition starter edition licensed low-end processors like intel celeron amd duron sempron also 512 mb limit main memory 120 gb disk size limit microsoft made clear however total disk space per partition per disk also fewer options customizing themes desktop taskbar october 9 2006 microsoft announced reached milestone 1 million units windows xp starter edition sold mass market however starter edition much success many markets available pirated versions higher end versions windows popular legal counterparts markets non-genuine copies xp professional obtained mall stores typically charge amount cds/dvds taken files original retail value unlicensed copies windows xp professional typically cost 0.70 since uses 1 cd compared around 30 properly licensed copy xp starter edition code-named freestyle development first released september 2002 initial release available solely conjunction computers included media center capabilities could purchased separately first major update released 2004 distributed tier 1 oems previously sold windows xp media center edition pc updated 2005 first edition available system builders many features windows xp media center edition 2005 including screen dancers auto playlist dj high end visual screen savers taken windows xp plus packages originally shipped add-ons windows xp enhance users experience windows xp machine preview version windows xp media center edition microsoft ehome division shown ces 2002 final version released july 2002 2005 release microsoft focused efforts building new media center features home premium ultimate editions windows vista windows 7 windows media center built-in unlike releases windows xp media center edition available retail purchase without necessary hardware notable feature unique edition windows media center provides large-font remotely accessible interface 10-foot user interface television viewing computer well recording playback tv guide dvd playback video playback photo viewing music playback unlike competing commercial digital video recorder products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft sell media center edition retail markets alongside home professional editions microsoft distributes msdn subscribers oem system builders certain countries consumers generally purchase media center pre-installed new computer reseller sells oem versions microsoft software media center edition consumer-oriented edition windows xp updated new features annual basis five-year development windows vista mce 2005 release example includes update windows movie maker supports burning dvds new visual style called royale support media center extenders soundspectrum g-force sound visualizations microsoft also released remote control receiver infrared blaster mce 2005 new specially designed wireless computer keyboard mce 2005 released september 2005 using media center extenders xbox 360 media center edition also able connect stream recorded tv music pictures network connection media center edition retains features included windows xp professional simply add-on professional installed provided valid mce product key setup professional features left including remote desktop encrypting file system however ability join active directory domain removed marketed home product need domain support one value registry needed circumvent restriction installation mce 2005 in-place upgrade previous version already joined domain ability retained unless user uses windows media center extender case ability lost restored presumably microsoft introduced limit media center extender devices introduced version rely fast user switching component component must disabled order join domain media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface originally required hardware mpeg-2 encoder closed caption support number features media center remote controls standardized terms button labels functionality degree general layout edition intended specially designed notebook/laptop computers called tablet pcs windows xp tablet pc edition compatible pen-sensitive screen supporting handwritten notes portrait-oriented screens except msdn volume license subscribers windows xp tablet edition could purchased separately tablet pc edition superset windows xp professional difference tablet functionality including alternate text input tablet pc input panel basic drivers support tablet pc specific hardware requirements install tablet pc edition include tablet digitizer touchscreen device hardware control buttons including ctrl-alt-delete shortcut button scrolling buttons least one user-configurable application button two releases service pack 2 windows xp includes tablet pc edition 2005 free upgrade version brought improved handwriting recognition improved input panel allowing used almost every application input panel also revised extend speech recognition services input correction applications windows xp tablet pc edition based windows xp professional includes software features provided addition includes following components following downloadable packs released microsoft add functionality windows xp tablet pc edition utilizes ink object means data input storage data type created part windows xp tablet pc edition api allows users manipulate process handwritten data including recognition results cases pressure information part stroke properties ink changed much way properties objects data saved allow future reference many applications referencing ink object also allow handwritten notes filtered searched based recognition results stored ink saved integrated operating system tablet pc input panel tip allows handwriting converted text use non-full-screen applications integrated handwriting recognition windows xp tablet pc edition 2005 recognize print cursive mixed writing accuracy increased configuring recognizer expect left-handed writing right-handed writing recognition variety languages available install recognizer pack handwriting engine trained recognize particular handwriting style user must modify handwriting better recognized system order use feature effectively speech recognition functionality also incorporated tablet input panel compared previous versions substantially improved speech recognition engine version 6 also ships office 2003 tutorial microphone wizard training modules included possible dictate text using speech certain supported applications control windows gui applications using speech although accuracy improvements made windows vista surpass features update windows xp tablet pc edition containing ink analysis stylusinput api support introduced windows vista also available 2006 microsoft made available two additional editions windows xp home edition hardware manufacturers wanted provide subscription-based pay go-based models selling computers editions named windows xp home edition subscription computers windows xp home edition prepaid computers respectively part microsoft flexgo initiative described company-issued press release making pcs accessible dramatically reducing entry cost enabling customers pay computer use purchase prepaid cards market trials starting first emerging markets inadequate access consumer credit unpredictable income high entry costs prevent many consumers purchasing computer editions targeted towards emerging markets india brazil hungary vietnam editions contain additional components enforce subscription models via metering metering typically enforced hardware component prevent tampering installation windows operates normal mode limited access mode hardware locked mode depending state subscription computer positive time balance operates normal mode functions regular windows xp home edition machine time balance expires machine operate limited access mode amount time set hardware manufacturer five hours default entering hardware locked mode limited access mode screen uses high-contrast low-resolution display settings hardware locked mode operating system disabled entirely message displayed boot-up instructions re-enable machine two distinct editions windows xp released support 64-bit hardware windows xp 64-bit edition designed run intel itanium family microprocessors native ia-64 mode two versions windows xp 64-bit edition released edition discontinued january 2005 hewlett-packard last distributor itanium-based workstations stopped selling itanium systems marketed 'workstations july 2005 windows xp 64-bit edition longer supported security updates made available windows xp 64-bit edition marketed itanium version microsoft windows xp editions instead separate edition made solely itanium processor 64-bit instructions mostly analogous windows xp professional numerous older technologies dao jet database ntvdm windows windows longer present support ms-dos win16 applications absent original version also lacks media applications windows media player netmeeting windows movie maker integrated cd burning although wmp netmeeting added 2003 version similar ability previous alternate architecture ports windows windows nt 4.0 powerpc mips r4x00 alpha run 16-bit x86 code via windows windows windows xp 64-bit edition run standard x86 32-bit applications wow64 windows-on-windows 64-bit emulation layer original itanium processor contains on-chip ia-32 decoder deemed far slow serious use running 400 mhz microsoft intel wrote software 32 64-bit translator dubbed ia-32 execution layer allows real time translation x86 32-bit instructions ia-64 instructions allowing 32-bit applications run albeit significantly slowly native code edition supports x86-64 extension intel ia-32 architecture x86-64 implemented amd amd64 found amd opteron athlon 64 chips selected sempron processors implemented intel intel 64 formerly known ia-32e em64t found intel pentium 4 intel later chips released april 25 2005 windows xp professional x64 edition uses version 5.2.3790.1830 core operating system binaries version used windows server 2003 sp1 latest versions operating system development even service packs updates windows xp x64 windows server 2003 x64 distributed unified packages much manner windows 2000 professional server editions x86 initial development phases 2003–2004 windows xp professional x64 edition named windows xp 64-bit edition x86 extended systems later windows xp 64-bit edition extended systems opposed 64-bit edition itanium systems rtm version windows xp professional x64 edition based windows server 2003 service pack 1 codebase reason service pack 2 windows xp x64 edition released march 13 2007 service pack 2 32-bit versions windows xp fact due earlier release date 32-bit version many key features introduced service pack 2 32-bit x86 editions windows xp already present rtm version 64-bit x86-64 counterpart service pack 2 first last released service pack windows xp professional x64 edition windows xp professional x64 edition uses technology named windows-on-windows 64-bit wow64 permits execution 32-bit x86 applications first employed windows xp 64-bit edition itanium reused x64 editions windows xp windows server 2003 since x86-64 architecture includes hardware-level support 32-bit instructions wow64 switches processor 32- 64-bit modes according microsoft 32-bit software running wow64 similar performance executing 32-bit windows fewer threads possible overheads 32-bit processes shown *32 task manager 64-bit processes extra text present although 32-bit applications run transparently mixing two types code within process allowed 64-bit application link 32-bit library dll similarly 32-bit application link 64-bit library may lead need library developers provide 32- 64-bit binary versions libraries windows xp x64 edition includes 32- 64-bit versions internet explorer 6 order allow possibility third-party browser plugins activex controls may yet available 64-bit versions older 32-bit drivers services supported 64-bit windows video audio codecs xvid oggds 32-bit dlls supported long media player uses 32-bit well 64-bit windows include ntvdm windows windows native support execution ms-dos 16-bit windows applications written windows 3.1 primary benefit moving 64-bit increase maximum allocatable virtual memory single standard process 32-bit windows operating system limited total 2,093,056 kilobytes 2gb minus one 4kb page large address aware 32-bit processes allocate 4gb windows xp x64 support much memory although theoretical memory limit 64-bit computer address 16exabytes windows xp x64 limited 128gb physical memory 8 terabytes virtual memory per process practical limit usually size pagefile windows xp professional x64 edition windows xp 64-bit edition version 2003 releases windows xp include internet information services 6.0 matches version shipped windows server 2003 versions xp include 5.1 64-bit versions windows xp also immune certain types viruses malware target 32-bit systems since system files 64-bit extra registers x86-64 architecture result performance improvements certain kinds applications often result slight decrease performance compared application implemented 32 bit x86 code running windows xp 32 bit editions microsoft released number editions windows xp targeted towards developers embedded devices use specific consumer electronics set-top boxes kiosks/atms medical devices arcade video games point-of-sale terminals voice internet protocol voip components editions belong windows embedded subfamilies windows xp embedded systems binary identical windows xp professional licensed embedded devices windows xp embedded commonly abbreviated xpe componentized version professional edition windows xp original equipment manufacturer free choose components needed thereby reducing operating system footprint also reducing attack area compared xp professional unlike windows ce microsoft operating system portable devices consumer electronics xp embedded provides full windows api support full range applications device drivers written microsoft windows system requirements state xpe run devices least 32 mb compact flash 32 mb ram p-200 microprocessor xpe released november 28 2001 october 2008 newest release windows xp embedded service pack 3 devices targeted xpe included automatic teller machines arcade games slot machines cash registers industrial robotics thin clients set-top boxes network attached storage nas time clocks navigation devices railroad locomotives etc custom versions os deployed onto anything full-fledged pc even though xpe supports hardware xp professional supports x86 architecture licensing restrictions prevent deployed standard pcs however microsoft made exceptions rule allowing xpe alongside standard oem install windows dell notebooks contain embedded xp installation part mediadirect 2.0 feature also found acer ones well samsung q1 windows embedded standard 2009 succeeded xpe 2h 2008 windows embedded standard 2009 derived windows xp embedded since microsoft time development componentized version windows vista windows embedded standard 2009 includes silverlight .net framework 3.5 internet explorer 7 windows media player 11 rdp 6.1 network access protection microsoft baseline security analyzer support managed windows server update services system center configuration manager windows embedded standard 7 succeeded windows embedded standard 2009 april 2010 componentized version windows 7 windows embedded point service wepos specialization windows xp embedded released may 25 2005 focuses point sale device market fuel pumps self checkout stations automated teller machines cash registers available purchase directly microsoft instead licensed original equipment manufacturers windows embedded posready 2009 succeeded wepos january 2009 windows embedded posready 2009 derived wepos since microsoft time development componentized version windows vista windows embedded posready 7 succeeded windows embedded posready 2009 july 2011 based windows 7 sp1 july 2006 microsoft introduced thin-client variant windows xp embedded called windows fundamentals legacy pcs targets older machines early original pentium available software assurance customers intended would like upgrade windows xp take advantage security management capabilities afford purchase new hardware windows thin pc succeeded windows fundamentals legacy pcs june 2011 based windows embedded standard 7 sp1 | [
4293,
2187,
3962,
2564,
4687,
1097,
5391,
740,
7553,
5055,
2226,
5068,
2240,
6136,
424,
5781,
5442,
4377,
4017,
444,
6158,
447,
7956,
448,
458,
4759,
7616,
1536,
4400,
474,
5486,
140,
7660,
1582,
2326,
2329,
3048,
6575,
6580,
7685,
1237... | Test |
5,795 | 8 | Secure-adaptive_architecture:secure-adaptive architecture pertaining web services secure-adaptive architecture saa refers particular approach towards security management issues inherent data transfer computer networks relating certain services micropayments saa personal information end-user name banking information personal identity numbers social security numbers retained two main benefits end-user chance identity theft fraud considerably reduced service provider means direct communication end-user financial institution unnecessary saa uses best class proven security techniques ensure safe transfer data network resources include protocols ssl communications client-side authentication aes encryption saa requires consistent pervasive real-time monitoring network resources ensure security | [
3794,
6986
] | Test |
5,796 | 4 | Banburismus:banburismus banburismus cryptanalytic process developed alan turing bletchley park britain second world war used bletchley park hut 8 help break german kriegsmarine naval messages enciphered enigma machines process used sequential conditional probability infer information likely settings enigma machine gave rise turing invention ban measure weight evidence favour hypothesis concept later applied turingery methods used breaking lorenz cipher aim banburismus reduce time required electromechanical bombe machines identifying likely right-hand middle wheels enigma hut 8 performed procedure continuously two years stopping 1943 sufficient bombe time became readily available banburismus development clock method invented polish cryptanalyst jerzy różycki hugh alexander regarded best banburists i. j good considered process intellectual game job easy enough trivial difficult enough cause nervous breakdown first months arriving bletchley park september 1939 alan turing correctly deduced message-settings kriegsmarine enigma signals enciphered common grundstellung starting position rotors super-enciphered bigram trigram lookup table trigram tables book called kenngruppenbuch k book however without bigram tables hut 8 unable start attacking traffic breakthrough achieved narvik pinch disguised armed trawler polares way narvik norway seized north sea 26 april 1940 germans time destroy cryptographic documents captured material revealed precise form indicating system supplied plugboard connections grundstellung 23 24 april operators log gave long stretch paired plaintext enciphered message 25th 26th bigram tables part capture hut 8 able use settings-lists read retrospectively kriegsmarine traffic intercepted 22 27 april allowed partial reconstruction bigram tables start first attempt use banburismus attack kriegsmarine traffic 30 april onwards eligible days least 200 messages received partial bigram-tables deciphered indicators first day broken 8 may 1940 thereafter celebrated foss day honour hugh foss cryptanalyst achieved feat task took november year time intelligence date show banburismus could work also allowed much bigram tables reconstructed turn allowed 14 april 26 june broken however kriegsmarine changed bigram tables 1 july end 1940 much theory banburismus scoring system worked first lofoten pinch trawler krebs 3 march 1941 provided complete keys february – bigram tables k book consequent decrypts allowed statistical scoring system refined banburismus could become standard procedure kriegsmarine enigma mid-1943 banburismus utilised weakness indicator procedure encrypted message settings kriegsmarine enigma traffic unlike german army airforce enigma procedures kriegsmarine used grundstellung provided key lists messages particular day pair days meant three-letter indicators enciphered rotor settings depth normally indicators two messages never could happen part-way message rotor positions became starting position rotors another message parts two messages overlapped way depth principle behind banburismus relatively simple seems rather similar index coincidence two sentences english german written one count made often letter one message corresponding letter message matches would occur sentences random strings letters random sequence repeat rate single letters expected 1 26 around 3.8 german navy messages shown 1 17 5.9 two messages depth matches occur plaintexts however messages depth two ciphertexts compare random giving repeat rate 1 26 allows attacker take two messages whose indicators differ third character slide looking giveaway repeat pattern shows align depth comparison two messages look repeats made easier punching messages onto thin cards 250 mm high 10 several metres wide different cards different lengths message hole top column card represented position hole bottom represented z two message-cards laid top light-box light shone repeat made much simpler detect count repeats cards printed banbury oxfordshire became known 'banburies bletchley park hence procedure using banburismus application scritchmus procedure see gives clue possible right-hand rotor message indicator vfg xcybgdslvwbdjlkwipehvygqzwdthrqxikeesqsspzxarixeabqiruckhgwuebpf message indicator vfx ynscfccpvipemsgizwflhesciyspvrxmcfqaxvxdvuqilbjuabnlkmkdjmenunq hut 8 would punch onto banburies count repeats valid offsets −25 letters +25 letters two promising positions offset eight letters shows nine repeats including two bigrams overlap 56 letters 16 promising position looks like offset seven shows single trigram overlap 57 letters turing method accumulating score number decibans allows calculation situations likely represent messages depth might expected former winner odds 5:1 latter 2:1 turing calculated scores number single repeats overlaps many letters number bigrams trigrams tetragrams often represented german word plaintext scores calculated according type message traffic analysis even position within message tabulated relevant values summed banburists assessing pairs messages see likely depth bletchley park used convention indicator plaintext vfx eight characters ahead vfg terms third differing letter x g+8 scritchmus part banburismus procedure could lead identification right-hand fast wheel banburist might evidence various message-pairs third indicator letter differing showing x q−2 h x−4 b g+3 would search deciban sheets distances odds better 1:1 i.e scores ≥ +34 attempt made construct 'end wheel alphabet forming 'chains end-wheel letters repeats could construct chain follows compared progressive offsets known letter-sequence enigma rotor quite possibilities discounted due violating either reciprocal property no-self-ciphering property enigma machine so-called end-wheel alphabet already limited nine possibilities merely establishing letter-chain five letters derived mere four message-pairs hut 8 would try fitting letter-chains — ones letters common first chain — nine candidate end-wheel alphabets eventually hope left one candidate maybe looking like end-wheel alphabet forces conclusion end wheel fact rotor rotor ii would caused mid-wheel turnover stepped e f yet middle span letter-chain f -- -- -- -- -o likewise possible mid-wheel turnovers precluded rotor turnover q r part alphabet spanned chain different enigma wheels different turnover points presumably measure designers machine improve security however complication allowed bletchley park deduce identity end wheel end wheel identified principles extended handle middle rotor though added complexity search overlaps message-pairs sharing first indicator letter overlaps could therefore occur 650 characters apart workload beyond manual labour bp punched messages onto 80-column cards used hollerith machines scan tetragram repeats better told banburies set light boxes overlap evaluate whole repeat pattern armed set probable mid-wheel overlaps hut 8 could compose letter-chains middle wheel much way illustrated end wheel turn scritchmus would give least partial middle wheel alphabet hopefully least possible choices rotor middle wheel could eliminated turnover knowledge done identifying end wheel taken together probable right hand middle wheels would give set bombe runs day would significantly reduced 336 possible | [
6372,
1641,
4349,
1353,
5185,
928
] | Test |
5,797 | 2 | Optware:optware optware free software package manager embedded systems originally developed distribution mechanism unslung linux distribution linksys nslu2 optware adopted variety hobbyist communities device developers optware used number platforms including webos community working palm pre pixi wl-500g wl-hdd wl-500gx wl-500gp asus routers plug computers pogoplug v1 v2 pro biz dockstars etc asustor synology nas devices late 2010 first optware android released novaports team nook color optware packages currently run following devices | [
1521,
4317,
3559,
1581,
578,
4627,
7049
] | Test |
5,798 | 4 | Eric_Corley:eric corley eric gordon corley born december 16 1959 also frequently referred pen name emmanuel goldstein figure hacker community directs non-profit organization 2600 enterprises inc. publishes magazine called associated monthly meet-ups around world hosts hacker convention hackers planet earth hope pseudonym derived fictional opposition leader george orwell dystopian novel nineteen eighty-four 1993 corley testified united states house representatives subcommittee telecommunications corley questioned relation content 2600 part discussions concerning digital telephony bill also known communications assistance law enforcement act corley editor best 2600 hacker odyssey released july 2008 book consists articles magazine set chronological order show evolution internet technology follow-up book dear hacker letters editor 2600 published 2010 corley host weekly radio programs hook wbai-fm wall wusb-fm hook often includes panel guests frequently centered technological topics wall usually narrated eric corley covered wide range topics hook air since 1988 corley directed 2001 film freedom downtime documentary incarcerations kevin mitnick bernie also examines alleged distortions mainstream media coverage mitnick case | [
6568,
3486,
7050
] | Test |
5,799 | 3 | AMD_K8:amd k8 amd k8 hammer also code-named sledgehammer computer processor microarchitecture designed amd successor amd k7 athlon microarchitecture k8 first implementation amd64 64-bit extension x86 instruction set architecture processors based k8 core include k8 core similar k7 radical change integration amd64 instructions on-chip memory controller memory controller drastically reduces memory latency largely responsible performance gains k7 k8 perceived pc community use codename k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 amd refers codename k8 processors family 0fh processors 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0f h h represents hexadecimal numbering equals decimal number 15 10 h equals decimal number 16 k10h form sometimes pops improper hybrid k code family identifier number | [
2539,
5895,
5804,
4845,
5559,
4137,
5737,
7726,
5487,
5055,
6373,
1961,
5523,
694,
3747,
5436,
1237,
780,
352,
1797,
441,
2172
] | Train |
5,800 | 0 | Natural_Language_Toolkit:natural language toolkit natural language toolkit commonly nltk suite libraries programs symbolic statistical natural language processing nlp english written python programming language developed steven bird edward loper department computer information science university pennsylvania nltk includes graphical demonstrations sample data accompanied book explains underlying concepts behind language processing tasks supported toolkit plus cookbook nltk intended support research teaching nlp closely related areas including empirical linguistics cognitive science artificial intelligence information retrieval machine learning nltk used successfully teaching tool individual study tool platform prototyping building research systems 32 universities us 25 countries using nltk courses nltk supports classification tokenization stemming tagging parsing semantic reasoning functionalities | [
3931,
5429,
5965,
1444,
5304,
715,
1989,
2215,
1751,
4313
] | Test |
5,801 | 9 | Abstraction_principle_(computer_programming):abstraction principle computer programming software engineering programming language theory abstraction principle principle abstraction basic dictum aims reduce duplication information program usually emphasis code duplication whenever practical making use abstractions provided programming language software libraries principle sometimes stated recommendation programmer sometimes stated requirement programming language assuming self-understood abstractions desirable use origins principle uncertain reinvented number times sometimes different name slight variations read recommendation programmer abstraction principle generalized n't repeat principle recommends avoiding duplication information general also avoiding duplication human effort involved software development process recommendation programmer formulation benjamin c. pierce types programming languages 2002 abstraction principle reads emphasis original requirement programming language formulation david a. schmidt structure typed programming languages 1994 abstraction principle reads name abstraction principle appears long list books give necessarily incomplete list together formulation succinct principle plays central role design patterns object-oriented programming although writings topic give name principle influential book gang four states focus encapsulating concept varies theme many design patterns statement rephrased authors find varies encapsulate century principle reinvented extreme programming slogan definition principle rather succinct first appearance duplicate code later elaborated applicable issues software development automate every process worth automating find performing task many times script abstraction principle often stated context mechanism intended facilitate abstraction basic mechanism control abstraction function subroutine data abstractions include various forms type polymorphism elaborate mechanisms may combine data control abstractions include abstract data types including classes polytypism etc quest richer abstractions allow less duplication complex scenarios one driving forces programming language research design inexperienced programmers may tempted introduce much abstraction program—abstraction wo n't used complementary principle emphasize issue ai n't gon na need generally kiss principle since code usually subject revisions following abstraction principle may entail refactoring code effort rewriting piece code generically needs amortized estimated future benefits abstraction rule thumb governing devised martin fowler popularized rule three states piece code copied twice i.e would end three copies needs abstracted n't repeat dry principle generalization developed context multi-tier architectures related code necessity duplicated extent across tiers usually different languages practical terms recommendation rely automated tools like code generators data transformations avoid repetition addition optimizing code hierarchical/recursive meaning abstraction level programming also refers interfaces hardware communication layers also called abstraction levels abstraction layers case level abstraction often synonymous interface example examining shellcode interface higher lower level languages level abstraction changes operating system commands example c register circuit level calls commands example assembly binary case example boundary interface abstraction levels stack | [
2624,
1348,
3895,
8097,
1803
] | Test |
5,802 | 3 | MCDRAM:mcdram multi-channel dram mcdram pronounced em cee dee ram 3d-stacked dram used intel xeon phi processor codenamed knights landing version hybrid memory cube developed partnership micron competitor high bandwidth memory many cores xeon phi processors along associated vector processing units enable consume many gigabytes per second traditional dram dimms supply multi-channel part mcdram full name reflects cores many channels available access mcdram processors access attached dimms high channel count leads mcdram high bandwidth 400+ gb/s although latencies similar dimm access physical placement processor imposes limits capacity 16 gb launch much smaller capacity off-package dram 384gb memory partitioned boot time used cache distant ddr remainder mapped physical address space application request pages virtual memory assigned either distant ddr directly portion ddr cached mcdram portion mcdram used cache one way via thecodice_1 api used cache latency miss accessing mcdram ddr slightly higher going directly ddr applications may need tuned avoid excessive cache misses | [
2449,
2814,
6332,
6698,
3942,
3849,
4765,
6170,
3443,
6344,
8066,
7449,
7364,
3717,
3803,
1867,
3565,
766,
691,
5343,
6057,
4098,
352,
6152,
2351,
2977,
4108
] | Test |
5,803 | 2 | Linux_for_mobile_devices:linux mobile devices learned article linux range use linux kernel-based operating systems ubiquitously found diverse hardware platforms article linux mobile devices use linux kernel-based operating systems sorts mobile devices whose primary human interface device hid touchscreen mainly comprises smartphones tablet computers also mobile phones personal digital assistants pdas portable media players come touchscreen separately list many linux kernel-based operating systems used mobile devices differ one another parts middleware entire middleware employ individual uis | [
1807,
362,
3938,
2187,
3613,
6422,
7528,
3271,
2559,
1842,
1100,
6443,
740,
7555,
6117,
2240,
1904,
7956,
1522,
5453,
7242,
462,
1535,
108,
6892,
4400,
1176,
3384,
4435,
2329,
2689,
1227,
5530,
1989,
5540,
1260,
3780,
573,
578,
4877,
12... | Validation |
5,804 | 3 | Alchemy_(microarchitecture):alchemy microarchitecture alchemy microarchitecture low power microprocessor design developed alchemy semiconductor implementing mips32 instruction set mips technologies first processor implementing au1 central processing unit products include amd alchemy au1000 au1550 sun ray 2 family thin clients. several cowon pmp devices dell drac5 remote administration cards airport extreme base station embedded products networking sun microsystems 4g systems mtx-1 accesscube meshcube alchemy semiconductor fabless semiconductor company based austin texas founded may 2000 purchased license mips architecture mips32 instruction set mips technologies developed au1 microprocessor au1000 au1550 socs alchemy semiconductor acquired amd 2002 summer 2006 sold alchemy processor line raza microelectronics december 2007 raza microelectronics changed name rmi corporation june 2009 netlogic microsystems acquired rmi 183.4 million stock september 2011 broadcom acquired netlogic shares transaction valued around 3.7bn | [
2539,
2903,
5799,
5804,
6074,
551,
5208,
5559,
6865,
5917,
7726,
4234,
650,
5740,
7364,
5055,
1023,
1961,
4365,
4368,
694,
4370,
1237,
780,
536,
4372,
1797,
972,
2443,
2172
] | Test |
5,805 | 2 | ReadyBoost:readyboost readyboost codenamed emd disk caching software component developed microsoft windows vista included later versions windows operating system readyboost enables nand memory mass storage devices including compactflash sd cards usb flash drives used write cache hard drive random access memory effort increase computing performance readyboost relies superfetch technology like superfetch adjusts cache based user activity features including readydrive implemented manner similar readyboost using readyboost-capable flash memory nand memory devices caching allows windows vista later service random disk reads better performance without cache caching applies disk content page file system dlls flash devices typically slower mechanical hard disk sequential i/o maximize performance readyboost includes logic recognizes large sequential read requests hard disk service requests compatible device plugged windows autoplay dialog offers additional option use flash drive speed system additional readyboost tab added drive properties dialog amount space used configured minimum cache size 250 mb vista fat32 formatting drive maximum 4 gb windows 7 ntfs exfat formatting maximum cache size 32 gb per device windows vista allows one device used windows 7 allows multiple caches one per device total 256 gb readyboost compresses encrypts data placed flash device aes-128 microsoft stated 2:1 compression ratio typical 4 gb cache would usually contain 8 gb data device compatible useful must conform requirements considerations readyboost available windows server 2008 according jim allchin future releases windows readyboost able use spare ram networked windows pcs system 512 mb ram minimum requirement windows vista see significant gains readyboost one test case adding 1 gb readyboost memory sped operation 11.7 seconds 2 seconds however increasing physical memory ram 512 mb 1 gb without readyboost reduced 0.8 seconds system performance readyboost monitored windows performance monitor price ram decreased ram installed computers mitigations provided readyboost systems insufficient memory decreased core idea readyboost flash memory e.g usb flash drive ssd much faster seek time typical magnetic hard disk less 1 ms allowing satisfy requests faster reading files hard disk also leverages inherent advantage two parallel sources read data whereas windows 7 enables use eight flash drives allowing nine parallel sources usb 2.0 flash drives slower sequential reads writes modern desktop hard drives desktop hard drives sustain anywhere 2 10 times transfer speed usb 2.0 flash drives equal slower usb 3.0 firewire ieee 1394 sequential data usb 2.0 faster flash drives faster random access times typically around 1 ms compared 12 ms mainstream desktop hard drives laptop computers performance shifts favor flash memory laptop memory expensive desktop memory many laptops also relatively slow 4200 rpm 5400 rpm hard drives versions vista prior sp1 readyboost failed recognize cache data upon resume sleep restarted caching process making readyboost ineffective machines undergoing frequent sleep/wake cycles problem fixed vista sp1 since flash drives wear finite though large number writes readyboost eventually wear drive uses according microsoft windows client performance group drive able operate least ten years | [
458,
4759,
7242,
1534,
6528,
1640,
5571,
8092,
7552,
3468,
1571,
6952,
2710
] | Validation |
5,806 | 4 | Privacy_software:privacy software privacy software software built protect privacy users software typically works conjunction internet usage control limit amount information made available third parties software apply encryption filtering various kinds privacy software refer two different types protection one type protecting user internet privacy world wide web software products mask hide user ip address outside world order protect user identity theft second type protection hiding deleting users internet traces left pc surfing internet software erase users internet traces software hide encrypt user traces others using pc know surfing one solution enhance privacy software whitelisting whitelisting process company identifies software allow try recognize malware whitelisting permits acceptable software run either prevents anything else running lets new software run quarantined environment verify validity whereas whitelisting allows nothing run unless whitelist blacklisting allows everything run unless black blacklist includes certain types software allowed run company environment example company might blacklist peer-to-peer file sharing systems addition software people devices web sites also whitelisted blacklisted intrusion detection systems designed detect types malicious network traffic computer usage detected firewall systems capture network traffic flows examine contents packet malicious traffic encryption another form privacy security organizations secure channel sending information use encryption stop unauthorized eavesdroppers encryption process converting original message form read anyone except intended receiver steganography sometimes used hide messages eavesdropping e-surveillance privacy different anonymity applicability usage anonymity subordinate privacy might desired exchange retrieval publication specific information uses privacy software free legal issues instance regulations export cryptography united states similarly key disclosure law also requires individuals surrender cryptographic keys law enforcement agencies encryption laws india also carry many legal restrictions diverse situations. ref name= http //perry4law.co.in/blog/ p=67 /ref talks also pipeline include cyber security technologies like encryption related software wassenaar arrangement thereby making export cumbersome. ref name= http //perry4law.co.in/cyber_security/ p=61 /ref | [
474,
1998,
3644,
7214,
2566,
7846,
7836,
3338,
7910,
84,
5773,
3680,
1805
] | Test |
5,807 | 4 | ESafe:esafe esafe protect previously known eliashim antivirus line software security products developed eliashim ltd. based haifa israel. distributed esafe technologies inc. seattle usa eliashim acquired aladdin knowledge systems december 1998. esafe protect consumer desktop version distributed aladdin discontinued 2002 following years esafe brand evolved gateway-based fully featured content security product sold aladdin knowledge systems integrated security appliance march 2009 aladdin knowledge systems merged safenet inc. esafe evolved become safenet esafe content security product line | [
3357,
1395
] | Validation |
5,808 | 4 | Bitmessage:bitmessage bitmessage decentralized encrypted peer-to-peer trustless communications protocol used one person send encrypted messages another person multiple subscribers june 2013 software experienced surge new adoptions news reports email surveillance us national security agency bitmessage conceived software developer jonathan warren based design decentralized digital currency bitcoin software released november 2012 mit license bitmessage gained reputation reach warrantless wiretapping conducted national security agency nsa due decentralized nature protocol encryption difficult crack result downloads bitmessage program increased fivefold june 2013 news broke classified email surveillance activities conducted nsa bitmessage also mentioned experimental alternative email popular science cnet ransomware programs instruct affected users use bitmessage communicate attackers | [
3172,
3350,
4122,
3769,
1259,
7975,
4559,
1460,
7258,
7725,
2566,
5571,
1008,
7083,
1376,
5488,
1559,
2399,
1382,
744,
6025,
6458,
4616,
7753,
52,
5773,
2426,
4990,
7214,
6487,
7493,
5965,
6582,
5440,
4014,
177
] | Validation |
5,809 | 3 | Migration_(virtualization):migration virtualization context virtualization guest simulation entire computer actually merely software virtual machine vm running host computer hypervisor migration also known teleportation process running virtual machine moved one physical host another little disruption service ideally process completely transparent resulting disruption service downtime practice always minor pause availability though may low enough hard real-time systems affected virtualization far frequently used network services user applications generally tolerate brief delays may involved perceived impact similar longer-than-usual kernel delay actual process heavily dependent particular virtualization package use general process follows note practice regular maintenance operations required merge snapshot stack manageable number files improve performance optimize storage redundant overwrites merged migration similar failover capability virtualization suites provide true failover host may suddenly completely failed precludes latest state vm copied backup host however backup host everything except latest changes may indeed able resume operation last known coherent state operations similar systems provide one capability may provide | [
2442,
1438
] | Test |
5,810 | 1 | Rocket_U2:rocket u2 rocket u2 suite database management dbms supporting software owned rocket software includes two multivalue database platforms unidata universe products operating environments run current unix linux windows operating systems derivatives pick operating system family also includes developer web-enabling technologies including systembuilder/sb+ sb/xa u2 web development environment webde uniobjects wintegrate universe originally developed vmark software unidata originally developed unidata corporation universe unidata used vertical application development embedded vertical software applications 1997 unidata corporation merged vmark systems form ardent software march 2000 ardent software acquired informix ibm subsequently acquired database division informix april 2001 making universe unidata part ibm db2 product family ibm subsequently created information management group data management one sub-areas ibm u2 family comprised unidata universe along tools systembuilder extensible architecture sb/xa u2 web development environment u2 web de wintegrate 1 october 2009 announced rocket software purchased entire u2 portfolio ibm u2 portfolio grouped name rocketu2 systems made one accounts accounts directories stored host operating system initially contain set files needed system function properly includes system voc vocabulary file contains every command filename keyword alias script pointers classes voc entries also created user files similar tables relational database file unique name distinguish files zero multiple unique records logically related files made two parts data file file dictionary dict data file contains records store actual data file dictionary may contain metadata describe contents output contents file hashed files u2 system uses hashing algorithm allocate file records groups based record ids searching data hashed file system searches group record id stored making search process efficient quicker searching whole file nonhashed files used store data little logical structure program source code xml plain text type file stored subdirectory within account directory host operating system may read edited using appropriate tools files made records similar rows within tables relational database record unique key called record id distinguish records file record ids typically hashed data retrieved quickly efficiently records including record ids store actual data pure ascii strings binary data stored u2 example hardware representation floating-point number would converted ascii equivalent stored usually records divided fields sometimes called attributes u2 field separated field mark hexadecimal character fe thus string codice_1 might represent record employee file 123-45-6789 record id john jones first field jjones company.com second field 4321.00 monthly salary stored third field up-arrow standard pick notation field mark xfe thus first three fields record including record id trailing field mark would use 49 bytes storage given value uses many bytes needed example another record file john jones 10 bytes may replaced marjorie q. humperdink 21 bytes yet name uses much storage needs plus one field mark fields may broken values even subvalues values separated value marks character xfd subvalues separated subvalue marks character xfc thus john jones happened get second email address record may updated codice_2 close bracket represents value mark since email address id record separate file sql terms outer join u2 terms translate provides reason u2 may classified multivalued database raw information called data record set logical grouped data e.g employee record data stored form fields/attributes like name address etc universe unidata structured basic language universe basic unibasic respectively similar pick/basic naturally operates structures multivalue database also structured database query language retrieve uniquery used select records processing ad hoc queries reports rocketu2 provides set client tools allow software developers access u2 databases software languages client tool interfaces include universe unidata support tls transport level data encryption record file level encryption data rest using openssl additional api encryption functionality also available allow custom solutions meet specific regulatory requirements rocketu2 offers three professional certification designations related u2 product family rocket software universe unidata limited ability create web-based front-ends universe/unidata content since rocket software provides sql access database products sql-based product used build web-based ui databases regardless using files tables u2 third-party application framework used build web interfaces | [
1710,
3005,
4798,
4142,
5571,
3268,
578,
1433
] | Validation |
5,811 | 4 | The_Abusive_Hosts_Blocking_List:abusive hosts blocking list abusive hosts blocking list ahbl internet abuse tracking filtering system developed summit open source development group based original summit blocking list 2000–2002 dnsbls shut jan 1 2015 appear blacklisting entire internet ahbl operated several dnsbl lists one rhsbl list use various types services data mostly added removed automatically ahbl preferred manage certain categories hand accuracy dnsbl list developed use smtp services real-time blocking system means data collected various sources 24 hours day 7 days week real time merged database data included spam sources open proxies open relays ddos drones usenet spam sources controversial shoot sight listing policy ircbl list reduced version dnsbl include spam sources data unnecessary use irc networks chat systems rhsbl list domain-based rather ip4r included domains owned and/or operated spammers known abusive domains domains used send e-mail request domain owner commonly used block domains address e-mail well surbl type systems scan links e-mail torbl list ip4r based list tor nodes included tor nodes including entrance transit exit nodes tor network list contained entrance transit nodes exit nodes ahbl recommends using torbl e-mail blocking purposes march 26 2014 blacklist administrator brielle bruns announced abusive hosts blocking list dnsbls shut ahbl site also published announcement several ahbl actions since creation led harsh criticism members spam fighting community overly aggressive unreasonable one example complete blocking spain largest internet service provider telefónica.es 6 months ever increasing amount spam illegal 419 coming rima-tde.net ip space ahbl also publicly spoken spamhaus .mail icann proposal later rejected icann ahbl also listed godaddy hosting services due continued hosting free speech store richard scoville attempted sue ahbl past listing escalated repeated attempts resolve issue godaddy abuse department told enforce tos aup unless forced law enforcement second major source controversy comes ahbl shoot sight listing policy commonly used administrators force isps take action entities ahbl considers abusers entities make legal cart00ney threats ahbl similar organizations threatening ahbl lawsuit years december 17 2005 richard scoville operator website free speech store sued ahbl sosdg associated individuals bexar county texas 3.525 million us claiming various damages business suit dismissed prejudice january 6 2006 lack jurisdiction | [
5733,
4734,
6015,
6908,
2379
] | Test |
5,812 | 8 | Business_process_network:business process network business process networks bpn also referred business service networks business process hubs enable efficient execution multi-enterprise operational processes including supply chain planning execution bpn extends implements organization service-orientation enterprise applications execute processes bpns combine integration services application services often support particular industry process order management logistics management automated shipping receiving others organizations derive primary value e.g. revenue attain goals outside 'four walls enterprise-—by selling consumers b2c businesses b2b thus businesses seek efficiently manage processes span multiple organizations one process supply chain management bpns gaining popularity partly changing nature supply chains supply chains become truly global trends global sourcing offshoring asia india low-cost production regions world continue add complexity effective trading partner management supply chain visibility transition global sourcing challenging companies companies requisite strategies infrastructure extended process control effectively make transition global sourcing majority supply managers continue use mix e-mail phone fax collaborate offshore suppliers—-none standardized easily integrated enable informed business decisions actions distant trading partners introduce new standards new systems multiple time zones new processes different levels technological maturity supply chain bpns help reduce complexity providing common framework information exchange visibility collaboration bpns also increasingly used enable manage operational business process outsourcing bpo functions human resources finance information technology ‘ non-core ’ relative business business functions whereby bpn facilitates collaboration document movement organization outsourcing firm bpns implemented using host technology platforms including limited traditional edi value-added networks vans industry exchanges b2b gateways point point integration brokers vpns mechanisms enable trading partners connect electronically collaborate conduct business amongst bpns accelerated growth web services service-oriented architectures soa technologies simplify integration people processes systems business process networks often managed using multi-tenant architectures rapidly enable seamless many-to-many one-to-many hub-spoke model connectivity trading partners across extended supply chain multi-tenant frameworks also ensure trading partners work single shared set applications collaboration tools hosted network provider mitigating integration barriers hurdles heterogeneous back-end infrastructures systems across trading community vans industry exchanges bring added benefit pre-connected trading partners often ranging tens thousands enable faster trading community implementation lower overall cost manage maintain connections | [] | Test |
5,813 | 4 | Unified_threat_management:unified threat management unified threat management utm approach information security single hardware software installation provides multiple security functions contrasts traditional method point solutions security function utm simplifies information-security management providing single management reporting point security administrator rather managing multiple products different vendors utm appliances gaining popularity since 2009 partly all-in-one approach simplifies installation configuration maintenance setup saves time money people compared management multiple security systems instead several single-function appliances needing individual familiarity attention support network administrators centrally administer security defenses one computer prominent utm brands sophos sonicwall check point utms minimum converged security features like features commonly found utms although utm offers ease management single device also introduces single point failure within infrastructure additionally approach utm may go one basic information assurance security approaches defense depth utm would replace multiple security products compromise utm layer break entire defense-in-depth approach | [
7139,
6461,
7151,
3411,
2476,
3767,
6779,
3223,
8123
] | Test |
5,814 | 4 | Privilege_separation:privilege separation computer programming computer security privilege separation technique program divided parts limited specific privileges require order perform specific task used mitigate potential damage computer security vulnerability common method implement privilege separation computer program fork two processes main program drops privileges smaller program keeps privileges order perform certain task two halves communicate via socket pair thus successful attack larger program gain minimal access even though pair programs capable performing privileged operations privilege separation traditionally accomplished distinguishing real user id/group id effective user id/group id using setuid 2 /setgid 2 related system calls specified posix incorrectly positioned gaps allow widespread network penetration many network service daemons specific privileged operation open raw socket internet socket well known ports range administrative utilities require particular privileges run-time well software tends separate privileges revoking completely critical section done change user runs unprivileged account action known dropping root unix-like operating systems unprivileged part usually run nobody user equivalent separate user account privilege separation also done splitting functionality single program multiple smaller programs assigning extended privileges particular parts using file system permissions way different programs communicate operating system scope potential vulnerabilities limited since crash less privileged part exploited gain privileges merely cause denial-of-service attack separation privileges one major openbsd security features implementation postfix focused implementing comprehensive privilege separation solaris implements separate set functions privilege bracketing | [
2001,
6085,
6984,
4685,
123,
5571,
5305,
7451,
1559,
3638,
5842,
7570,
1047,
2883,
1691,
3495,
8034,
2615,
4913,
1245,
5449,
1805
] | Validation |
5,815 | 2 | Real-time_clock_alarm:real-time clock alarm real time clock alarm feature used allow computer 'wake shut execute tasks every day certain day sometimes found 'power management section motherboard bios setup however newer bios setups include rtc alarm option although still set within user applications wake lan wake ring ipmi functions could also used start computer turned linux real time clock alarm set retrieved using /proc/acpi/alarm /sys/class/rtc/rtc0/wakealarm alternatively rtcwake utility may used prevents problems using local time instead utc automatically processing /etc/adjtime file systemd used wake system run task specific time microsoft windows different programs could used 'wake computer standby hibernation task scheduler settings power management used 'wake computer run task | [
7667,
1052,
4759,
578
] | Test |
5,816 | 4 | ScienceLogic:sciencelogic sciencelogic software service vendor produces information technology management monitoring solutions operations cloud computing company product monitoring management system performs discovery dependency mapping monitoring alerting ticketing runbook automation dashboarding reporting networks compute storage applications sciencelogic platform monitors on-premises cloud-based assets enabling customers use public cloud services amazon web services aws microsoft azure google cloud manage hybrid multi-cloud workloads sciencelogic founded reston virginia 2003 dave link christopher cordray richard chart 2005 company tripled revenue growth year-over year triple digit growth 2005-2007 2008 sciencelogic posted 5.9m revenue also 2008 inc. magazine placed sciencelogic annual list america 500 fastest growing private companies 350 also including 42 top 100 services companies year 2009 position list 490 sciencelogic also ranked 59 deloitte 2009 technology fast 500 ranking 2003 2009 sciencelogic overall sales growth 70 2010 sciencelogic received 15 million series funding new enterprise associates 2012 sciencelogic raised additional 15 million funding intel capital 2013 sciencelogic monitoring software chosen deployed whoa networks inc 2014 sciencelogic introduced cloudmapper automatically discovers maps relationships assets public cloud services aws well customers premises hybrid environment dependency mapping enables customers identify non-performing assets environments | [
5064,
2961
] | Validation |
5,817 | 2 | GODI:godi godi package management system ocaml programming language provides dependency management ocaml similar way cpan provides package management perl godi derived netbsd pkgsrc system acronym godi simultaneously stands gerd ocaml distribution general ocaml distribution gerd first name project initiator gerd stolpmann last update project discontinued came 2014 | [
5983,
6743,
1598,
3559,
3042
] | Test |
5,818 | 9 | AMSRefs:amsrefs amsrefs package extension package latex facilitates creation bibliographies citations latex documents use amsrefs allows retention rich markup makes references easier reuse publishing environments web book journal formats citation services package available free american mathematical society website purpose amsrefs provide simpler flexible way use many bibliography citation features users latex bibtex come expect amsrefs designed encourage preservation structured markup bibliography throughout entire lifetime document rough draft final archival version replacing unstructured .bbl file format latex fully structured format package compatible “ showkeys ” “ hyperref ” “ backrefs ” packages implements functionality “ cite ” package amsrefs provides bibliography style controlled completely latex instead determined partly bibtex style file partly latex data format used database file latex document thus amsrefs-format database valid latex document printed directly also author send article embedded references publisher without loss internal structural information entries possible use amsrefs package without abandoning one ’ existing bibtex database files amsrefs may distributed and/or modified latex project public license either version 1.3c license option later version | [] | Test |
5,819 | 7 | Polish_Grid_Infrastructure_PL-Grid:polish grid infrastructure pl-grid polish grid infrastructure pl-grid nationwide computing infrastructure built 2009-2011 scientific project pl-grid polish infrastructure supporting computational science european research space purpose enable scientific research based advanced computer simulations large-scale computations using computer clusters provide convenient access computer resources research teams also outside communities high performance computing centers operate first decade twenty-first century european countries advanced grid programs created besides european worldwide consolidation took place form various projects concerned grid technology hpc egee e-irg prace deisa omii-europe poland also undertaken efforts build national grid without infrastructure would possible polish scientific communities participate many research programs particularly eu 7th framework programme another reason initiate steps towards polish grid creation fact poland number intensively cooperating geographically dispersed research teams increasing case cooperation tools gathering sharing accumulated knowledge global scale essential 2007 support almost european countries egi design study project created goal prepare rules integration national grids national grid initiatives europe stable production infrastructure european grid initiative would begin operation 2010 helped start work establishing national grid initiative poland already 2007 setting pl-grid consortium pl-grid consortium established five polish supercomputing networking centers 2009-2011 activity consortium supported pl-grid project co-funded european regional development fund within innovative economy operational programme result operation consortium establishment polish grid infrastructure pl-grid formed merger new powerful computational resources purchased installed data centers belonging pl-grid consortium computational resources available polish grid infrastructure pl-grid include end pl-grid project 5.8 pbytes storage capacity 588 tflops computing power one clusters within polish grid infrastructure zeus supercomputer installed academic computer centre cyfronet agh university science technology kraków 2010 2011 2012 efficient supercomputer poland pl-grid infrastructure resources available scientific software packages allow researchers field biology quantum chemistry physics numerical computations simulation conduct large-scale computations adf amber autodock blast blender cfour clustal cpmd dalton fluent gamess gaussian gromacs mathematica matlab meep molpro mopac namd nwchem openfoam pov-ray r turbomole within pl-grid infrastructure available several tools support design running scientific applications distributed computational resources organization computational experiments visualization applications results resources management g-eclipse gridspace2 qosqosgrid migrating desktop aside user-end tools several software packages administrators also developed namely acarm-ng keyfs security-related projects also useful standalone solutions pl-grid contribution open source community creation national grid infrastructure enterprise large potential innovation mentioned government documents setting directions development polish science technology economy fulfill aim „ growth competitiveness polish science ” innovative economy operational program science sector must strengthened provision suitable research base grid infrastructure constituted base specialized systems specific various fields science created involving services tools oriented used types applications polish grid infrastructure continuously maintained extended within plgrid plus project 2012-2014 domain-oriented services resources polish infrastructure supporting computational science european research space – plgrid plus “ important task preparation specific computing environments – called domain grids – i.e. solutions services extended infrastructure including software tailored needs different groups scientists | [
4159,
1023,
4070,
2554,
7069
] | Test |
5,820 | 8 | Zeus_Web_Server:zeus web server zeus web server proprietary web server unix unix-like platforms including solaris freebsd hp-ux linux developed zeus technology software company located cambridge england original authors company founders university cambridge graduates damian reeves adam twiss support aix tru64 mac os x dropped 10 june 2008 new zws releases made since january 2010 company longer offers similar server solution july 2011 company acquired riverbed technology ended support zws november 30 2014 zeus designed high-performance web server commonly used hardware vendors submitting specweb99 benchmarks hardware specweb99 benchmark retired 2005 replaced specweb2005 specweb2005 submissions made using zeus 2008 longer among top performers addition static content serving zeus supported dynamic content via cgi fastcgi apache jserv isapi nsapi mod_perl ssi zeus distributed authentication content zdac proprietary fastcgi-like protocol zeus mainly competed commercial web servers oracle iplanet web server also claimed high degree compatibility apache http server including .htaccess support url rewriting system comparable apache mod_rewrite expectation apache users would migrate zeus server load increased nsapi isapi supported ease migrations microsoft iis sun java system web server | [
3168,
5369,
1349,
5206,
900,
5214,
2646,
6270,
1834,
2291,
8182,
6536,
26,
7988,
7544,
3290,
833,
578,
4701,
1392,
7786,
417,
3135,
2506,
1686,
3408,
1602,
6061,
7411,
7952,
2807
] | Test |
5,821 | 5 | Naver_Whale:naver whale naver whale hangul 네이버 웨일 south korean freeware web browser developed naver corporation also available english became available android april 13 2018 since browser based chromium since inception 2011 google chrome apps compatible browser pages translated naver papago service translate korean japanese many languages naver whale browser extensions accessed whale store | [
4655,
6802,
5378,
7537,
6809,
393,
3291,
2574,
2577,
6452,
4352,
4725,
1136,
6858,
84,
445,
1152,
1525,
7628,
5127,
3018,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
5887,
6966,
5542,
1276,
5571,
7015,
7749,
2049,
4565,
2812,
2... | Test |
5,822 | 4 | NEC:nec nec world fourth largest pc manufacturer 1990 nec semiconductors business unit worldwide semiconductor sales leader 1985 1990 second largest 1995 one top three 2000 one top 10 2006 remained one top 20 semiconductor sales leaders merging renesas electronics nec member sumitomo group nec 463 2017 fortune 500 list kunihiko iwadare takeshiro maeda established nippon electric limited partnership august 31 1898 using facilities bought miyoshi electrical manufacturing company iwadare acted representative partner maeda handled company sales western electric interest japanese phone market represented walter tenney carleton carleton also responsible renovation miyoshi facilities agreed partnership would reorganized joint-stock company treaty would allow july 17 1899 revised treaty japan united states went effect nippon electric company limited organized day western electric company become first japanese joint-venture foreign capital iwadare named managing director ernest clement carleton named directors maeda mototeru fujii assigned auditors iwadare maeda carleton handled overall management company started production sales maintenance telephones switches nec modernized production facilities construction mita plant 1901 mita shikokumachi completed december 1902 japanese ministry communications adopted new technology 1903 common battery switchboard supplied nec common battery switchboards powered subscriber phone eliminating need permanent magnet generator subscriber phone switchboards initially imported manufactured locally 1909 nec started exporting telephone sets china 1904 1905 iwadare visited western electric u.s. see management production control return japan discontinued oyakata system sub-contracting replaced new system managers employees direct employees company inefficiency also removed production process company paid higher salaries incentives efficiency new accounting cost controls put place time clocks installed 1899 1907 number telephone subscribers japan rose 35,000 95,000 nec entered china market 1908 implementation telegraph treaty japan china also entered korean market setting office seoul january 1908 period 1907 1912 sales rose 1.6 million yen 2 million yen expansion japanese phone service key part nec success period expansion take pause ministry communications delayed third expansion plan phone service march 1913 despite 120,000 potential telephone-subscribers waiting phone installations nec sales fell sixty percent 1912 1915 interim iwadare started importing appliances including electric fans kitchen appliances washing machines vacuum cleaners electric fans never seen japan imports intended prop company sales 1916 government resumed delayed telephone-expansion plan adding 75,000 subscribers 326,000 kilometers new toll lines thanks third expansion plan nec expanded time much rest japanese industry contracted 1919 nec started first association sumitomo engaging sumitomo densen seizosho manufacture cables part venture nec provided cable manufacturing equipment sumitomo densen rights western electrics duplex cable patents also transferred sumitomo densen great kantō earthquake struck japan 1923 140,000 people killed 3.4 million left homeless four nec factories destroyed killing 105 nec engineers workers thirteen tokyo telephone offices destroyed fire telephone telegraph service interrupted damage telephone cables response ministry communications accelerated major programs install automatic telephone switching systems enter radio broadcasting first automatic switching systems strowger-type model made automatic telephone manufacturing co. atm united kingdom nec participated installation automatic switching systems ultimately becoming general sales agent atm nec developed strowger-type automatic switching system 1924 first japan one plants almost leveled kanto earthquake mita plant chosen support expanding production new three-story steel-reinforced concrete building built starting 1925 modeled western electric hawthorne works nec started radio communications business 1924 japan first radio broadcaster radio tokyo founded 1924 started broadcasting 1925 nec imported broadcasting equipment western electric expansion radio broadcasting osaka nagoya marked emergence radio industry nec established radio research unit 1924 nec started developing electron tubes 1925 1930 manufacturing first 500 w radio transmitter provided chinese xinjing station 100 kw radio broadcasting system 1934 photo-telegraphic equipment developed nec transmitted photos accession ceremony emperor hirohito ceremony held kyoto 1928 newspapers asahi shimbun mainichi shimbun competing cover ceremony asahi shimbun using siemens device mainichi planning use french photo-telegraphic equipment end papers acquired used nec product due faster transmission rate higher picture quality 1929 nippon electric provided japan ministry communications a-type switching system first systems developed japan nippon supplied japan ministry communications nonloaded line carrier equipment long distance telephone channels 1937 world war ii described company blackest days history 1938 mita tamagawa plants placed military control direct supervision military officers 1939 nippon electric established research laboratory tamagawa plant became first japanese company successfully test microwave multiplex communications december 22 1941 enemy property control law passed nec shares owned international standard electric corporation ise itt subsidiary western electric affiliate seized capital technical relations abruptly severed munitions company law passed october 1943 placing overall control nec plants military jurisdiction ueno plant leveled military attack march 1945 fire bombings april may heavily damaged tamagawa plant reducing capacity forty percent okayama plant totally destroyed bombing attack june year end war nec production substantially reduced damage facilities material personnel shortages war production slowly returned civilian use nec re-opened major plants end january 1946 nec began transistor research development 1950 started exporting radio-broadcast equipment korea first major postwar contract 1951 nec received deming prize excellence quality control 1952 computer research development began 1954 nec produced first crossbar switching system japan installed nippon telegraph telephone public corporation currently nippon telegraph telephone corporation ntt 1956 nec began joint research development ntt electronic switching systems year nec established taiwan telecommunication company first postwar overseas joint venture 1958 completed neac-1101 neac-1102 computers year 1959 nec demonstrated first transistorized computer neac-2201 demonstrated unesco automath show paris company began integrated circuit research development 1960 1963 nec started trading american depositary receipts ten million shares sold united states nippon electric new york nec america inc. incorporated year nec supplied kdd submarine cable systems laying pacific ocean 1964 supplied short-haul 24 channel pcm carrier transmission equipment ntt 1965 nec de mexico s. a. de c. v. nec brasil s. a. nec australia pty ltd. established 1968 1969 nec supplied comsat corporation spade satellite communications system 1971 1972 switzerland ordered nec satellite communications earth station year small transportable satellite communications earth station set china shares nec common stock listed amsterdam stock exchange 1973 nec also designed automated broadcasting system japan broadcasting corporation year nec electronics europe gmbh also established 1974 acos series computer introduced new central research laboratories completed 1975 1977 japan national space development agency launched nec geostationary meteorological satellite named himawari period nec introduced concept c c integration computers communications nec america inc. opened plant dallas texas manufacture pabx telephone systems 1978 also acquired electronic arrays inc. california year start semiconductor chip production united states 1980 nec created first digital signal processor nec µpd7710 nec semiconductors uk ltd. established 1981 producing vlsis lsis nec introduced 8-bit pc-8800 series personal computer 1981 followed 16-bit pc-9800 series 1982 1983 nec stock listed basel geneva zurich switzerland exchanges nec quickly became dominant leader japanese pc industry holding 80 market share nec changed english company name nec corporation year nec information systems inc. started manufacturing computers related products united states 1984 nec also released v-series processor year 1986 nec delivered sx-2 super computer houston advanced research center woodlands texas year neax61 digital switching system went service 1987 nec technologies uk ltd. established united kingdom manufacture vcrs printers computer monitors mobile telephones europe also year nec licensed technology hudson soft video game manufacturer create video game console called pc-engine later released 1989 turbografx-16 north american market successor pc-fx released japan 1994 pc-engine achieved considerable following said nec held much stronger influence video game industry role leading semiconductor manufacturer direct video game products nec usa inc. established 1989 holding company north american operations 1983 nec brasil brazilian subsidiary nec forced nationalise corporate stock orders brazilian military government whereby shareholder control nec brasil ceded private equity group brasilinvest brazilian investment banker mário garnero since nec brasil foundation 1968 become major supplier telecommunications equipment brazilian government 1986 minister communications antônio carlos magalhães put nec brasil financial difficulties suspending government contract payments company whose main client federal government subsidiary crisis nec corporation japan sold nec brasil organizações globo onemillion us dollars us 1,000,000 shortly thereafter magalhães resumed government contracts corresponding payments nec brazil became valued 350million us dollars us 350,000,000 suspicions regarding nec-globo deal included among things unilateral breach contract globo founder roberto marinho regarding management regional television station brazilian state bahia took national stage 1992 first corruption charges impeached brazilian president fernando collor de mello organizações globo subsequently sold shares nec brazil hit all-time high state monopoly years back nec corporation 1999 following break-up privatisation brazilian state-owned telephone monopoly telebrás 1990 new head office building known super tower completed shiba tokyo additionally joint-venture agreements established manufacture market digital electronic switching systems lsis china 1993 nec asynchronous transfer mode atm switching system neax61 nippon electronic automatic exchange atm service node went service united states nec europe ltd. established holding company european operations year nec c c research laboratories nec europe ltd. opened germany 1994 nec china co ltd. established holding company chinese operations 1996 1997 nec developed 4gbit dram semiconductor group honored one first japan quality awards 1998 nec opened world advanced semiconductor r facility nec 1 personal computer vendor japan 1980s faced increasing competition fujitsu seiko epson ibm japan nevertheless early 1990s nec still largest well 50 market share japanese market competition heated later rival fujitsu started aggressively market computers industry standard x86 instead nec 1997 nec share reduced 35 nec celebrated 100th anniversary 1999 nec electronics corporation separated nec 2002 new semiconductor company nec laboratories america inc. nec labs started november 2002 merger nec research institute neci nec usa computer communications research laboratory ccrl nec built earth simulator computer esc fastest supercomputer world 2002 2004 since produced nec n343i 2006 2003 nec 20.8 market share personal computer market japan slightly ahead fujitsu 2007 nec nissan co. corp. started evaluating joint venture produce lithium ion batteries hybrid electric cars april 23 2009 renesas technology corp nec electronics corp struck basic agreement merge around april 2010 april 1 2010 nec electronics renesas technology merged forming renesas electronics set fourth largest semiconductor company according isuppli published data q3 2010 nec held 19.8 market share pc market japan january 27 2011 nec formed pc joint venture chinese pc maker lenovo fourth largest pc maker world part deal companies said statement establish new company called lenovo nec holdings b.v. registered netherlands nec receive us 175 million lenovo issuance lenovo shares lenovo unit 51 stake joint venture nec hold 49 stake february 2011 bloomberg news said joint venture would allow lenovo expand field servers nec masato yamamoto said nec would able grow china january 26 2012 nec corporation announced would cut 10,000 jobs globally due big loss nec consolidated financial statement line economic crisis europe lagged development smartphones domestic market compare apple samsung previously january 2009 nec cut 20,000 jobs mainly sluggish semiconductor liquid crystal display related businesses 2013 nec biggest pc server manufacturer japan 23.6 share august 2014 nec corporation commissioned build super-fast undersea data transmission cable linking united states japan consortium international companies consisting china mobile international china telecom global global transit google kddi singtel pipeline went online june 30 2016 april 2017 kemet corporation purchase 61 controlling interest nec tokin nec making nec tokin wholly owned subsidiary purchase complete company change name tokin corporation nec structured organization around three principal segments solutions network solutions electronic devices solutions business delivers computing solutions business enterprises government individual customers—in form software hardware related services network solutions business designs provides broadband network systems mobile wireless communications network systems mobile handsets broadcast systems nec electronic devices business includes semiconductors displays electronic components nec produces versa notebooks international market lavie series japanese markets principal subsidiaries nec include defense products include achievements nec include nec ranked consistently top four companies previous five years number u.s. patents issued averaging 1764 year nec main title sponsor davis cup competition 2002 bnp paribas took sponsorship nec 1982 2012 sponsored nec cup go tournament japan nec 1986 2003 sponsored nec shun-ei go tournament young players japan nec sponsored english football club everton 1985 1995 1995 fa cup final triumph everton final game decade-long nec sponsorship danka took sponsors nec signed deal sponsor sauber f1 team 2011 season 2014 season nec signed new deal sponsor sahara force india f1 team 2015 season april 2013 nec became umbrella sponsor pga tour latinoamérica third-tier men professional golf tour nec one sponsored v.league volleyball started works teams years came include professional players nec also used montedio yamagata football soccer j league sponsors along local companies | [
5362,
2,
3605,
3938,
1452,
1083,
6428,
7172,
4687,
740,
7189,
5055,
2950,
5762,
6839,
1134,
4365,
4006,
4368,
4370,
5784,
88,
7956,
1522,
93,
6874,
4783,
1565,
7663,
4436,
6217,
1222,
6570,
5526,
6236,
3421,
8056,
2372,
3777,
2023,
2024... | Test |
5,823 | 4 | Great_Seal:great seal great seal seal used head state someone authorised behalf confirm formal documents laws treaties appointments letters dispatch used guarantee authenticity important solemn records documents middle ages great seal played far greater political role much real power associated control seal addition great seal prince usually also privy seal used correspondence private nature seal usually formally entrusted upon office-holder act keeper seal keeper may separate office also usually combined chancellor nowadays great seal usually entrusted upon minister particularly minister justice great seals republics usually show nation coat arms e.g great seal united states allegorical image e.g france reason design used usually remains unchanged seals may however replaced wear depending often seal used monarchies contrast great seal often changed time accession new monarch seal often depicts reigning monarch full form | [
1266
] | Test |
5,824 | 5 | OCSP_stapling:ocsp stapling online certificate status protocol ocsp stapling formally known tls certificate status request extension standard checking revocation status x.509 digital certificates allows presenter certificate bear resource cost involved providing online certificate status protocol ocsp responses appending stapling time-stamped ocsp response signed ca initial tls handshake eliminating need clients contact ca aim improving security performance original ocsp implementation number issues firstly introduce significant cost certificate authorities ca requires provide responses every client given certificate real time example certificate issued high traffic website servers cas likely hit enormous volumes ocsp requests querying validity certificate also ocsp checking potentially impairs users privacy slows browsing since requires client contact third party ca confirm validity certificate encounters moreover client fails connect ca ocsp response forced decide continuing connection anyway defeating purpose ocsp b terminating connection based assumption attack could result excessive false warnings blocks ocsp stapling aimed addressing issues original ocsp implementation ocsp stapling resolves problems fashion reminiscent kerberos ticket stapling scenario certificate holder queries ocsp server regular intervals obtaining signed time-stamped ocsp response site visitors attempt connect site response included stapled tls/ssl handshake via certificate status request extension response note tls client must explicitly include certificate status request extension clienthello tls/ssl handshake message may appear allowing site operator control verification responses would allow fraudulent site issue false verification revoked certificate stapled responses ca n't forged need directly signed certificate authority server client receive stapled response contact ocsp server however client receives invalid stapled response abort connection increased risk ocsp stapling notification revocation certificate may delayed last-signed ocsp response expires result clients continue verifiable assurance certificate authority certificate presently valid quite recently longer need individually contact ocsp server means brunt resource burden placed back certificate holder also means client software longer needs disclose users browsing habits third party overall performance also improved client fetches ocsp response directly ca usually involves lookup domain name ca ocsp server dns well establishing connection ocsp server ocsp stapling used certificate status information delivered client already established channel reducing overhead improving performance tls certificate status request extension specified rfc 6066 section 8 rfc 6961 defines multiple certificate status request extension allows server send multiple ocsp responses tls handshake draft proposal x509v3 extension field expired april 2013 specified compliant server presenting certificate carrying extension must return valid ocsp token response status_request extension specified tls client hello current version proposal extended support additional tls extensions tls developer adam langley discussed extension april 2014 article following repair heartbleed openssl bug ocsp stapling support progressively implemented openssl project included support 0.9.8g release assistance grant mozilla foundation apache http server supports ocsp stapling since version 2.3.3 nginx web server since version 1.3.7 litespeed web server since version 4.2.4 microsoft iis since windows server 2008 haproxy since version 1.5.0 f5 networks big-ip since version 11.6.0 kemp loadmasters since version 7.2.37.1 many web servers advertise support ocsp stapling implementations always reliable example apache queries ocsp server event temporary failure discard cached good response previous request start serving bad response nginx lazy loading ocsp responses means first web requests unable add ocsp response browser side ocsp stapling implemented firefox 26 internet explorer since windows vista google chrome linux chrome os windows since vista smtp exim message transfer agent supports ocsp stapling client server modes ocsp stapling designed reduce cost ocsp validation client ocsp responder especially large sites serving many simultaneous users however ocsp stapling supports one ocsp response time insufficient certificate chains intermediate ca certs limitation addressed multiple certificate status request extension specified rfc 6961 adds support sending multiple ocsp responses | [
363,
794,
6413,
887,
6795,
1168,
1173,
2644,
1460,
2291,
6536,
8189,
8093,
1474,
6540,
5399,
3637,
6458,
6553,
2587,
4071,
7567,
7925,
4261,
1401,
3135,
3899,
2691,
6049,
4990,
7214,
3588,
353,
1059,
1513,
2620,
359,
3426
] | Test |
5,825 | 4 | Police_Central_e-Crime_Unit:police central e-crime unit police central e-crime unit pceu part specialist crime directorate metropolitan police service london dedicated combating e-crime england wales northern ireland unit national remit created april 2008 centralise efforts police forces uk excluding scotland fight forms e-crime unit responsibilities quite specific included activities carried bodies excluding activities currently done others unit stated mission improve police response victims e-crime developing capability police service across england wales northern ireland co-ordinating law enforcement approach types e-crime providing national investigative capability serious e-crime incidents pceu created 1 october 2008 responsible improving uk national policing response cyber crime unit housed within specialist crime directorate scd6 part metropolitan police service based central london jurisdiction within england wales northern ireland however unit worked closely scdea scotland international law enforcement pceu seat table europol interpol cyber workstreams since february 2012 pceu presence outside london creation 3 regional hubs hubs located england north west north east midlands areas hubs launched acpo cyber conference sheffield pceu one strands work within acpo e-crime programme led dac janet williams pceu merged national cyber crime unit part new national crime agency | [] | Test |
5,826 | 2 | Line_Printer_Daemon_protocol:line printer daemon protocol line printer daemon protocol/line printer remote protocol lpd lpr network printing protocol submitting print jobs remote printer original implementation lpd berkeley printing system bsd unix operating system lprng project also supports protocol common unix printing system cups common modern linux distributions also found mac os x supports lpd well internet printing protocol ipp commercial solutions available also use berkeley printing protocol components robust functionality performance necessary available lpr/lpd cups alone might required large corporate environments lpd protocol specification documented rfc 1179 server lpd protocol listens requests tcp port 515 request begins byte containing request code followed arguments request terminated ascii lf character lpd printer identified ip address server machine queue name machine many different queue names may exist one lpd server queue unique settings note lpd queue name case sensitive modern implementations lpd network printers might ignore case queue name altogether send jobs printer others option automatically create new queue print job new queue name received helps simplify setup lpd server companies e.g d-link model dp-301p+ tradition calling queue name “ lpt1 ” “ lpt1 ” printer supports lpd/lpr sometimes referred tcp/ip printer tcp/ip used establish connections printers clients network although term would equally applicable printer supports internet printing protocol | [
2835,
2817,
7261,
2769,
7796,
5370,
1303,
578,
3855,
444
] | Test |
5,827 | 3 | World_Games_(video_game):world games video game world games sports video game developed epyx commodore 64 1986 versions apple iigs amstrad cpc zx spectrum sega master system contemporary systems also released nes version released milton bradley ported rare virtual console version released europe april 25 2008 game continuation epyx sports line previously released extremely successful titles summer games winter games events available vary slightly depending platform may include game allowed player compete events sequentially choose events choose one event practice event info gave commodore 64 version world games three-plus stars five describing least favorite series stating slalom skiing best event magazine concluded epyx nice consistent job execution tho hard take many points even boring material computer gaming world rick teverbaugh criticized slalom skiing log rolling events difficulty concluded world games still must avid sports games charles ardai called game adequate sequel epyx previous games praised graphics criticized mechanics bizarre little joystick patterns little events still recommended game log rolling event jame trunzo praised game use advanced graphics sound including humorous effects also noted variety included games preventing game getting repetitive game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars | [
6290,
63
] | Validation |
5,828 | 4 | Data_center_security:data center security data center security set policies precautions practices adopted avoid unauthorized access manipulation data center resources data center houses enterprise applications data hence providing proper security system critical denial service dos theft confidential information data alteration data loss common security problems afflicting data center environments according cost data breach survey 49 u.s. companies 14 different industry sectors participated noticed physical security needed protect value hardware therein cost breach security severe consequences company managing data center customers whose data copied 2012 breach global payments processing vendor visa 1.5 million credit card numbers stolen highlights risks storing managing valuable confidential data result global payments partnership visa terminated estimated lost 100 million defenses exploitable software vulnerabilities often built assumption insiders trusted studies show internal attacks tend damaging variety amount information available inside organizations quantity data stored data centers increased partly due concentrations created cloud-computing common threats data centers common vulnerabilities include many worm attacks data centers exploited well-known vulnerabilities many systems shipped default accounts passwords exploited unauthorized access theft information common attacks include network security infrastructure includes security tools used data center enforce security policies tools include packet-filtering technologies acls firewalls intrusion detection systems idss network-based host-based acls filtering mechanisms explicitly defined based packet header information permit deny traffic specific interfaces acls used multiple locations within data center internet edge intranet server farm following describes standard extended access lists standard acls simplest type acl filtering traffic solely based source ip addresses standard acls typically deployed control access network devices network management remote access example configure standard acl router specify systems allowed telnet standard acls n't recommended option traffic filtering due lack granularity standard aclss configured number 1 99 cisco routers extended acls extended acl filtering decisions based source destination ip addresses layer 4 protocols layer 4 ports icmp message type code type service precedence cisco routers define extended acls name number 100 199 range firewall sophisticated filtering device separates lan segments giving segment different security level establishing security perimeter controls traffic flow segments.firewalls commonly deployed internet edge act boundary internal networks.they expected following characteristics performance main goal firewall separate secured unsecured areas network firewalls post primary traffic path potentially exposed large volumes data hence performance becomes natural design factor ensure firewall meets particular requirements application support another important aspect ability firewall control protect particular application protocol telnet ftp http firewall expected understand application-level packet exchanges determine whether packets follow application behavior deny traffic different types firewalls based packet-processing capabilities awareness application-level information idss real-time systems detect intruders suspicious activities report monitoring system configured block mitigate intrusions progress eventually immunize systems future attacks two fundamental components cisco layer 2 switches provide tools prevent common layer 2 attacks scanning probing dos ddos etc. following security features covered layer 2 security process securing data center requires comprehensive system-analysis approach ongoing process improves security levels data center evolves data center constantly evolving new applications services become available attacks becoming sophisticated frequent trends require steady evaluation security readiness key component security-readiness evaluation policies govern application security network including data center application includes design best practices implementation details result security often considered key component main infrastructure requirement since key responsibility data centers make sure availability services data center management systems often consider security affects traffic flows failures scalability due fact security measures may vary depending data center design use unique features compliance requirements company business goals n't set specific measures cover possible scenarios exist general two types data center security physical security virtual security physical security data center set protocol built-in within data center facilities order prevent physical damage machines storing data protocols able handle everything ranging natural disasters corporate espionage terrorist attacks prevent physical attacks data centers use techniques virtual security security measures put place data centers prevent remote unauthorized access affect integrity availability confidentiality data stored servers virtual network security hard task handle exist many ways could attacked worst part evolving years years instance attacker could decide use malware similar exploits order bypass various firewalls access data old systems may well put security risk contain modern methods data security virtual attacks prevented techniques | [
2618,
1691,
2724
] | Test |
5,829 | 2 | Robert_Love:robert love robert m. love born c. 1981 american author speaker google engineer open source software developer love best known contributions linux kernel notable work including preemptive kernel process scheduler kernel event layer virtual memory subsystem inotify google member android team helped launch first version platform love also active gnome community working networkmanager gnome volume manager project utopia beagle love born 1981 south florida attended graduated charles w. flanagan high school undergraduate studies attended university florida graduated bachelor arts mathematics bachelor science computer science still college love employed kernel hacker montavista software montavista worked procps several kernel-related projects including one notable preemptive kernel love began work ximian december 15 2003 first served senior engineer linux desktop group ximian spearheaded effort named project utopia better integrate hardware management linux desktop ximian acquisition novell love rose position chief architect suse linux enterprise desktop novell worked various kernel gnome projects including inotify beagle love resigned novell may 4 2007 work google mobile device platform android joining project announced engineered several kernel system-level solutions android including novel shared memory subsystem ashmem love continues work google director engineering search infrastructure love lives boston massachusetts love author linux kernel development third edition book understanding developing code linux kernel book widely regarded approachable well written translated several languages three editions published imprints pearson education also wrote linux system programming second edition subtitled talking directly kernel c library published o'reilly media work documents linux system call c library api love also coauthor linux nutshell comprehensive linux command reference also published o'reilly media linux nutshell awarded favorite linux book time linux journal love contributing editor linux journal author articles magazine love invited speak around world including linux.conf.au australia fosdem belgium guadec england keynote speaker love written co-written several books linux operating system | [
2182,
3938,
3613,
1822,
7528,
7532,
5744,
6443,
4341,
7559,
5759,
5762,
412,
3666,
2260,
5453,
7242,
462,
1535,
1924,
6892,
1176,
4401,
1933,
1192,
1208,
6211,
4435,
2689,
5865,
7669,
3404,
1227,
1596,
165,
7312,
1607,
5884,
1991,
3084,
... | Test |
5,830 | 8 | SocialFlow:socialflow socialflow social media optimization platform leading brands publishers company uses twitter firehose click data derived proprietary link proxy along proprietary algorithms optimize delivery messages social networks company believes understanding utilizing key metrics engagement clicks per tweet clicks per follower central growing large active social media following analysis data visualization way news filtered around death osama bin laden via twitter received international news coverage led questions role twitter journalism socialflow founded early 2009 frank speiser mike perrone sought apply scientific approach task building sustaining engaged social media audiences scale socialflow announced april 7 2011 raised 7 million series funding series round led softbank softbank ny rre ventures betaworks highline venture partners aol venture partners sv angel group high profile angel investors participating april 16 2013 socialflow announced raised 10 million round series b funding fairhaven capital led round joined existing investors softbank capital rre ventures aol ventures betaworks well new investors kbs+ ventures rand capital corporation company announced june 7 2011 peter hershberg joined company president socialflow gained considerable media attention published breaking bin laden visualizing power single tweet study demonstrated twitter evolved primary news source death osama bin laden broke twitter next study engaging news-hungry audiences tweet tweet looked twitter audiences al-jazeera english bbc news cnn economist fox news new york times revealed similarities differences respective organization audience simultaneously demonstrating true value audience engagement another notable study created socialflow looked launch kony 2012 video social media noted forbes writer anthony kosner study socialflow research group showed rather emerging big liberal enclaves american coasts initial wave social media traffic launched kony 2012 video originated mid-sized relatively conservative cities middle america | [] | Test |
5,831 | 5 | Delayed_binding:delayed binding delayed binding also called tcp connection splicing postponement connection client server order obtain sufficient information make routing decision application switches routers delay binding client session server proper handshakes complete prevent denial-of-service attacks | [
1691
] | Test |
5,832 | 3 | Bell's_law_of_computer_classes:bell law computer classes bell law computer classes formulated gordon bell 1972 describes types computing systems referred computer classes form evolve may eventually die new classes computers create new applications resulting new markets new industries bell considers law partially corollary moore law states number transistors per chip double every 24 months unlike moore law new computer class usually based lower cost components fewer transistors less bits magnetic surface etc new class forms every decade also takes decade understand class formed evolved likely continue formed lower priced class may evolve performance take disrupt existing class evolution caused clusters scalable personal computers 1 thousands computers span price performance range use pc mainframes become largest supercomputers day scalable clusters became universal class beginning mid-1990s 2010 clusters least one million independent computers constitute world largest cluster established market class computers aka platforms introduced continue evolve roughly constant price subject learning curve cost reduction increasing functionality performance based moore law gives transistors per chip bits per unit area increased functionality per system roughly every decade technology advances semiconductors storage networks interfaces enable new lower cost computer class aka platform form serve new need enabled smaller devices e.g less transistors per chip less expensive storage displays i/o network unique interface people information processing sink source new lower priced class established maintained quasi independent industry market class likely evolve substitute existing class classes described computer clusters beginning 1990s single class scalable computers mega-servers built clusters tens thousands commodity microcomputer-storage-networked bricks began cover replace mainframes minis workstations become largest computers day applied scientific calculation commonly called supercomputer bell law computer classes class formation first mentioned 1970 introduction digital equipment pdp-11 mini differentiate mainframes potentially emerging micros law described 1972 gordon bell emergence observation new lower-priced microcomputer class based microprocessor stimulated creation law bell described articles bell books see also several laws e.g moore law metcalfe law describe computer industry | [
1544,
1592,
4654,
6788,
4049,
4051,
48,
5064,
553,
1238,
107,
740,
4899
] | Test |
5,833 | 2 | AmigaDOS:amigados amigados disk operating system amigaos includes file systems file directory manipulation command-line interface file redirection amigaos 1.x amigados based tripos port metacomco written bcpl bcpl use native pointers advanced functionality operating system difficult use error-prone third-party amigados resource project arp formerly amigados replacement project project begun amiga developer charlie heath replaced many bcpl utilities smaller sophisticated equivalents written c assembler provided wrapper library codice_1 eliminated interfacing problems applications automatically performing conversions native pointers used c assembler bcpl equivalents vice versa amigados functions amigaos 2.x onwards amigados rewritten c retaining 1.x compatibility possible starting amigaos 4 amigados abandoned legacy bcpl starting amigaos 4.1 amigados extended 64-bit file-access support amiga console standard amiga virtual device normally assigned con driven console.handler developed primitive interface amigaos 1.1 became stable versions 1.2 1.3 started known amigashell original handler replaced newconsole.handler newcon console various features considered date created 1985 like command template help redirection null nil ansi color terminal new console handler – implemented release 1.2 – allows many features command history pipelines automatic creation files output redirected tcp/ip stacks like amitcp released early 1990s console could also receive redirection internet-enabled amiga device handlers e.g. tcp copy file tcp site/port unlike systems originally launched mid-1980s amigados implement proprietary character set developers chose use ansi–iso standard iso-8859-1 latin 1 includes ascii character set unix systems amiga console accepts linefeed lf end-of-line eol character amiga console support accented characters well characters created combinations 'dead keys keyboard example typical amigados command syntax amigados redirect output command files pipes printer null device amiga devices amigados commands expected provide standard template describes arguments accept used basic help feature commands although third-party replacement console handlers shells bash zshell ported unix kingcon often provide verbose help built-in commands requesting template command copy following output obtained reading template user know following syntax acceptable command user terminate program invoking key combination pressing printing character keyboard suspends console output output may resumed pressing key delete input pressing cause input processed command soon current command stops running like operating systems amigados also provides wildcard characters substitutes character sequence random characters string example wildcard characters amigados commands parsing follows wildcard indicates character prefixing indicates number repetitions viewed analogous regular expression .* amigados also feature dealing batch programming calls script programming number commands echo endif val skip deal structured script programming scripts text-based files created amigados internal text editor program called ed unrelated unix ed third-party text editor invoke script program amigados uses command execute method executing scripts keeps console window busy script finished scheduled job users interact console window script ends interrupt protection bits flags files links directories filesystem change one either use command protect use information entry icons menu workbench selected files amigados supports following set protection bits abbreviated hsparwed h-bit often misunderstood mean hide smart file system sfs files directories h-bit set hidden system still possible access hidden files n't appear directory listings demonstration h-bit action dos amiga deals environment variables used batch programming global local variables referred dollar sign front variable name example myvar global variables available system-wide local variables valid current shell case name collision local variables precedence global variables global variables set using command setenv local variables set using command set also commands getenv get used print global local variables examples demonstrate simple usage global variables kept files env optionally saved disk envarc survive reboot power cycling env default assign ram env envarc assign sys prefs/env-archive sys refers boot device bootup content envarc copied env accessibility programming amigados scripts one must keep mind global variables system-wide script-internal variables shall set using local variables one risks conflicts global variables scripts also global variables require filesystem access typically makes slower access local variables since envarc also used store system settings string variables system settings default icons tends grow large time copying everything env located ram disk becomes expensive led alternative ways set env using dedicated ramdisk handlers copy files envarc files requested examples handlers example demonstrating creative abuse global variables well lab skip amigados variant infamous goto amigados general case-insensitive indicating device dh0 dh0 dh0 always refers partition however file directory names filesystem-dependent filesystems allow case sensitivity flag upon formatting example file system smart file system convenient dealing software ported mostly case-sensitive un*x world causes much confusion native amiga applications assume case insensitivity advanced users hence typically use case sensitivity flag file systems used software originating un*x note also re-casing file directory volume names allowed using ordinary methods commands rename foo foo relabel bar bar valid exactly expected contrast example linux mv foo foo results error message mv foo foo file case-insensitive filesystems like vfat partitions physical drives typically referred df0 floppy drive 0 dh0 hard drive 0 etc however unlike many operating systems outside built-in physical hardware devices like df0 hd0 names single disks volumes partitions totally arbitrary example hard disk partition could named work system anything else time creation volume names used place corresponding device names disk partition device dh0 called workbench could accessed either name dh0 workbench users must indicate system workbench volume workbench always typing colon entering information requester form amigashell accessed volume name found operating system prompt user insert disk given volume name allow user cancel operation addition logical device names set assign command directory device programs often assigned virtual volume name installation directory instance fictional wordprocessor called writer might assign writer dh0 productivity/writer allows easy relocation installed programs default name sys used refer volume system booted various default names provided refer important system locations e.g startup scripts c amigados commands fonts installed fonts etc assignment volume labels also set multiple directories treated union contents example fonts might assigned sys fonts extended include example work userfonts using add option amigados assign command system would permit use fonts installed either directory listing fonts would show files locations physical device df0 shares floppy drive mechanics pc0 crossdos virtual device capable reading pc formatted floppy disks pc formatted floppy disk inserted floppy drive df0 floppy amiga icon change indicate disk unknown normal amiga device show four question marks standard unknown volume name pc0 icon appear revealing name pc formatted disk disk change amiga formatted disks invert behaviour amigados supports various filesystems variants first filesystem simply called amiga filesystem suitable mainly floppy disks support automatic booting hard disks floppy booting done using code bootblock soon replaced fastfilesystem ffs hence original filesystem known name old filesystem ofs ffs efficient space quite measurably faster ofs hence name amigaos 2.x ffs became official part os soon expanded recognise cached partitions international partitions allowing accented characters file partition names finally morphos amigaos 4 long filenames 108 characters 31 amigaos 4.x morphos featured new version ffs called fastfilesystem 2 ffs2 incorporated features original ffs including author put minor changes order preserve backwards compatibility major structural changes however ff2 amigaos 4.1 differs expand features capabilities aid plug-ins ffs2 amigaos 4 morphos version smart filesystem fork original sfs 100 compatible filesystems like fat12 fat16 fat32 windows ext2 linux available easily installable drag drop system libraries third party modules fat95 features read/write support found aminet software repository morphos 2 built-in support fat filesystems amigaos 4.1 adopted new filesystem called jxfs capable support partitions terabyte size alternate filesystems third-party manufacturers include professional filesystem filesystem easy structure based metadata allowing high internal coherence capable defragmenting fly require unmounted mounted smart filesystem journaling filesystem performs journaled activities system inactivities chosen morphos standard filesystem old file system/fast file system fast file system 2 amigaos4.x/morphos dos6 dos7 feature international filenames featured dos2 do3 directory caching abandoned due bugs original implementation dos4 dos5 recommended use reason dostypes backwards compatible forward compatible dos7 formatted disk read original amiga ffs dos3 disk read ks1.3 amiga however disk formatted dos0 using ffs ffs2 read version amiga operating system reason dos0 tended format choice software developers distributing floppy except custom filesystem bootblock used common practice amiga games software needed amigaos 2 anyway dos3 generally used july 2007 update amigaos 4.0 2007 first two plug-ins ffs2 released amigados single mandated filename extension .info must appended filename icon file called myprog exists icon file must called myprog.info addition image data icon file also records program metadata options keywords position desktop amigaos snapshot icons places defined user information file directory window size position information stored .info file associated directory disk icon information stored disk.info root volume exception icons amiga system identify file types using extensions instead examine either icon associated file binary header file determine file type | [
6161,
97,
3688,
1534,
6088,
6431,
3099,
6009,
307,
5661,
5931,
578,
4244,
7746,
931,
7384,
1214,
6380,
594,
3222,
4354,
336,
4539,
1047,
4006,
7942,
3748,
7775,
2076,
6500,
1435
] | Test |
5,834 | 7 | GUSE:guse grid cloud user support environment guse also known ws-pgrade web service – parallel grid run-time application development environment /guse open source science gateway framework enables users access grid cloud infrastructures guse developed laboratory parallel distributed systems lpds institute computer science control sztaki hungarian academy sciences relevant requirement development guse enable simultaneous handling large number jobs even range millions without compromising response time user interface order achieve level concurrency workflow management back-end guse implemented based web service concept service oriented architecture soa many user communities would like access several dcis transparent way ’ want learn peculiar features used dcis want concentrate scientific application using science gateway sg solution sg provides interface scientist community distributed computing infrastructures dcis sg framework like guse provides specific set enabling technologies well frontend backend services together build generic gateway sg frameworks specialized certain scientific area hence scientists many different areas use enabling technology guse provides required software stack develop sg frameworks sg instances provide simplified user interface highly tailored needs given scientific community typical examples enabling technologies web application containers tomcat glassfish etc portal web application frameworks liferay spring etc database management systems mysql etc workflow management systems guse moteur etc sgs varying goals general researchers use gateways focus scientific goals less assembling e-infrastructure required important goal make easier scientists use national computing storage resources creating using collaborative tools sharing data sg framework used national grid initiatives ngis support small user communities afford develop customized sg guse sg framework also provides two application programming interfaces apis namely application-specific module api remote api create application-specific sgs according needs different user communities guse provides ws-pgrade graphical user interface create execute workflows various distributed computing infrastructures dcis among many features main five capabilities guse follows 1 guse general-purpose sg framework users access twenty different dcis via dci bridge service six different data storage types http https gsiftp s3 sftp srm via data avenue service dci bridge data avenue developed part ws-pgrade/guse service stack also used independent services enabling use types gateways workflow systems 2 ws-pgrade/guse workflow-oriented system extends directed acyclic graph dag -based workflow concept advanced parameter sweep ps features special workflow nodes condition-dependent workflow execution workflow embedding support moreover guse extends concrete workflow concept concepts abstract workflow workflow instance template 3 ws-pgrade/guse supports development execution workflow-based applications users guse define applications workflows share applications among ex-porting internal application repository users import applications execute modify user space 4 guse supports fast development sg instances customization technology guse serve different needs according community requirements computational power complexity applications specificity user interface fit community needs meet terminology 5 important design aspect guse flexibility flexibility guse expressed main goal designing multitier architecture ws-pgrade/guse enable versatile access many different kinds dcis data storage different kinds user interfaces access technically performed dci bridge job submission service bottom within guse architectural layers via data avenue blacktop service independent service provided sztaki dci bridge web service-based application providing standard access various dcis connects dci plug-ins external dci resources user submits workflow job components submitted transparently various dci systems via dci bridge service using standard ogsa basic execution service 1.0 bes interface result access protocol technical details various dci systems totally hidden behind bes interface job description language bes standardized job submission description language jsdl dcis supported dci bridge following middle tier guse architecture contains high-level guse services workflow storage stores every piece information needed define workflow graph structure description input files pointers output files pointers executable code target dci workflow nodes except input files workflow local input files local output files created workflow execution stored file storage workflow interpreter responsible execution workflows stored workflow storage information system holds information users workflows running job status users ws-pgrade gateways work isolated workspace i.e. see workflows order enable collaboration among isolated users application repository stores ws-pgrade workflows one five possible stages physically five categories stored zip files five categories stored workflows follows collaboration among gateway users possible via categories top three-tier structure presentation tier provides ws-pgrade graphical user interface generic sg framework functionalities underlying services exposed users portlets residing liferay portlet container part ws-pgrade layer easily customized extended according needs sg instances derived guse next section introduces essential user-level elements ws-pgrade guse provides framework european sgs guse gives one underlying workflow development infrastructures great number research activities numerous eu fp7 projects ongoing eu- national projects guse | [
3783,
4226,
1293,
3947
] | Test |
5,835 | 1 | Base_Mérimée:base mérimée base mérimée french database monuments listed national significance history architecture art created 1978 placed online 1995 french ministry culture division architectural heritage database periodically updated database contains information derived first survey historic monuments made mérimée 1840 cultural heritage inventory specifically religious domestic agricultural educational military industrial architecture name refers writer prosper mérimée also second inspector-general historic monuments | [] | Test |
5,836 | 2 | Paul_Vixie:paul vixie paul vixie american computer scientist whose technical contributions include domain name system dns protocol design procedure mechanisms achieve operational robustness dns implementations significant contributions open source software principles methodology also created launched first successful commercial anti-spam service authored standard unix system programs sends proxynet rtty vixie cron one point ran consulting business vixie enterprises vixie software engineer digital equipment corporation dec 1988 1993 left dec 1994 founded internet software consortium isc together rick adams carl malamud support bind software internet activities isc assumed new company internet systems consortium 2004 although isc operates f root name server vixie one point joined open root server network orsn project operated l root server 1995 cofounded palo alto internet exchange paix metromedia fiber network mfn bought 1999 served chief technology officer mfn abovenet later president paix 1998 cofounded mail abuse prevention system maps california non-profit company goal stopping email abuse vixie author several request comments rfc including best current practice document classless in-addr.arpa delegation bcp 20 unix software stated 2002 hold record 'most cert advisories due single author 2008 vixie served judge mozilla foundation download day attempt set guinness world record downloads single day new piece software vixie served board trustees american registry internet numbers arin 2005 2013 served chairman 2009 2010 vixie also serves security stability advisory committee icann vixie attended george washington high school san francisco california received ph.d. computer science keio university 2011 2013 nearly 20 years isc founded new company farsight security inc. spinning security business unit isc 2014 vixie inducted internet hall fame innovator | [
1018,
5733,
3166,
2043,
5125,
8161,
5784,
4435,
594,
6861,
1036,
334
] | Test |
5,837 | 2 | Ebrima:ebrima ebrima opentype font designed support african writing systems created microsoft part windows 7 operating system supports advanced opentype features combining diacritics positioning latin alphabet based segoe font | [
1832,
2920,
6645,
5871,
2927,
4759,
1029,
2499,
2931,
2917
] | Test |
5,838 | 0 | Australasian_Language_Technology_Association:australasian language technology association australasian language technology association alta promotes language technology research development australia new zealand alta organises regular events exchange research results academic industrial training co-ordinates activities professional societies alta founding regional organization asian federation natural language processing afnlp every year early december alta organises research workshop commonly known altw gathering together growing language technology community australia new zealand academic industrial world workshop welcomes original work aspect natural language processing including speech text accepted papers published alta proceedings also included part acl anthology since 2008 alta involved organising australian computational linguistics olympiad ozclo contest high school students area linguistics computational linguistics | [
1314,
5388
] | Test |
5,839 | 6 | Acronis_Secure_Zone:acronis secure zone acronis secure zone hard disk partition type created used acronis true image ati backup storage target backup applications typically use network storage storing backup archives problematic resources available acronis designed solution problem carving part local disk proprietary partition refer acronis secure zone asz since partition accessibly true image backup recovery functions backup target safe malware user files uses corruption ati manage single asz per computer restore data aszs present e.g portable hard drive connected although acronis secure zone partition type actually rebadged fat32 partition labeled acronis sz partition type code set 0xbc knowing requirements one manually create and/or manage existing acronis secure zone using partition manager since asz actually modified fat32 partition type possible gain direct access partition changing partition type code 0x0b fat32 lba ati designed self-manage backup archives stored asz backup files stored autogenerated names root folder enough freespace next backup file ati automatically delete oldest image set base+incremental/differential files order create space new files oem versions true image designed use special oem secure zone technically regular asz uses partition type 0xbb typically contains single image file factory default os application configuration set forth manufacturer | [
2390
] | Test |
5,840 | 4 | Spam_Bully:spam bully spam bully anti-spam software made axaware llc spambully uses bayesian filtering separate good emails spam emails also uses allow/block lists determine emails go user inbox popular features include ability report spammers providers ftc option converting spambully toolbar variety languages including spanish german italian russian | [] | Test |
5,841 | 2 | Bcfg2:bcfg2 bcfg2 pronounced bee-config configuration management tool developed mathematics computer science division argonne national laboratory bcfg2 aids infrastructure management lifecycle – configuration analysis service deployment configuration auditing includes tools visualizing configuration information well reporting tools help administrators understand configuration patterns environments bcfg2 differs similar configuration management tools due auditing capability one stated design goals bcfg2 determine interactive direct changes made machine report extra changes client optionally remove additional configuration bcfg2 written python enables system administrator manage configuration large number computers using central configuration model bcfg2 operates using simple model system configuration modeling intuitive items like packages services configuration files well dependencies model system configuration used verification validation allowing robust auditing deployed systems bcfg2 configuration specification written using declarative xml model entire specification validated using widely available xml schema validators along custom schemas included bcfg2 built cross-platform bcfg2 works unix-like operating systems bcfg2 based client-server architecture client responsible interpreting processing configuration served server configuration literal client-side processing configuration required completion configuration process client uploads set statistics server bcfg2 client performs client configuration reconfiguration operations renders declarative configuration specification provided bcfg2 server set configuration operations attempt change client state described configuration specification operation bcfg2 client intended simple possible conceptually sole purpose client reconcile differences current client state state described specification received bcfg2 server bcfg2 server responsible taking network description turning series configuration specifications particular clients also manages probed data tracks statistics clients bcfg2 server takes information two sources generating client configuration specifications first pool metadata describes clients members aspect-based classing system clients defined terms aspects abstract behavior file system repository contains mappings metadata literal configuration combined form literal configuration specifications clients example abstract configuration entries example literal configuration entries | [
6489,
5965,
3915,
5571,
7428,
578
] | Test |
5,842 | 2 | Page_cache:page cache computing page cache sometimes also called disk cache transparent cache pages originating secondary storage device hard disk drive hdd solid-state drive ssd operating system keeps page cache otherwise unused portions main memory ram resulting quicker access contents cached pages overall performance improvements page cache implemented kernels paging memory management mostly transparent applications usually physical memory directly allocated applications used operating system page cache since memory would otherwise idle easily reclaimed applications request generally associated performance penalty operating system might even report memory free available compared main memory hard disk drive read/writes slow random accesses require expensive disk seeks result larger amounts main memory bring performance improvements data cached memory separate disk caching provided hardware side dedicated ram nvram chips located either disk controller case cache integrated hard disk drive usually called disk buffer disk array controller memory confused page cache pages page cache modified brought called dirty pages since non-dirty pages page cache identical copies secondary storage e.g hard disk drive solid-state drive discarding reusing space much quicker paging application memory often preferred flushing dirty pages secondary storage reusing space executable binaries applications libraries also typically accessed page cache mapped individual process spaces using virtual memory done mmap system call unix-like operating systems means binary files shared separate processes also unused parts binaries flushed main memory eventually leading memory conservation since cached pages easily evicted re-used operating systems notably windows nt even report page cache usage available memory memory actually allocated disk pages led confusion utilization page cache windows page cache also aids writing disk pages main memory modified writing data disk marked dirty flushed disk freed file write occurs cached page particular block looked already found page cache write done page main memory found page cache write perfectly falls page size boundaries page even read disk allocated immediately marked dirty otherwise page fetched disk requested modifications done file created opened page cache written might result zero byte file later read however cached pages written program code often mapped read-only copy-on-write latter case modifications code visible process written disk 2019 security researchers demonstrated side-channel attacks page cache possible bypass privilege separation exfiltrate data processes systematically monitoring whether file pages example executable library files present cache | [
3599,
5717,
6256,
8066,
5814,
1640,
3100,
5571,
576,
1575,
759,
56,
1047,
7038,
6057,
5784,
1989,
6505
] | Train |
5,843 | 6 | Non-Volatile_File_System:non-volatile file system non-volatile file system nvfs flash memory file system introduced release palm personal digital assistant handheld models tungsten t5 tungsten e2 palm tx z22 treo 650/700/680/755p palm centro nvfs claimed palmone file system designed keep information safe battery run power previous non-flash memory designs would lose stored data event power loss nvfs derivative flash memory continually stores data even power applied palmone invented nvfs response complaints handheld data destroyed battery power ran past necessary keep handheld continuously charged avoid losing data since information stored volatile memory similar feature adopted pdas running windows mobile 5.0 operating system named persistent storage nvfs uses nand flash memory technology retain handheld data event battery swap battery runs power palmone claims flash memory plus majority consumers since many want charge handheld often consumes less overall power nvfs uses brand-new data architecture might render incompatible applications ran well non-nvfs handhelds nvfs file system designed use clusters 512 byte blocks power users complained files take approximately 33 space volatile file systems fact volatile file system uses block size 14 bytes compared nvfs file system minimum block size 512 bytes palmone responded complaint offering free 128 megabyte sd card request selected customers nvfs early release palm time palmone would commit work rom flash update reduce overhead nvfs architecture currently palm-branded products using nvfs shipped nvfs fix already installed tungsten e2 uses 4kb blocks recommended earlier versions palm treo 650 tungsten t5 install nvfs fix earliest possible convenience controversy gave tungsten t5 treo 650 unfavorable remarks power users palmone released first sprint treo 650 updater designed ensure block size overhead reduced 512 bytes 16-32 bytes usually 32 bytes low 16 bytes depending file demand resulting drastic memory management efficiency improvements nvfs file system second update sprint treo 650 released june 16 2005 unlocked gsm firmware upgrade also released day second sprint treo 650 firmware update also improves efficiency nvfs file system addition addressing known problems prior release firmware update rogers wireless treo 650 firmware update quietly posted rogers wireless treo 650 support site shares bug fixes nvfs memory efficiency updates unlocked gsm version initial release palmone tungsten e2 verizon wireless treo 650 earthlink wireless treo 650 already nvfs memory system problems assessed according palm info center june 22 2005 palmone tungsten t5 version 1.1 update fixes nvfs file system inefficiency problem since release november 2004 version 1.1 update also updates tungsten t5 version number garnet 5.4.8 july 25 2005 cingular treo 650 fix officially released one fixes addressing inefficiency problems associated nvfs file system cingular treo 650 holders encouraged deploy flash rom update earliest time possible | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
12... | Test |
5,844 | 9 | Assignment_operator_(C++):assignment operator c++ c++ programming language assignment operator codice_1 operator used assignment like operators c++ overloaded copy assignment operator often called assignment operator special case assignment operator source right-hand side destination left-hand side class type one special member functions means default version generated automatically compiler programmer declare one default version performs memberwise copy member copied copy assignment operator may also programmer-declared compiler-generated copy assignment operator differs copy constructor must clean data members assignment target correctly handle self-assignment whereas copy constructor assigns values uninitialized data members example language permits overloaded assignment operator arbitrary return type including codice_2 however operator usually defined return reference assignee consistent behavior assignment operator built-in types returning assigned value allows using operator invocation expression instance control statements chained assignment also c++ standard library requires behavior user-supplied types deep copies objects made exception safety taken consideration one way achieve resource deallocation never fails however no-fail no-throw swap function available member subobjects class provides copy constructor destructor according rule three straightforward way implement copy assignment follows c++ supports assignment different classes via implicit copy constructor assignment operator destination instance class ancestor source instance class copying ancestor descendant objects could leave descendant fields uninitialized permitted | [
4564,
4302,
851
] | Train |
5,845 | 3 | List_of_devices_using_Mediatek_tablet_processors:list devices using mediatek tablet processors page contains list every major device using mediatek tablet processor organized chip devices uses section begin=header symtab25 | [
6082,
6421,
7890,
722,
2926,
5740,
5750,
5752,
5405,
5406,
1864,
67,
446,
451,
6165,
463,
804,
5472,
469,
4041,
3008,
3365,
6910,
7654,
6919,
1977,
2339,
2711,
550,
3786,
5576,
7364,
1284,
4879,
7376,
5585,
4537,
950,
4197,
5622,
278,
... | Test |
5,846 | 9 | Augmented_assignment:augmented assignment augmented assignment compound assignment name given certain assignment operators certain programming languages especially derived c augmented assignment generally used replace statement operator takes variable one arguments assigns result back variable simple example codice_1 expanded codice_2 similar constructions often available various binary operators general languages offering feature operators take variable one arguments return result type augmented assignment equivalent assigns result back variable place including arithmetic operators bitshift operators bitwise operators example following statement variation found many programs means find number stored variable x add 1 store result addition variable x simple seems may inefficiency location variable x looked twice compiler recognize two parts expression identical x might reference array element complexity comparison augmented assignment version version excuse compiler failing generate code looks location variable x modifies place course machine code supports sequence instance x simple variable machine code sequence might something like code would generated forms special op code might meaning modify memory adding 1 x decent compiler would generate code forms machine codes offer inc dec operations add subtract one others might allow constants one generally form stands operator always may special op codes help still possibility x complicated entity compiler encouraged avoid duplication accessing x course x lengthy name less typing required last basis similar feature algol compilers offered via burroughs b6700 systems using tilde symbol stand variable assigned would become forth general x =~ 1 producing optimum code would remain province compiler expression-oriented programming languages c assignment augmented assignment expressions value allows use complex expressions however produce sequences symbols difficult read understand worse mistype easily produce different sequence gibberish although accepted compiler produce desired results languages python assignment augmented assignment statements expressions thus used complex expressions example following valid c valid python assignment languages augmented assignment form right-associative assignment languages c c++ python augmented assignment assignment location includes function calls mandated call functions i.e statement function codice_3 mandated called language implements augmented assignment macro expansion codice_3 called twice c c++ c assignment operator augmented follows called compound assignment operator said languages following list though complete all-inclusive lists major programming languages support augmented assignment operators | [
361,
2451,
5983,
4302,
993,
6428,
3955,
1361,
1435,
7277,
6029,
3981,
5506,
5965,
171,
2619,
5091,
5190
] | Test |
5,847 | 5 | Port_(computer_networking):port computer networking computer networking port communication endpoint physical well wireless connections terminated ports hardware devices software level within operating system port logical construct identifies specific process type network service ports identified protocol address combination 16-bit unsigned numbers commonly known port number common protocols use port numbers transmission control protocol tcp user datagram protocol udp port number always associated ip address host protocol type communication completes destination origination network address message specific port numbers commonly reserved identify specific services arriving packet easily forwarded running application purpose lowest numbered 1024 port numbers identify historically commonly used services called well-known port numbers higher-numbered ports available general use applications known ephemeral ports used service enumeration ports provide multiplexing service multiple services multiple communication sessions one network address client–server model application architecture multiple simultaneous communication sessions may initiated service port number 16-bit unsigned integer thus ranging 0 65535 tcp port number 0 reserved used udp source port optional value zero means port process associates input output channels via internet socket type file descriptor transport protocol ip address port number known binding enables process send receive data via network operating system networking software task transmitting outgoing data application ports onto network forwarding arriving network packets processes matching packet ip address port number tcp one process may bind specific ip address port combination common application failures sometimes called port conflicts occur multiple programs attempt use port number ip address protocol applications implementing common services often use specifically reserved well-known port numbers receiving service requests clients process known listening involves receipt request well-known port establishing one-to-one server-client dialog using local port number clients may continue connect listening port works tcp connection identified tuple consisting local address local port remote address remote port well-known ports defined convention overseen internet assigned numbers authority iana core network services world-wide web typically use well-known port numbers many operating systems special privileges required applications bind ports often deemed critical operation ip networks conversely client end connection typically uses high port number allocated short term use therefore called ephemeral port internet assigned numbers authority iana responsible global coordination dns root ip addressing internet protocol resources includes registration commonly used port numbers well-known internet services port numbers divided three ranges well-known ports registered ports dynamic private ports well-known ports also known system ports 0 1023 requirements new assignments range stricter registrations examples include registered ports 1024 49151 iana maintains official list well-known registered ranges dynamic private ports 49152 65535 one common use range ephemeral ports transport layer protocols transmission control protocol tcp user datagram protocol udp transfer data using protocol data units pdus tcp pdu segment datagram udp protocols use header field recording source destination port number port numbers encoded transport protocol packet header readily interpreted sending receiving computers also components networking infrastructure particular firewalls commonly configured differentiate packets based source destination port numbers port forwarding example application practice attempting connect range ports sequence single computer commonly known port scanning usually associated either malicious cracking attempts network administrators looking possible vulnerabilities help prevent attacks port connection attempts frequently monitored logged computers technique port knocking uses series port connections knocks client computer enable server connection example use ports internet mail system server used sending receiving email generally needs two services first service used transport email servers accomplished simple mail transfer protocol smtp smtp service application usually listens tcp port 25 incoming requests second service usually either post office protocol pop internet message access protocol imap used e-mail client applications users personal computers fetch email messages server pop service listens tcp port number 110 services may running host computer case port number distinguishes service requested remote computer user computer another mail server listening port number server well defined iana calls well-known ports client port number often chosen dynamic port range see applications clients server use specific port numbers assigned iana good example dhcp client always uses udp port 68 server always uses udp port 67 port numbers sometimes seen web uniform resource locators urls default http uses port 80 https uses port 443 url like nowiki http //www.example.com:8080/path/ /nowiki specifies web browser connects instead port 8080 http server concept port numbers established early developers arpanet informal co-operation software authors system administrators term port number yet used time preceded use term socket number early development stages network socket number remote host 40-bit quantity first 32 bits similar today ipv4 address time most-significant 8 bits host number least-significant portion socket number bits 33 40 entity called another eightbit number abbreviated aen today network socket refers related distinct concept namely internal address endpoint used within node march 26 1972 vint cerf jon postel called documenting then-current usages establishing socket number catalog rfc 322 network administrators asked submit note place phone call describing function socket numbers network service programs host catalog subsequently published rfc 433 december 1972 included list hosts port numbers corresponding function used host network first registry function served primarily documentation usage indicated port number usage conflicting hosts useful public services document promised resolution conflicts based standard postel published may 1972 rfc 349 first proposed official assignments port numbers network services suggested dedicated administrative function called czar maintain registry 256 values aen divided following ranges telnet service received first official assignment value 1 detail first set assignments early arpanet aen also called socket name used initial connection protocol icp component network control program ncp ncp forerunner modern internet protocols today terminology service name still closely connected port numbers former text strings used network functions represent numerical port number | [
1912,
3766,
4577,
8,
2991,
2281,
3945,
2192,
7806,
3855,
4771,
7170,
7173,
6531,
1462,
3861,
3105,
7637,
1554,
5039,
5571,
2117,
8090,
6908,
5933,
2219,
3383,
7835,
5143,
1708,
4887,
2043,
8108,
2681,
676,
4623,
3998,
3573,
4814,
5519,
... | Test |
5,848 | 4 | TorrentLocker:torrentlocker torrentlocker ransomware trojan targeting microsoft windows first observed february 2014 least five major releases made available december 2014 malware encrypts victim files similar manner cryptolocker implementing symmetric block cipher aes key encrypted asymmetric cipher torrentlocker scans system programs files conceals contents aes encryption leaving ransom instructions victim done pay decryption ransom operator demands victim amount usually starts around within 3 days victim told pay amount bitcoins sent unique bitcoin address differs infected user | [
2173,
2810,
7151,
5099,
7964,
6515,
4759,
6419,
3426,
104,
376,
1456,
2733,
3698,
651,
1376,
2577,
5401,
6823,
1766,
330,
3071,
6049,
2789,
74,
2354,
3680,
880
] | Test |
5,849 | 3 | VAXmate:vaxmate vaxmate ibm pc/at compatible personal computer introduced digital equipment corporation september 1986 replacement rainbow 100 standard form first commercial diskless personal computer operating system files could served vax/vms server running company vax/vms services ms-dos software went several name changes finally becoming pathworks alternatively optional expansion box containing either 20 mb 40 mb hard disk could purchased allowed operate conventional stand-alone pc basic system contained 8 mhz intel 80286 cpu 1 mbyte ram 1.2 mb rx33 5¼-inch floppy disk drive 14-inch diagonal amber green monochrome crt thinwire ethernet interface contained system unit also provided parallel printer port serial communications port separate mouse lk250 keyboard used device well expansion box 80287 numeric coprocessor could ordered option memory could expanded 2 mb another option 3 mb north america internal modem also available superseded decstation 200 300 january 1989 | [
5055,
2226,
2792,
7131,
4099,
4277,
352,
8117,
5911,
6784
] | Validation |
5,850 | 2 | Windows_Vista_networking_technologies:windows vista networking technologies computing microsoft windows vista windows server 2008 introduced 2007/2008 new networking stack named next generation tcp/ip stack improve previous stack several ways stack includes native implementation ipv6 well complete overhaul ipv4 new tcp/ip stack uses new method store configuration settings enables dynamic control require computer restart change settings new stack implemented dual-stack model depends strong host-model features infrastructure enable modular components one dynamically insert remove next generation tcp/ip stack connects nics via network driver interface specification ndis driver network stack implemented codice_1 implements transport network data link layers tcp/ip model transport layer includes implementations tcp udp unformatted raw protocols network layer ipv4 ipv6 protocols implemented dual-stack architecture data link layer also called framing layer implements 802.3 802.1 ppp loopback tunnelling protocols layer accommodate windows filtering platform wfp shims allows packets layer introspected also host wfp callout api networking api exposed via three components user interface configuring troubleshooting working network connections changed significantly prior versions windows well users make use new network sharing center see status network connections access every aspect configuration single icon notification area system tray represents connectivity network adapters whether wired wireless network browsed using network explorer replaces windows xp network places network explorer items shared device scanner file share network location awareness nla service uniquely identifies network exposes network attributes connectivity type applications determine optimal network configuration however applications use nla apis explicitly aware network connectivity changes adapt accordingly windows vista uses link layer topology discovery lltd protocol graphically present different devices connected network network map addition network map uses lltd determine connectivity information media type wired wireless map topologically accurate ability know network topology important diagnosing solving networking problems streaming content network connection device implement lltd appear network map icon representing device allowing users one-click access device user interface lltd invoked provides metadata device contains static state information mac address ipv4/ipv6 address signal strength etc windows vista classifies networks connects either public private domain uses network location awareness switch network types different network types different firewall policies open network public wireless network classified public restrictive network settings mode computers network trusted external access computer including sharing files printers disabled home network classified private enables file sharing computers computer joined domain network classified domain network network policies set domain controller network first connected windows vista prompts choose correct network type subsequent connections network service used gain information network connected automatically switch network configuration connected network windows vista introduces concept network profiles network system stores ip address dns server proxy server network features specific network network profile network subsequently connected settings need reconfigured ones saved profile used case mobile machines network profiles chosen automatically based networks available profile part either public private domain network windows vista networking stack supports dual internet protocol ip layer architecture ipv4 ipv6 implementations share common transport framing layers windows vista provides gui configuration ipv4 ipv6 properties ipv6 supported networking components services windows vista dns client use ipv6 transport internet explorer windows vista applications use wininet windows mail file sharing support literal ipv6 addresses windows firewall ipsec policies snap-in support ipv6 addresses permissible character strings ipv6 mode windows vista use link local multicast name resolution llmnr protocol described resolve names local hosts network dns server running service useful networks without central managing server ad hoc wireless networks ipv6 also used ppp-based dial-up pppoe connections windows vista also act client/server file sharing dcom ipv6 support dhcpv6 used ipv6 also included ipv6 even used full native ipv6 connectivity available using teredo tunneling even traverse ipv4 symmetric network address translations nats well full support multicast also included via mldv2 ssm protocols ipv6 interface id randomly generated permanent autoconfigured ipv6 addresses prevent determining mac address based known company ids nic manufacturers support wireless networks built network stack new set apis called native wifi emulate wired connections case previous versions windows allows implementation wireless-specific features larger frame sizes optimized error recovery procedures native wifi exposed auto configuration module acm replaces windows xp wireless zero configuration acm extensible developers incorporate additional wireless functionality automatic wireless roaming override automatic configuration connection logic without affecting built-in framework easier find wireless networks range tell networks open closed hidden wireless networks advertise name ssid better supported security wireless networks improved improved support newer wireless standards like 802.11i eap-tls default authentication mode connections made secure connection level supported wireless access point wpa2 used even ad-hoc mode windows vista also provides fast roaming service allow users move one access point another without loss connectivity preauthentication new wireless access point used retain connectivity wireless networks managed either connect network dialog box within gui netsh wlan command shell settings wireless networks also configured using group policy windows vista enhances security joining domain wireless network use single sign use credentials join wireless network well domain housed within network case radius server used peap authentication joining network ms-chap v2 authentication log domain bootstrap wireless profile also created wireless client first authenticates computer wireless network joins network stage machine still access domain resources machine run script stored either system usb thumb drive authenticates domain authentication done either using username password combination security certificates public key infrastructure pki vendor verisign windows vista features windows connect supports setting wireless network using several methods supported wi-fi protected setup standard implements native code api web services devices wsdapi support devices profile web services dpws also managed code implementation wcf dpws enables simpler device discoverability like upnp describes available services clients function discovery new technology serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection plug play extensions pnp-x allow network-connected devices appear local devices inside windows connected physically upnp support also enhanced include integration pnp-x function discovery windows vista networking stack also uses several performance optimizations allow higher throughput allowing faster recovery packet losses using high packet loss environment wireless networks windows vista uses newreno algorithm allows sender send data retrying case receives partial acknowledgement acknowledgement receiver part data received also uses selective acknowledgements sack reduce amount data retransmitted case portion data sent received correctly forward rto-recovery f-rto prevent unnecessary retransmission tcp segments round trip time increases also includes neighbour unreachability detection capability ipv4 ipv6 tracks accessibility neighboring nodes allows faster error recovery case neighboring node fails ndis 6.0 introduced windows vista supports offloading ipv6 traffic checksum calculations ipv6 improved manageability scalability performance reduced complexity ndis miniports simpler models writing lightweight filter drivers lwf lwf drivers combination ndis intermediate drivers miniport driver eliminate need write separate protocol miniport bypass mode examine selected control data paths tcp/ip stack also provides fail-back support default gateway changes periodically attempting send tcp traffic previously detected unavailable gateway provide faster throughput sending traffic primary default gateway subnet another significant change aims improve network throughput automatic resizing tcp receive window receive window rwin specifies much data host prepared receive limited among things available buffer space words measure much data remote transmitter send requiring acknowledgement outstanding data receive window small remote transmitter frequently find hit limit much outstanding data transmit even though enough bandwidth available transmit data leads incomplete link utilization using larger rwin size boosts throughput situations auto-adjusting rwin tries keep throughput rate high permissible bandwidth link receive window auto tuning functionality continually monitors bandwidth latency tcp connections individually optimize receive window connection window size increased high-bandwidth ~5 mbit/s+ high-latency 10ms situations traditional tcp implementations uses tcp slow start algorithm detect fast transmit without choking receiver intermediate nodes nutshell specifies transmission start slow rate transmitting packets number controlled congestion window – specifies number outstanding packets transmitted acknowledgement receipt receiver yet received acknowledgements received congestion window expanded one tcp segment time till acknowledgement fails arrive sender assumes congestion window size instant network gets congested however high bandwidth network sustain quite large congestion window without choking slow start algorithm take quite time reach threshold – leaving network under-utilized significant time new tcp/ip stack also supports explicit congestion notification ecn keep throughput hit due network congestion low possible without ecn tcp message segment dropped router buffer full hosts get notice building congestion packets start dropped sender detects segment reach destination due lack feedback congested router information extent reduction transmission rate needs make standard tcp implementations detect drop time waiting acknowledgement receiver sender reduces size congestion window limit amount data flight time multiple packet drops even result reset congestion window tcp maximum segment size tcp slow start exponential backoff additive increase produce stable network behaviour letting routers recover congestion however dropping packets noticeable impacts time-sensitive streams like streaming media takes time drop noticed retransmitted ecn support enabled router sets two bits data packets indicate receiver experiencing congestion yet fully choked receiver turn lets sender know router facing congestion sender lowers transmission rate amount router still congested set bits eventually sender slow even advantage approach router get full enough drop packets thus sender lower transmission rate significantly cause serious delays time-sensitive streams risk severe under-utilization bandwidth without ecn way routers tell hosts anything dropping packets ecn like random early drop except packets marked instead dropped caveat sender receiver well intermediate routers ecn-friendly router along way prevent use ecn considers ecn-marked packets invalid drops typically whole connection setup fails piece network equipment drops connection setup packets ecn flags set routers n't know ecn still drop packets normally ecn-hostile network equipment internet reason ecn disabled default enabled via codice_2 command previous versions windows processing needed receive transfer data one network interface done single processor even multi processor system supported network interface adapters windows vista distribute job traffic processing network communication among multiple processors feature called receive side scaling windows vista also supports network cards tcp offload engine certain hardware-accelerated tcp/ip-related functionality windows vista uses tcp chimney offload system offload cards framing routing error-correction acknowledgement retransmission jobs required tcp however application compatibility tcp data transfer functionality offloaded nic tcp connection setup remove load cpu traffic processing ipv4 ipv6 offloaded windows vista also supports netdma uses dma engine allow processors freed hassles moving data network card data buffers application buffers requires specific hardware dma architectures intel i/o acceleration enabled compound tcp modified tcp congestion avoidance algorithm meant improve networking performance applications enabled default pre-service pack 1 version windows vista enabled sp1 windows server 2008 uses different algorithm modify congestion window – borrowing tcp vegas tcp new reno every acknowledgement received increases congestion window aggressively thus reaching peak throughput much faster increasing overall throughput windows vista networking stack includes integrated policy-based quality service qos functionality prioritize network traffic quality service used manage network usage specific applications users throttling bandwidth available used limit bandwidth usage applications high priority applications real time conferencing applications run ensure get bandwidth need traffic throttling also used prevent large data transfer operations using available bandwidth qos policies confined application executable name folder path source destination ipv4 ipv6 addresses source destination tcp udp ports range ports windows vista qos policies applied application network layer thus eliminating need rewrite applications using qos apis qos-aware qos policies either set per-machine basis set active directory group policy objects ensures windows vista clients connected active directory container domain site organizational unit enforce policy settings windows vista supports wireless multimedia wmm profile classes qos wireless networks certified wi-fi alliance bg background data best effort non real time data vi real time videos vo real time voice data wireless access point well wireless nic supports wmm profiles windows vista provide preferential treatment data sent windows vista includes specialized qos api called qwave quality windows audio/video experience pre-configured quality service module time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real-time data gets little delays possible providing high quality channel data packets qwave intended ensure real-time transport multimedia networks within wireless network qwave supports multiple simultaneous multimedia well data streams qwave depend solely bandwidth reservation schemes provided rsvp providing qos guarantees bandwidth wireless network fluctuates constantly result also uses continuous bandwidth monitoring implement service guarantees applications explicitly use qwave apis use service multimedia application requests qwave initiate new media stream qwave tries reserve bandwidth using rsvp time uses qos probes make sure network enough bandwidth support stream conditions met stream allowed prioritized applications eat share bandwidth however environmental factors affect reception wireless signals reduce bandwidth even stream allowed access reserved bandwidth due qwave continuously monitors available bandwidth decreases application informed creating feedback loop adapt stream fit lower bandwidth range bandwidth available qwave automatically reserves informs application improvement probing quality network probe packets sent source statistics round trip time loss latency jitter etc path analyzed results cached probe repeated specific time intervals update cache whenever stream requested cache looked qwave also serializes creation multiple simultaneous streams even across devices probes sent one stream interfered others qwave uses client side buffers keep transmission rate within range slowest part network access point buffers overwhelmed thus reducing packet loss qwave works best source sink client multimedia stream qwave aware also wireless access point ap needs qos-enabled supporting bandwidth reservation also work without qos-aware aps however since qwave reserve bandwidth case depend application adapt stream based available bandwidth affected network conditions data network well qwave also available devices part windows rally technologies order provide better security transferring data network windows vista provides enhancements cryptographic algorithms used obfuscate data support 256-bit 384-bit 512-bit elliptic curve diffie–hellman ecdh algorithms well 128-bit 192-bit 256-bit advanced encryption standard aes included network stack direct support ssl connections new winsock api allows socket applications directly control security traffic network providing security policy requirements traffic querying security settings rather add extra code support secure connection computers running windows vista part logically isolated networks within active directory domain computers logical network partition able access resources domain even though systems may physically network unless logical partition wo n't able access partitioned resources system may part multiple network partitions windows vista also includes extensible authentication protocol host eaphost framework provides extensibility authentication methods commonly used protected network access technologies 802.1x ppp allows networking vendors develop easily install new authentication methods known eap methods planned feature new tcp/ip suite known routing compartments utilized per-user routing table thus compartmentalizing network according user needs data one segment would go another feature however removed release windows vista slated included possibly future release windows windows vista also introduces network access protection nap makes sure computers connecting network conform required level system health set administrator network nap enabled network windows vista computer attempts join network verified computer up-to-date security updates virus signatures factors including configuration ipsec 802.1x authentication settings specified network administrator granted full access network criteria met failing may either denied access network granted limited access certain resources may optionally granted access servers provide latest updates updates installed computer granted access network however windows vista nap client i.e. client computer connects nap enabled network health policy verification servers running windows server 2008 ipsec configuration fully integrated windows firewall advanced security snap-in netsh advfirewall command-line tool prevent contradictory rules offer simplified configuration along authenticating firewall advanced firewall filtering rules exceptions ipsec policies set domain public private profiles source destination ip addresses ip address range source destination tcp udp ports multiple ports specific types interfaces icmp icmpv6 traffic type code services edge traversal ipsec protection state specified users computers based active directory accounts prior windows vista setting maintaining ipsec policy configuration many scenarios required setting set rules protection another set rules traffic exemptions ipsec nodes windows vista communicate simultaneously negotiating protected communications response received negotiation completes subsequent communications protected eliminates need set ipsec filters exemptions set hosts support ipsec allows setting required incoming protected initiated communication optional outgoing communication ipsec also allows securing traffic domain controllers member computers still allowing clear text domain joins communication types ipsec protected domain joins allowed using ntlm v2 domain controllers member computers running windows server 2008 windows vista respectively ipsec fully supports ipv6 authip allows second authentication integration nap authenticating health certificate network diagnostics framework support failed ipsec negotiation new ipsec performance counters improved detection cluster node failure faster renegotiation security associations support stronger algorithms main mode negotiation stronger dh algorithms suite b data integrity encryption aes cbc aes-gmac sha-256 aes-gcm ability assist user diagnosing network problem expected major new networking feature extensive support runtime diagnostics wired wireless networks including support tcp management information base mib -ii better system event logging tracing vista tcp/ip stack also supports estats defines extended performance statistics tcp help determining cause network performance bottlenecks windows vista inform user causes network transmission failure incorrect ip address incorrect dns default gateway settings gateway failure port use blocked receiver ready dhcp service running netbios tcp/ip name resolution failure etc transmission errors also exhaustively logged analyzed better find cause error windows vista greater awareness network topology host computer using technologies universal plug play new network awareness technology windows vista provide help user fixing network issues simply provide graphical view perceived network configuration windows vista network stack includes windows filtering platform allows external applications access hook packet processing pipeline networking subsystem wfp allows incoming outgoing packets filtered analyzed modified several layers tcp/ip protocol stack wfp inbuilt filtering engine applications need write custom engine need provide custom logic engine use wfp includes base filtering engine implements filter requests packets processed using generic filtering engine also includes callout module applications providing custom processing logic hooked wfp put uses inspecting packets malware selective packet restriction firewalls providing custom encryption systems among others upon initial release wfp plagued bugs including memory leaks race conditions windows firewall windows vista implemented wfp windows vista includes significant peer-to-peer support introduction new apis protocols new version peer name resolution protocol pnrp v2 well set peer distributed routing table peer graphing peer grouping peer naming peer identity management apis introduced contacts created administered new peer-to-peer subsystem—serverless presence allows users manage real-time presence information track presence registered users across subnet internet new people near service allows discovery management contacts subnet uses windows contacts manage store contact information new capabilities allows peers send application invitations peers ad-hoc collaboration also supported without centralized server windows meeting space example application pnrp also allows creating overlay network called graph peer overlay network corresponds node graph nodes graph share book-keeping information responsible functioning network whole example distributed resource management network node resource needs shared information shared records flooded peers graph peer stores record local database record consists header body body contains data specific application using api header contains metadata describe data body name-value pairs serialized using xml addition author version information also contain index body data fast searching node connect nodes directly well communication need shared entire graph api also allows creation secure overlay network called group consisting subset nodes graph group shared multiple applications unlike graph peers group must identifiable unique named registered using pnrp digital signature certificate termed group member certificate gmc records exchanged digitally signed peers must invited group invitation contains gmc enables join group new windows internet computer names wicn peer networking feature allows ipv6-connected machine obtain custom unique domain name computer connected internet users specify secured unsecured host name computer console command without requiring register domain name configuring dynamic dns wicn used application accepts ip address dns name pnrp performs domain name resolution peer-to-peer level another planned feature windows vista would provided new domain-like networking setup known castle make release castle would made possible identification service provides user authentication members network without centralized server would allowed user credentials propagate across peer-to-peer network making suitable home network people near formerly people nearby peer-to-peer service designed simplify communication collaboration among users connected subnet people near used windows meeting space collaboration contact discovery people near listed part microsoft mobile platform strategy revealed windows hardware engineering conference 2004 people near uses windows contacts manage contact information default user may receive invitations users connected subnet user designate another user trusted contact enable collaboration across internet increase security determine presence contacts new background intelligent transfer service bits 3.0 new feature called neighbor casting supports peer-to-peer file transfers within domain facilitates peer caching allows users download serve content wsus updates peers subnet receive notification file downloaded access temporary file download progress control http redirects saves bandwidth network reduces performance load server bits 3.0 also uses internet gateway device protocol counters accurately calculate available bandwidth http kernel mode driver windows vista http.sys enhanced support server-side authentication logging idn hostnames event tracing better manageability netsh http new performance counters wininet protocol handler http ftp handles ipv6 literal addresses includes support gzip deflate decompression improve content encoding performance internationalized domain names support event tracing winhttp client api server-based applications services supports ipv6 autoproxy http/1.1 chunked transfer encoding larger data uploads ssl client certificates server proxy authentication automatic handling redirects keep-alive connections http/1.0 protocol including support keep-alive persistent connections session cookies winsock updated new apis support event tracing winsock layered service provider support enhanced logged installations removals new api reliably installing lsps command reliably remove lsps facilities categorize lsps remove lsps processing path system critical services support network diagnostics framework winsock kernel wsk new transport-independent kernel-mode network programming interface npi provides tdi client developers sockets-like programming model similar supported user-mode winsock sockets programming concepts exist user-mode winsock socket creation bind connect accept send receive winsock kernel completely new programming interface unique characteristics asynchronous i/o uses irps event callbacks enhance performance tdi supported windows vista backward compatibility new version server message block smb protocol introduced windows vista number changes improve performance add additional capabilities windows vista later operating systems use smb 2.0 communicating machines running windows vista later smb 1.0 continues use connections previous version windows samba samba 3.6 also includes support smb 2.0 remote differential compression rdc client-server synchronization protocol allows data synchronized remote source using compression techniques minimize amount data sent across network synchronizes files calculating transferring differences on-the-fly therefore rdc suitable efficient synchronization files updated independently network bandwidth small scenarios files large differences small windows vista bluetooth stack improved support hardware ids edr performance improvements adaptive frequency hopping wi-fi co-existence synchronous connection oriented sco protocol support needed audio profiles windows vista bluetooth stack supports kernel mode device driver interface besides user-mode programming interface enables third parties add support additional bluetooth profiles sco sdp l2cap lacking windows xp service pack 2 built-in bluetooth stack entirely replaced third-party stack additional profile support also provides rfcomm support using sockets besides virtual com ports kb942567 called windows vista feature pack wireless adds bluetooth 2.1+edr support remote wake s3 s4 support self-powered bluetooth modules feature pack initially available oems eventually included windows vista service pack 2 | [
7149,
1068,
3937,
3263,
6420,
714,
378,
2198,
720,
1460,
6096,
1097,
2566,
2928,
1475,
5747,
739,
7553,
3640,
5410,
7564,
7565,
7567,
2953,
6840,
422,
6844,
2245,
432,
435,
5442,
3338,
4014,
4017,
3340,
5090,
6504,
7602,
4022,
4026,
760... | Validation |
5,851 | 8 | URL_Subscription_Architecture:url subscription architecture url subscription architecture urlsa open system subscribing frequently updated digital content web blogs news stories private conversations designed alternative rss supports social subscribing private subscriptions rich content urlsa users subscribe users url content subscribed notified content url updated users typically maintain list subscriptions everything news stories conversations architecture allows users generate private content conversation photo album fly subscribe users fact urlsa content-less architecture users subscribe url content rather content means virtually type content addressable url made subscribable urlsa specifies strict protocol behavior followed creating updating cancelling subscriptions contrast rss data format architecturally urlsa activity happens two types independent applications subscription managers host user accounts content providers provide subscribable urls interact mainly via set well-defined web service calls user subscribes url subscription manager contacts url content provider establishes subscription urlsa user also subscribe another user url assuming subscribing user given permission user subscribes someone else url subscription manager contacts user subscription manager initiates subscribing mechanism behalf user user subscribed url content provider notify updates content url update happens content provider immediately pushes notification users subscribed url time user may unsubscribe url time updates cease interprocess communication urlsa conducted via web services exception updates transmitted udp datagrams reasons efficiency | [
2086,
6986,
84
] | Test |
5,852 | 6 | ISAM:isam isam acronym indexed sequential access method method creating maintaining manipulating indexes key-fields extracted random data file records achieve fast retrieval required file records ibm developed isam mainframe computers today term used several related concepts isam system data organized records composed fixed length fields records stored sequentially originally speed access tape system secondary set hash tables known indexes contain pointers tables allowing individual records retrieved without search entire data set departure contemporaneous navigational databases pointers data stored inside records key improvement isam indexes small searched quickly thereby allowing database access records needs additional modifications data require changes data table indexes question isam file created index nodes fixed pointers change inserts deletes occur later content leaf nodes change afterwards consequence inserts leaf node exceed node capacity new records stored overflow chains many inserts deletions table overflow chains gradually become large affects time required retrieval record relational databases easily built isam framework addition logic maintain validity links tables typically field used link foreign key indexed quick lookup slower simply storing pointer related data directly records also means changes physical layout data require updating pointers—the entry still valid isam simple understand implement primarily consists direct sequential access database file also inexpensive tradeoff client machine must manage connection file accesses turn leads possibility conflicting inserts files leading inconsistent database state typically solved addition client-server framework marshals client requests maintains ordering basic concept behind database management system dbms client layer underlying data store isam replaced ibm methodology called vsam virtual storage access method still later ibm developed db2 2004 ibm promotes primary database management system vsam physical access method used db2 openvms operating system uses files-11 file system conjunction rms record management services rms provides additional layer application files disk provides consistent method data organization access across multiple 3gl 4gl languages rms provides four different methods accessing data sequential relative record number access record file address access indexed access indexed access method reading writing data provides desired outcome fact file organized isam file appropriate previously defined keys access data via previously defined key extremely fast multiple keys overlapping keys key compression within hash tables supported utility define/redefine keys existing files provided records deleted although garbage collection done via separate utility isam developed time core memory scarce resource accordingly ibm designed system use minimum amount memory tradeoff channel control unit disk kept busier isam file consists collection data records two three levels index track index contains highest key disk track cylinder indexes cylinder index stores highest key cylinder disk address corresponding track index optional master index usually used large files contains highest key cylinder index track disk address cylinder index file loaded data records moved inserted records placed separate overflow area locate record key indexes disk searched complex self-modifying channel program increased busy time channel control unit disk increased physical virtual memory sizes later systems seen inefficient vsam developed alter tradeoff memory usage disk activity isam use self-modifying channel programs later caused difficulties cp-67 support os/360 since cp-67 copied entire channel program fixed memory i/o operation started translated virtual addresses real | [
4290,
3255,
8159,
1255,
5105,
7618,
1449,
6957,
2286,
7978,
7264,
7182,
1851,
1105,
7003,
4708,
839,
7783,
6462,
5852,
7661,
6213,
3221,
2054,
2596,
7024,
519,
5252,
607,
5081,
3233,
6853,
7040,
3244,
4647
] | Test |
5,853 | 3 | LGA_1155:lga 1155 lga 1155 also called socket h2 socket used intel microprocessors based sandy bridge 2nd-gen 32nm 2k-series ivy bridge 3rd-gen 22nm 3k-series microarchitectures successor lga 1156 known socket h succeeded lga 1150 2013 lga 1155 1155 protruding pins make contact pads processor pins arranged 40×40 array 24×16 central void additional 61 omitted pins two adjoining central void six four corners 35 groups around perimeter yielding 1600 − 384 − 61 1155 pin count processors lga 1155 lga 1156 sockets compatible since different socket notches lga 1155 also marked beginning secure boot support later boards 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable cooling systems compatible lga 1155 lga 1156 sockets processors dimensions profile construction similar levels heat production sandy bridge chipsets except b65 q65 q67 support sandy bridge ivy bridge cpus bios upgrade sandy bridge based processors officially support ddr3-1333 memory however practice speeds ddr3-2133 tested work successfully h61 chipset supports one double-sided dimm memory module ram module per memory-channel therefore limited 16 gb instead 32 gb like others support h61-based motherboards four dimm slots four single-sided dimms installed ivy bridge chipsets motherboards support sandy bridge ivy bridge cpus ivy bridge based processors officially support ddr3-1600 ddr3-1333 sandy bridge consumer ivy bridge chipsets also allow overclocking k-series processors pcghx user wrote article website describing take uefi modules z97 motherboards use z77-motherboard make later support booting ssd using nvm express protocol instead ahci protocol article claims z97 motherboards first officially fully support nvme protocol als erstes gilt es die fraglichen module aus einem möglichst ähnlichen bios der z97-generation zu extrahieren dies ist die erste generation von mainboards die nvme-laufwerke nativ unterstützt mods described also work b75 chipset motherboards | [
2541,
4123,
3849,
3443,
1729,
2828,
6173,
7974,
2830,
3002,
4314,
5379,
3193,
1841,
1645,
6014,
3203,
4968,
3385,
4972,
3565,
2685,
6935,
7484,
8021,
7302,
5963,
866,
3333,
3063,
7134,
262,
6683,
5886
] | Train |
5,854 | 7 | Portable_object_(computing):portable object computing distributed programming portable object object accessed normal method call possibly residing memory another computer portable sense moves machine machine irrespective operating system computer architecture mobility end goal many remote procedure call systems advantage portable objects easy use expressive allowing programmers completely unaware objects reside locations detractors cite fault naïve programmers expect network-related errors unbounded nondeterminism associated large networks | [
4685,
6989,
6922,
5571,
4105,
1198
] | Test |
5,855 | 9 | Comparison_of_programming_languages_(functional_programming):comparison programming languages functional programming page provides comparison tables functional programming instructions programming languages comparison basic instructions imperative paradigm provided comparison basic instructions | [
1345,
7333,
4302,
109,
4053,
6277,
2661,
7005,
7460,
666,
4067,
4164,
1114,
5855,
7844,
3898,
5510,
2871,
7394,
2881,
5965,
1804
] | Validation |
5,856 | 4 | Norton_Insight:norton insight norton insight whitelists files based reputation norton-branded antivirus software leverages data skip known files virus scans symantec claims quicker scans accurate detection use technology insight codenamed mr. clean initial aim help users determine programs internet safe install mr. clean would provide risk assessment discern safe malicious files however goal later changed making virus scans efficient instead scanning every file known files skipped cutting scanning times norton community watch voluntary anonymous service allows user norton product forward information symantec servers among data collected processes running sha256 values reappearing hash value corresponding file whitelisted norton insight checks processes user computer whitelist matching processes excluded scanning process trusted deemed safe excluded risk scanning two trust levels standard high third option disable norton insight standard trust processes appearing majority participants computers deemed safe high trust addition excludes digitally signed files scanning norton analyzes ntfs file system upon startup unaccounted changes found trust values processes system revoked case mistake revocation mechanism implemented clients receive list revoked sha256 values via liveupdate client file matching sha256 currently trusting file trust revoked file scanned norton file insight feature released norton 2010 products norton download insight feature provides insight files download install computer file insight give reputation information locates file computer well feature copies information users clipboard supports norton download insight feature assizes reputation file file insight window provides following information upon release download insight program would erroneously flags downloaded file digital signature version number therefore potential threat tech herald tested norton internet security 2009 found insight affected system performance whitelisting files scans publication also noted total number files scanned number trusted skipped files varied scan average amount time insight took scan 561 megabyte folder 21,816 clean files 0:00:24:41 despite oddities editor observed norton internet security 2009 faster subsequent products | [
3842,
4759,
1534,
5552,
4398,
4138,
5571,
2032,
7738,
5401,
2488,
1666,
7309,
4645,
7413,
7597,
6962
] | Test |
5,857 | 4 | Tiger_(security_software):tiger security software tiger security software unix-like computer operating systems used security audit tool host-based intrusion detection system supports multiple unix platforms tiger free gpl license unlike tools needs posix tools written entirely shell language tiger based set modular scripts run either together independently check different aspects unix system including review tiger originally developed douglas lee schales dave k. hess khalid warraich dave r. safford 1992 texas university three different forks evolved tiger tara developed advanced research computing tiger analytical research assistant one internally developed hp corporation bryan gartner last one developed debian gnu/linux distribution javier fernández-sanguino current upstream maintainer forks aimed making tiger work newer versions different unix operating systems forks merged may 2002 june 2002 new source code labeled 3.0 release published download section newly created savannah site following merge following releases published tiger interesting features including modular design easy expand used audit tool host-based intrusion detection system tool described program manpage tiger complements intrusion detection system ids network ids snort kernel log-based intrusion detection system lids snare linux systrace openbsd example integrity checkers many aide integrit samhain tripwire ... logcheckers providing framework work together checking system configuration status | [
1019,
4257,
5538,
5571,
2684,
3680,
578,
294,
2466
] | Test |
5,858 | 7 | Transparency_(human–computer_interaction):transparency human–computer interaction change computing system new feature new component transparent system change adheres previous external interface much possible changing internal behaviour purpose shield change systems human users end interface confusingly term refers overall invisibility component refer visibility component internals white box open system term transparent widely used computing marketing substitution term invisible since term invisible bad connotation usually seen something user ca n't see control term transparent good connotation usually associated hiding anything vast majority times term transparent used misleading way refer actual invisibility computing process misleading counter-intuitive definition modern computer literature tends prefer use agnostic transparent term used particularly often regard abstraction layer invisible either upper lower neighbouring layer also temporarily used later around 1969 ibm honeywell programming manuals term referred certain computer programming technique application code transparent clear low-level detail device-specific management contained logic solving main problem achieved encapsulation – putting code modules hid internal details making invisible main application example network file system transparent introduces access files stored remotely network way uniform previous local access file system user might even notice using folder hierarchy early file transfer protocol ftp considerably less transparent requires user learn access files ftp client similarly file systems allow transparent compression decompression data enabling users store files medium without special knowledge file systems encrypt files transparently approach require running compression encryption utility manually software engineering also considered good practice develop use abstraction layers database access application work different databases abstraction layer allows parts program access database transparently see data access object example object-oriented programming transparency facilitated use interfaces hide actual implementations done different underlying classes transparency means form distributed system hide distributed nature users appearing functioning normal centralized system many types transparency formal definitions concepts found rm-odp open distributed processing reference model iso 10746 degree properties achieved may vary widely every system hide everything users instance due existence fixed finite speed light always latency accessing resources distant user one expects real-time interaction distributed system may noticeable | [
4469,
3916,
2054,
8150,
1382,
1803
] | Test |
5,859 | 6 | Apple_Filing_Protocol:apple filing protocol apple filing protocol afp formerly appletalk filing protocol proprietary network protocol part apple file service afs offers file services macos classic mac os macos afp one several file services supported others including server message block smb network file system nfs file transfer protocol ftp webdav afp currently supports unicode file names posix access control list permissions resource forks named extended attributes advanced file locking mac os 9 earlier afp primary protocol file services afp versions 3.0 greater rely exclusively tcp/ip port 548 427 establishing communication supporting appletalk service discovery protocol afp 2.x family supports tcp/ip using data stream interface appletalk communication service discovery many third-party afp implementations use afp 2.x thereby supporting appletalk connection method still earlier versions rely exclusively appletalk reason older literature refers afp appletalk filing protocol literature may refer afp appleshare name mac os 9 earlier afp client notable current compatibility topics early implementations afp server software available mac os starting system 6 appleshare appleshare ip early 1.x releases mac os x server client operating systems afp called personal file sharing supported ten simultaneous connections afp implementations relied version 1.x 2.x protocol appleshare ip 5.x 6.x 1.x releases mac os x server introduced afp version 2.2 first version offer transport connections using tcp/ip well appletalk also increased maximum share point size four gibibytes two tebibytes although maximum file size could stored remained two gibibytes due limitations original mac os changes made afp since version 3.0 represent major advances protocol introducing features designed specifically mac os x clients however like appleshare client original mac os afp client mac os x continues support type creator codes along filename extensions afp 3.0 introduced mac os x server 10.0.3 used mac os x server 10.1.5 first version use unix-style posix permissions model unicode utf-8 file name encodings version 3.0 supported maximum share point file size two tebibytes maximum file size volume size mac os x version 10.2 note maximum file size changed version 2.2 described afp 3.0 31 bytes maximum length filename sent afp afp 3.1 introduced mac os x server version 10.2. notable changes included support kerberos authentication automatic client reconnect nfs resharing secure afp connections via secure shell ssh maximum share point file size increased 8 tebibytes mac os x server 10.2 16 tebibytes mac os x server 10.3 afp 3.2 adds support access control lists extended attributes mac os x server 10.4 maximum share point size least 16 tebibytes although apple published limits document mac os x server 10.4 afp 3.2+ introduced mac os x leopard adds case sensitivity support improves support time machine synchronization lock stealing sleep notifications afp 3.3 mandates support replay cache functionality required time machine afp 3.4 introduced os x mountain lion includes minor change mapping posix errors afp errors see apple developer documentation afp version differences mac os x tiger users connect afp servers browsing network globe entering afp uniform resource locator url connect server dialog mac os x leopard later releases afp shares displayed finder side-bar afp urls take form afp // server share server server ip address domain name system dns name bonjour name share name share point snow leopard later url form afp // server share path used mount subdirectory underneath share point macos also offers personal file sharing light implementation current version afp mac os x 10.4 users share contents public folders checking personal file sharing sharing section system preferences afp urls appletalk servers took form afp //at/ appletalk name appletalk zone networks without appletalk zones asterisk would substituted zone name third party server implementations afp available number companies | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
405,
6117,
759,
7214,
6854,
5437,
6860,
4375,
6500,
6505,
3685,
5457,
460,
1534,
5109,
7976,
4406,
821,
7258,
1189,
2300,
5130,
1561,
836,
5843,
2313,
6558,
2324,
2683,
5865,
4444,
5518,
6231,
8... | Validation |
5,860 | 1 | Digital_curation:digital curation digital curation selection preservation maintenance collection archiving digital assets digital curation establishes maintains adds value repositories digital data present future use often accomplished archivists librarians scientists historians scholars enterprises starting use digital curation improve quality information data within operational strategic processes successful digital curation mitigate digital obsolescence keeping information accessible users indefinitely progressively digital curation acts umbrella concept includes many subsets appearing related terms digital asset management data curation digital preservation electronic records management term curation past commonly referred museum library professionals since applied interaction social media including compiling digital images web links movie files term “ digital curation ” first used e-science biological science fields means differentiating additional suite activities ordinarily employed library museum curators add value collections enable reuse smaller subtask simply preserving data significantly concise archival task additionally historical understanding term “ curator ” demands simple care collection curator expected command academic mastery subject matter requisite part appraisal selection assets subsequent adding value collection application metadata five commonly accepted principles govern occupation digital curation digital curation center offers following step-by-step life cycle procedures putting principles practice sequential actions occasional actions term digital curation sometimes used interchangeably terms digital preservation digital archiving digital preservation focus significant degree energy optimizing reusability preservation remains subtask concept digital archiving turn subtask digital curation example archiving part curation subsequent tasks themed collection-building considered archival task similarly preservation part archiving tasks selection appraisal necessarily part preservation data curation another term often used interchangeably digital curation however common usage two terms differs “ data ” all-encompassing term used generally indicate anything recorded binary form term “ data curation ” common scientific parlance usually refers accumulating managing information relative process research data-driven research education request role information professional gradually develop tradition digital service data curation particularly management digital research data documents discrete digital assets technically subset broader concept data context scientific vernacular digital curation represents broader purview responsibilities data curation due interest preserving adding value digital assets kind ever lowering cost increasing prevalence entirely new categories technology led quickly growing flow new data sets come well established sources business government trend also driven new styles sensors becoming embedded areas modern life particularly true consumers whose production digital assets longer relegated strictly work consumers create wider ranges digital assets including videos photos location data purchases fitness tracking data name share wider ranges social platforms additionally advance technology introduced new ways working data examples international partnerships leverage astronomical data create “ virtual observatories ” similar partnerships also leveraged data resulting research large hadron collider cern database protein structures protein data bank comparison archiving analog assets notably passive nature often limited simply ensuring suitable storage environment digital preservation requires proactive approach today ’ artifacts cultural significance notably transient nature prone obsolescence social trends dependent technologies change rapid progression technology occasionally makes necessary migrate digital asset holdings one file format another order mitigate dangers hardware software obsolescence would render asset unusable modern tools program planning often underestimate amount human labor costs required adequate digital curation large collections result cost-benefit assessments often paint inaccurate picture amount work involved true cost institution successful outcomes failures concept cost business field would obvious varieties business systems running daily operations example human resources systems deal recruitment payroll communication systems manage internal external email administration systems handle finance marketing aspects however business systems institutions designed long-term information preservation initially instances business systems revised become digital curation systems preserving transaction information due cost consideration example business systems enterprise content management ecm applications used designated group people business executives customers information management support key processes organizationally long run transfer digital content ecm applications digital curation dc applications would trend large organizations domestically internationally improvement maturity models ecm dc may add value information request cost deduction extensive use modification absence coordination across different sectors society industry areas standardization semantic ontological definitions forming partnerships proper stewardship assets resulted lack interoperability institutions partial breakdown digital curation practice standpoint ordinary user example coordination open archival information system oais oais reference model allows professionals many organizations individuals contribute efforts oais open forums developing international standards archival information long-term access curation digital objects limited strictly born-digital assets many institutions engaged monumental efforts digitize analog holdings effort increase access collections examples materials books photographs maps audio recordings process converting printed resources digital collections epitomized degree librarians related specialists example digital curation centre claimed world leading centre expertise digital information curation assists higher education research institutions conversions topics knowledge embodied forms conducive print choreography dance motion skilled workers artisans difficult encode new digital approaches 3d holograms computer-programmed expressions developing mathematics seems possible new common language developed would express mathematical ideas ways digitally stored linked made accessible global digital mathematics library project define develop language ability intended user community access repository ’ holdings equal importance preceding curatorial tasks must take account user community ’ format communication preferences also consideration communities access various legal privacy reasons three elements essential needs institutions dealing issues digital curation leadership resources collaboration three elements related role advance-guards librarians archivists working open approaches technology standardized process scholarly communication archivist leadership needs dynamic active role embrace technology standardized process scholarly communication addition archivist leader might adopt business concept methods deal workflow raise funds invest technology system comply industry standards order obtain resources collaboration archives digital curation community could provide share training technologies standards tools help institutions challengeable issues digital curation.digital preservation coalition dpc open preservation foundation novel partnerships offer collaboration opportunity institutions facing similar challenges digital curation issues information field especially libraries archives museums significantly need bring knowledge new technologies traditional graduate school education enough meet demand training program current staffs cultural repository would efficient supplement request professional workshops moocs massively open online courses data curation management international digital curation conference idcc established annual event since 2005 aiming collaborate individuals organizations institutions facing challenges supporting development exchanging ideas field international journal digital curation ijdc administered ijdc editorial board including editor-in-chief digital curation center dcc following members ijdc dedicate provide scholarly platform sharing discussing improving knowledge information digital curation within worldwide community ijdc two types submission editorial guidelines peer-reviewed papers general articles base original research field information relevant events digital curation ijdc published university edinburgh digital curation centre electronic form rolling basis two times year open access public supports knowledge exchangeable digital curation worldwide many approaches digital curation exist evolved time response changing technological landscape two examples sheer curation channelization sheer curation approach digital curation curation activities quietly integrated normal work flow creating managing data digital assets word sheer used emphasize lightweight virtually transparent nature curation activities term sheer curation coined alistair miles imagestore project uk digital curation centre scarp project approach depends curators close contact 'immersion data creators working practices example case study neuroimaging research group whyte et al. explored ways building digital curation capacity around apprenticeship style learning neuroimaging researchers share access datasets re-use experimental procedures sheer curation depends hypothesis good data digital asset management point creation primary use also good practice preparation sharing publication and/or long-term preservation assets therefore sheer curation attempts identify promote tools good practices local data digital asset management specific domains tools practices add immediate value creators primary users assets curation best supported identifying existing practices sharing stewardship re-use add value augmenting ways short-term benefits longer term reduce risks digital assets provide new opportunities sustain long-term accessibility re-use value aim sheer curation establish solid foundation curation activities may directly benefit creators primary users digital assets especially required ensure long-term preservation providing foundation curation activities may carried specialists appropriate institutional organisation levels whilst causing minimum interference others similar idea curation source used context laboratory information management systems lims refers specifically automatic recording metadata information data point capture developed apply semantic web techniques integrate laboratory instrumentation documentation systems sheer curation curation-at-source contrasted post hoc digital preservation project initiated preserve collection digital assets already created beyond period primary use channelization curation digital assets web often brands media companies continuous flows content turning user experience lean-forward interactive medium lean-back passive medium curation content done independent third party selects media number on-demand outlets across globe adds playlist offer digital channel dedicated certain subjects themes interests end user would see and/or hear continuous stream content | [
5641
] | Test |
5,861 | 3 | Autonomous_decentralized_system:autonomous decentralized system autonomous decentralized system ads decentralized system composed modules components designed operate independently capable interacting meet overall goal system design paradigm enables system continue function event component failures also enables maintenance repair carried system remains operational autonomous decentralized systems number applications including industrial production lines railway signalling robotics ads recently expanded control applications service application embedded systems thus autonomous decentralized service systems autonomous decentralized device systems autonomous decentralized systems first proposed 1977 ads received significant attention systems deployed japanese railway systems many years safely 7 billion trips proving value concept japan railway ads considered smart train also learns recognizing outstanding contribution dr. kinji mori received numerous awards including 2013 ieee life fellow 2012 distinguished service award tokyo metropolitan government 2012 distinguished specialist among 1000 world chinese government 2008 ieice fellow 1995 ieee fellow 1994 research development award excellence achievers science technology agency 1994 ichimura industrial prize 1992 technology achievement award society instrument control engineers 1988 national patent award science technology agency 1988 mainichi technology prize excellence dr. mori donated cash ichimura industrial price ieee fund ieee kanai award since 1977 ads subject research many researchers world including us japan eu particularly germany china ads decoupled architecture component subsystem communicates message passing using shared data fields unique feature ads central operating system coordinator instead subsystem manages functionality coordination subsystems subsystem needs interact subsystems broadcasts shared data fields containing request subsystems broadcast include identification address subsystem rather subsystems depending purpose function receive broadcast message make determination action take ads moves service-oriented architecture soa adss autonomous decentralized service system data transmission carried esb enterprise service bus agent service receives data esb acts according service specification results transmitted esb autonomous agents ads also similar blackboard system used ai collection agents act upon seeing data change common blackboard ads may include human loop human autonomous agents co-learn time perform system functionality cloud computing also uses autonomous computing architecture framework different ads one application ads software testing particularly combinatorial testing framework proposed based ads concurrent combinatorial testing using ar ta ieee international symposium autonomous decentralized systems isads major conference topic symposium biannual event first symposium held 1993 isads 1993 march 30 april 1 1993 kawasaki japan isads 1995: april 25–27 1995 phoenix arizona usa isads 1997:april 9–11 1997 berlin germany isads 1999:march 20–23 1999 tokyo japan isads 2001:march 26–28 2001 dallas texas usa isads 2003: april 9–11 2003 pisa italy isads 2005:april 4–8 2005 chengdu china isads 2007: march 21–23 2007 sedona arizona usa isads 2009: march 23–25 2009 athens greece isads 2011:june 29 july 1 2011 kobe japan isads 2013:march 6–8 2013 mexico city mexico isads 2015:march 25–27 2015 taichung taiwan | [
6025,
2961,
3531
] | Test |
5,862 | 3 | Laser_Squad:laser squad laser squad turn-based tactics video game originally released zx spectrum later commodore 64 amstrad cpc msx amiga atari st pc computers 1988 1992 designed julian gollop team target games later mythos games codo technologies published blade software expanding ideas applied previous rebelstar series games laser squad originally came five mission scenarios expansion pack released 8-bit versions containing two scenarios reaction gaming magazines positive gaining high review rating several accolades legacy game seen titles like x-com series especially acclaimed also created julian gollop initially conceived sequel laser squad laser squad turn-based tactics war game player completes objectives rescue retrieval operations simply eliminating enemy taking advantage cover squad level military tactics careful use weaponry squad team members maneuvering around map one time taking actions move turn shoot pick use unit action points heavily laden units may tire easily may rest avoid running action points quickly subsequent turns morale also plays factor unit witnessing deaths teammates panic run player control original target games 8-bit release came first three missions expansion pack offered via mail order next two subsequent blade software 8-bit release included standard mail order expansion pack offered missions six seven instead offers covered cassette floppy disk versions well featuring new scenarios expansion packs included additional weapons part scenarios including expansion pack seven scenarios total one difficulty settings squad allocation computer video games reviewing original zx spectrum version awarded near-perfect 97 score c+vg hit stating laser squad one hottest games 've ever played spectrum reviews included 89 sinclair user sinclair gave game 9/10 calling sophisticated strategy wargame ... par elite thinking warmongers game voted number 16 sinclair readers top 100 games time commodore 64 version also fared well cu amiga-64 giving 'cu screen star award 92 rating zzap 64 gave game score 83 stating game absorbing fresh approach man-to-man combat amstrad action awarded cpc version 91 'aa mastergame accolade expansion pack 2 received even higher rating 93 became available review two excellent additions game already excellent amiga version also received positive reviews amiga format awarded 'gold award 93 rating explaining terrific game superbly playable definitely recommended amiga reviews given zero cu amiga-64 gave game scores 88 87 respectively ranked 25th best amiga game ever amiga power 1991 2004 readers retro gamer voted laser squad 63rd top classic game rebelstar laser squad among earliest examples turn-based unit-level wargame video games 1990 mythos games released fantasy game lords chaos many similarities laser squad follow-up gollop earlier zx spectrum game laser squad franchise revived gollop codo technologies 2002 play-by-email game laser squad nemesis although departs turn-based action point system customizable weaponry many laser squad mechanics re-used later x-com series games created also gollop mythos games published microprose notably first x-com game began development laser squad ii name choices characters organizations games mythos codo thread connecting laser squad rebelstar games cover art firaxis games 2k games remake ufo enemy unknown pays homage laser squad | [
6380,
6159
] | Test |
5,863 | 1 | Apache_Solr:apache solr solr pronounced solar open-source enterprise-search platform written java apache lucene project major features include full-text search hit highlighting faceted search real-time indexing dynamic clustering database integration nosql features rich document e.g. word pdf handling providing distributed search index replication solr designed scalability fault tolerance solr widely used enterprise search analytics use cases active development community regular releases solr runs standalone full-text search server uses lucene java search library core full-text indexing search rest-like http/xml json apis make usable popular programming languages solr external configuration allows tailored many types application without java coding plugin architecture support advanced customization apache lucene apache solr produced apache software foundation development team 2004 solr created yonik seeley cnet networks in-house project add search capability company website january 2006 cnet networks decided openly publish source code donating apache software foundation like new apache project entered incubation period helped solve organizational legal financial issues january 2007 solr graduated incubation status standalone top-level project tlp grew steadily accumulated features thereby attracting users contributors committers although quite new public project powered several high-traffic websites september 2008 solr 1.3 released including distributed search capabilities performance enhancements among many others january 2009 solr enterprise search yonik seeley along grant ingersoll erik hatcher joined lucidworks formerly lucid imagination first company providing commercial support training apache solr search technologies since support offerings around solr abundant november 2009 saw release solr 1.4 version introduced enhancements indexing searching faceting along many improvements rich document processing pdf word html search results clustering based carrot2 also improved database integration release also features many additional plug-ins march 2010 lucene solr projects merged solr became lucene sub project separate downloads continued products jointly developed single set committers 2011 solr version number scheme changed order match lucene solr 1.4 next release solr labeled 3.1 order keep solr lucene version number october 2012 solr version 4.0 released including new solrcloud feature 2013 2014 saw number solr releases 4.x line steadily growing feature set improving reliability february 2015 solr 5.0 released first release solr packaged standalone application ending official support deploying solr war solr 5.3 featured built-in pluggable authentication authorization framework april 2016 solr 6.0 released added support executing parallel sql queries across solrcloud collections includes streamexpression support new jdbc driver sql interface september 2017 solr 7.0 released release among things added support multiple replica types auto-scaling math engine march 2019 solr 8.0 released including many bugfixes component updates solr nodes listen serve http/2 requests aware default internal requests also sent using http/2 furthermore admin ui login added support basicauth kerberos plotting math expressions apache zeppelin possible order search document apache solr performs following operations sequence solr individuals companies contribute new features bug fixes solr bundled built-in search many applications content management systems enterprise content management systems hadoop distributions cloudera hortonworks mapr bundle solr search engine products marketed big data datastax dse integrates solr search engine cassandra solr supported end point various data processing frameworks enterprise integration frameworks solr exposes industry standard http rest-like apis xml json support integrate system programming language supporting standards ease use also client libraries available java c php python ruby popular programming languages | [
6506,
7238,
2186,
894,
4303,
10,
5728,
901,
6428,
7805,
2741,
7444,
7896,
917,
5571,
5007,
6015,
3463,
3542,
3543,
3204,
1286,
4511,
2856,
5054,
6029,
840,
1392,
3031,
1665,
3558,
5408,
5677,
6748,
3479,
6387,
5075,
6137,
7488,
6821,
78... | Validation |
5,864 | 5 | Roccat_Browser:roccat browser roccat browser web browser designed os x ios currently developed runecats utilises webkit rendering engine roccat browser includes features roccat draw allows user annotate webpages within browser resource saver disables re-enables web plugins adobe flash player reducing processing power increasing battery life roccat flick allows user share websites network macs iphones ipads roccat browser also runs cloud system called rclouds lets backup tabs bookmarks settings things related browser roccat also provides unique tab system displays preview website within tab tab bar move top bottom either side placed drawer roccat also available ios devices ipad iphone mobile version features many features desktop counterpart | [
6788,
4575,
5571,
1237,
1670
] | Test |
5,865 | 6 | Virtual_file_system:virtual file system virtual file system vfs virtual filesystem switch abstract layer top concrete file system purpose vfs allow client applications access different types concrete file systems uniform way vfs example used access local network storage devices transparently without client application noticing difference used bridge differences windows classic mac os/macos unix filesystems applications access files local file systems types without know type file system accessing vfs specifies interface contract kernel concrete file system therefore easy add support new file system types kernel simply fulfilling contract terms contract might change incompatibly release release would require concrete file system support recompiled possibly modified recompilation allow work new release operating system supplier operating system might make backward-compatible changes contract concrete file system support built given release operating system would work future versions operating system one first virtual file system mechanisms unix-like systems introduced sun microsystems sunos 2.0 1985 allowed unix system calls access local ufs file systems remote nfs file systems transparently reason unix vendors licensed nfs code sun often copied design sun vfs file systems could plugged also implementation ms-dos fat file system developed sun plugged sunos vfs although n't shipped product sunos 4.1 sunos implementation basis vfs mechanism system v release 4 john heidemann developed stacking vfs sunos 4.0 experimental ficus file system design provided code reuse among file system types differing similar semantics e.g encrypting file system could reuse naming storage-management code non-encrypting file system heidemann adapted work use 4.4bsd part thesis research descendants code underpin file system implementations modern bsd derivatives including macos unix virtual file systems include file system switch system v release 3 generic file system ultrix vfs linux os/2 microsoft windows virtual file system mechanism called installable file system filesystem userspace fuse mechanism allows userland code plug virtual file system mechanism linux netbsd freebsd opensolaris macos microsoft windows virtual filesystems also implemented userland shell namespace extensions however support lowest-level file system access application programming interfaces windows applications able access file systems implemented namespace extensions kio gvfs/gio provide similar mechanisms kde gnome desktop environments respectively similar limitations although made use fuse techniques therefore integrate smoothly system sometimes virtual file system refers file group files necessarily inside concrete file system acts manageable container provide functionality concrete file system usage software examples containers cbfs storage single-file virtual file system emulator like pctask so-called winuae oracle virtualbox microsoft virtual pc vmware primary benefit type file system centralized easy remove single-file virtual file system may include basic features expected file system virtual otherwise access internal structure file systems often limited programs specifically written make use single-file virtual file system instead implementation driver allowing universal access another major drawback performance relatively low compared virtual file systems low performance mostly due cost shuffling virtual files data written deleted virtual file system direct examples single-file virtual file systems include emulators pctask winuae encapsulate filesystem data also emulated disk layout makes easy treat os installation like piece software—transferring removable media network amiga emulator pctask emulated intel pc 8088 based machine clocked 4.77mhz later 80486sx clocked 25 mhz users pctask could create file large size amiga filesystem file would virtually accessed emulator real pc hard disk file could formatted fat16 filesystem store normal ms-dos windows files uae windows winuae allows large single files windows treated amiga file systems winuae file called hardfile uae could also treat directory host filesystem windows linux macos amigaos amiga filesystem | [
4295,
4297,
7161,
13,
5744,
2942,
4341,
5760,
5762,
4347,
65,
5783,
2970,
4375,
1522,
7242,
1534,
4397,
1547,
4406,
7258,
5829,
126,
1561,
4423,
5843,
1574,
4435,
5859,
4441,
4444,
1596,
165,
1605,
7312,
174,
5884,
7325,
1624,
5900,
308... | Validation |
5,866 | 9 | IBM_Informix-4GL:ibm informix-4gl informix-4gl 4gl programming language developed informix mid-1980s includes embedded sql report writer language form language limited set imperative capabilities functions statements supports arrays etc. language particularly close natural language easy learn use two versions compiler either produce 1 intermediate byte code interpreter known rapid development system 2 c programming language code compilation c compiler machine-code executes faster compiles slower executables bigger specifically designed run client network connected ibm informix database engine service mechanism calling c programming language functions conversely called executing c programs rds version also features interactive debugger dumb terminals particular feature comprehensive error checking built final executable extremely helpful error messages produced compilers executables also features embedded modal statements changing compiler executable behaviour e.g causing compiler include memory structures matching database schema structures elements continue executing spite error conditions trapped later informix-4gl project started 1985 chris maloney chief architect roy harrington charge related informix turbo later renamed online engine bypassed cooked file system favour raw disk rapid application development tool called fourgen case tools bundled informix-4gl 1989 1996 another flavor informix programming-tool produced called newera supported object-oriented programming level code-compatibility informix-4gl informix acquired ibm april 2001 despite age informix-4gl still widely used develop business applications sizable market exists around due popularity accounting inherently text based activity often chosen purely text-based interface optimize data entry efficiency new accounting applications still developed informix-4gl reason stansoft released 2010 eppix telecommunication accounting system uses ibm tuxedo services written c programming language call pre-compiled 4gl object modules dynamically run-time | [
4798,
2866
] | Test |
5,867 | 7 | Orbitera:orbitera orbitera american cloud services provider subsidiary google company develops sells e-commerce platform automates billing ordering processes cloud marketplaces orbitera founded 2012 brian singer found challenges associated selling software tech companies previously worked company initially raised 2 million seed funding resolute ventures investors 2016 company platform used adobe systems red hat avnet among others year company acquired google result deal company became part google cloud platform 2018 orbitera partnered mobile device management provider mobileiron develop store cloud-based software since inception orbitera e-commerce platform supports multi-cloud commerce platform handles billing processes buying selling cloud-based services automates building online marketplaces bundled cloud services enables product trials test drives company 2018 partnership mobileiron enable clients sell groups services customer segment allow customized branding offer streamlined billing support data voice third-party cloud services | [
2961,
330,
6586
] | Test |
5,868 | 7 | LotusLive:lotuslive ibm smartcloud social business suite business networking collaboration cloud-based services hosted ibm collaboration solutions division ibm integrated services include social networking businesses online meetings file sharing instant message data visualization e-mail several ibm smartcloud social business offerings ibm smartcloud social business also provides mechanisms third-party applications integrate lotuslive ibm announced integration skype linkedin salesforce.com ups silanis lotusphere 2012 ibm announced rebranded lotuslive product line ibm smartcloud social business | [
7037,
3915,
6012,
5571,
330,
1014
] | Test |
5,869 | 4 | Secure_attention_key:secure attention key secure attention key sak secure attention sequence sas special key key combination pressed computer keyboard login screen must user completely trustworthy operating system kernel interacts directly hardware able detect whether secure attention key pressed event detected kernel starts trusted login processing secure attention key designed make login spoofing impossible kernel suspend program including masquerading computer login process starting trustable login operation systems configured use sak users must always suspicious login prompts displayed without pressed key combination microsoft windows handled winlogon component use secure attention key also required windows user account control uac prompt examples similar combination often used pc system bios force reboot boot sequence | [
3511,
7239,
1052,
4759,
5571,
578,
3795,
2380
] | Test |
5,870 | 7 | Péter_Kacsuk:péter kacsuk péter kacsuk hungarian computer scientist mta-sztaki budapest hungary péter kacsuk received msc university doctorate degrees technical university budapest hungary 1976 1984 respectively received kandidat degree equivalent phd hungarian academy 1989 habilitated university vienna 1997 received professor title hungarian president 1999 doctor academy degree dsc hungarian academy sciences 2001 currently head laboratory parallel distributed systems lpds computer automation research institute hungarian academy sciences péter kacsuk part-time full professor cavendish school computer science university westminster eötvös lóránd university science since 2001 served visiting scientist professor several times various universities australia austria canada england germany spain japan usa published two books two lecture notes 200 scientific papers parallel computer architectures parallel software engineering grid computing chair joint egee see-grid summer school grid application support 2006 2007 chair coregrid summer school 2007 involved many eu grid projects edg gridlab egee seegrid coregrid gridcoord iceage cancergrid etc. coordinator eu fp7 edges enabling desktop grids e-science project co-editor-in-chief journal grid computing published springer received following awards selected media appearances hungary links audio/video material | [
4226,
4159,
3184
] | Validation |
5,871 | 2 | Nyala_(typeface):nyala typeface nyala font based sylfaen designed support latin alphabet ge'ez script used ethiopic languages created john hudson geraldine wade part windows vista windows server 2008 windows 7 font named mountain nyala species great african antelope native highlands ethiopia | [
1832,
2920,
6645,
2927,
4759,
1029,
2499,
2931,
5837,
2917
] | Test |
5,872 | 2 | Series_30:series 30 series 30 often shortened s30 software platform application user interface created nokia entry level mobile phones lower series 40 s30 phones capable running java apps 2014 microsoft acquired nokia mobile phones business later discontinued s30 favor series 30+ first series 30 device nokia 1100 2003 originally s30 supposed one menu key second one added release nokia 1110 s30 devices also n't 5-way d-pad 4-way d-pad except nokia 1100 2-way d-pad following list series 30 devices released nokia | [
1066,
7511,
372,
2187,
7521,
3615,
1453,
3952,
7172,
2922,
23,
2564,
5391,
7545,
5044,
740,
6465,
5062,
3653,
5068,
2240,
3657,
4726,
424,
1129,
76,
786,
6158,
7956,
4751,
2271,
4759,
6517,
1172,
3694,
472,
4400,
474,
4407,
118,
3703,
... | Validation |
5,873 | 6 | CIFSD:cifsd cifsd open-source in-kernel cifs/smb server created namjae jeon linux kernel initially goal provide improved file i/o performance bigger goal new features much easier develop maintain inside kernel expose layers fully directions attributed sections samba moving modules inside kernel features like remote direct memory access rdma work actual performance gain subset performance related operations belong kernelspace subset belong operations really related performance userspace dce/rpc management historically resulted number buffer overflow issues dangerous security bugs winreg user account management implemented user space cifsd file operations related performance open/read/write/close etc kernel space kcifsd also allows easier integration vfs interface file operations server daemon started starts forker thread kcifsd/0 initialization time open dedicated port 445 listening smb requests whenever new clients make request forker thread accept client connection fork new thread dedicated communication channel client server allows parallel processing smb requests commands clients well allowing new clients make new connections instance named kcifsd/1~n indicate connected clients depending smb request types new thread decide pass commands user space cifsd currently dce/rpc commands identified handled user space utilize linux kernel chosen process commands default workitems executed handlers default kworker threads allows multiplexing handlers kernel take care initiating extra worker threads load increased vice versa load decreased destroys extra worker threads connection established client dedicated kcifsd/1..n takes complete ownership receiving/parsing smb commands command received worked parallel i.e. multiple clients commands worked parallel receiving command separated kernel workitem prepared command queued handled default kworker'threads inside kernel smb workitem queued kworkers allows benefit load sharing managed optimally default kernel optimizing client performance handling client commands parallel cifsd userspace process transfer user account password registered using cifsadmin part utils user space allows sharing information parameters parsed smb.conf smb export layer kernel execution part daemon continuously running connected kernel interface using netlink socket waits requests dcerpc winreg handles rpc calls minimum dozen important file server netshareenum netservergetinfo various dfs related calls server must implement complete dce/rpc response prepared user space passed associated kernel thread client | [
2701,
5571,
7848,
578,
1435
] | Test |
5,874 | 8 | Apache_CXF:apache cxf apache cxf open-source fully featured web services framework originated combination two open-source projects celtix developed iona technologies xfire developed team hosted codehaus two projects combined people working together apache software foundation new name cxf derived combining celtix xfire cxf key design considerations include cxf often used apache servicemix apache camel apache activemq service-oriented architecture soa infrastructure projects cxf includes broad feature set primarily focused following areas | [
2451,
5631,
7238,
3172,
894,
4303,
5728,
7805,
5646,
6986,
2741,
7444,
7896,
5299,
917,
5571,
3463,
3542,
1479,
1286,
3204,
6821,
5054,
840,
1392,
3031,
5408,
3558,
5677,
3479,
4436,
5863,
59,
6387,
1224,
5075,
6137,
7488,
7763,
7857,
2... | Test |
5,875 | 0 | Subvocal_recognition:subvocal recognition subvocal recognition svr process taking subvocalization converting detected results digital output aural text-based set electrodes attached skin throat without opening mouth uttering sound words recognized computer subvocal speech recognition deals electromyograms different speaker therefore consistency thrown positioning electrode improve accuracy researchers field relying statistical models get better pattern-matching times subject speaks electrodes even lapses carnegie mellon university researchers found speaker accuracy rates 94 one day see rate drop 48 day later two different speakers drops even relevant applications technology audible speech impossible astronauts underwater navy seals fighter pilots emergency workers charging loud harsh environments worcester polytechnic institute massachusetts research underway use subvocal information control source computer music instruments grant u.s. army research synthetic telepathy using subvocalization taking place university california irvine lead scientist mike d'zmura nasa ames research laboratory mountain view california supervision charles jorgensen conducting subvocalization research brain computer interface r program wadsworth center new york state department health confirmed existing ability decipher consonants vowels imagined speech allows brain-based communication using imagined speech us patents silent communication technologies include us patent 6587729 apparatus audibly communicating speech using radio frequency hearing effect us patent 5159703 silent subliminal presentation system us patent 6011991 communication system method including brain wave analysis and/or use brain activity us patent 3951134 apparatus method remotely monitoring altering brain waves | [
7372
] | Test |
5,876 | 2 | SlugOS:slugos slugos common source base group firmware distributions linksys nslu2 slugos comprises slugos/be big endian version slugos alternative firmware linksys nslu2 slugos/le little endian version slugos alternative firmware linksys nslu2 | [
1521,
7049,
5241,
578
] | Validation |
5,877 | 9 | BBC_BASIC:bbc basic bbc basic programming language developed 1981 native programming language mos technology 6502 based acorn bbc micro home/personal computer version basic programming language adapted uk computer literacy project bbc written mainly sophie wilson bbc basic based older atom basic acorn atom extended traditional basic named codice_1/codice_2 procedures functions codice_3 loops codice_4 structures inspired comal interpreter also included powerful statements controlling bbc micro four-channel sound output low-/high-resolution eight-mode graphics display due number optimizations bbc basic ran programs much faster microsoft basic running similar machines included using multiple linked lists variable lookup rather single long list pre-defining location integer variables separate integer maths routines speed improved bbc machine via use fast ram allowed mos 6502 processor motorola 6845 display driver share memory without pausing access result design features bbc basic ran david ahl benchmark 21 seconds besting even ibm pc far outpacing 8-bit platforms one unique features bbc basic inline assembler allowing users write assembly language programs 6502 later zilog z80 ns32016 arm assembler fully integrated basic interpreter shared variables could included characters saved via *save *load called via call usr commands allowed developers write assembly language code also basic code emit assembly language making possible use code-generation techniques even write simple compilers basic 1978 hermann hauser chris curry founded acorn computers much code developed cambridge university sophie wilson colleagues complete history available basic original version shipped early bbc micros basic ii used acorn electron bbc micros shipped 1982 including model b added codice_5 codice_6 keywords along offset assembly bug fixes basic iii produced uk version united states market version acorn abortive attempt enter cross-atlantic computer market apart bug fixes change basic ii codice_7 command could also spelled codice_8 regardless input uk version always listed codice_7 us version codice_8 main place basic iii found hi-basic version external second processor basic iv also known cmos basic available bbc master machines changed use new instructions available 65sc12 processor reducing size code therefore allowing inclusion codice_11 codice_12 statement codice_13 codice_14 codice_15 codice_16 statements faster floating point bug fixes included basic iv 1986 improvement basic iv included master compact machine version basic compact included re-coded mathematical routines said provide 30 speed increase version included rest master series hi-basic available two versions first based basic iii second based basic iv built run higher address b800 second processor rather usual 8000 address bbc b allowed program space available either external internal 6502 second processors version introduced support second zilog z80 processor another version bbc basic called bas128 supplied tape disc bbc master master compact loaded main ram used 64 kb sideways ram user programs provided support much larger programs cost lot slower normal rom-based version interpreter deal basic 6502 assembly language included characters contributed system popularity industrial research engineers bbc mos risc os usually supplied rom may assumed specific release operating system contained specific version basic simple way determine version basic actually running enquiring operating system identity thus making assumption see also beebwiki entry inkey bbc family possible run standard basic enhanced hibasic 6502 second processor one may determine program running second processor examining initial value page 800 using second processor distinguish basic hibasic one examine initial value himem 8000 basic running second processor b800 hibasic second processor similar situation exists risc os may normal basic basic64 offers higher precision maths normal basic identifies basic v basic64 identifies basic vi therefore following used error occurred distinguish one better ways see beebwiki almost cases n't need testing basic platform program running make call read whatever returned data returned deal move 32-bit arm cpu removal 16 kb limit basic code size many new features added basic v version 1.04 61 kb long current versions risc os still contain bbc basic v interpreter source code risc os 5 version bbc basic v released 'shared source risc os open 2011 tba software released test versions updated basic includes support vfp/neon assembler amongst new commands features supported graphics commands entirely backwards compatible sound less example codice_28 keyword basic v onwards command takes fourteen numeric parameters effectively nothing— older versions calls os_word 8 nothing risc os in-line 6502 assembler replaced arm assembler basic v said acorn certainly fastest interpreted basic world probably powerful basic found computer basic vi version basic v supports ieee 754 8-byte format real numbers opposed standard 5-byte format introduced basic i. bbc basic v vi delivered standard acorn archimedes riscpc version bbc basic v also available run arm second processor bbc micro compiler bbc basic v produced paul fellows team leader arthur os development called archimedes basic compiler published initially dabs press abc able implement almost language obvious exception eval function inevitably required run-time programmatic interpretation evidence completeness able support in-line assembler syntax compiler written bbc basic v. compiler running interpreter early development stages able compile versions distributed self-compiled object code many applications initially written run interpreter benefitted performance boost gave putting bbc basic v par languages serious application development bbc basic also ported many platforms ns32016 version bbc basic supplied acorn 32016 coprocessor acorn abc addition version bbc basic supplied bbc micro zilog z80 second processor z80-based version bbc basic also exists cp/m-based systems recently version existed sinclair zx spectrum however due efforts j. g. harston also responsible pdp-11 version bbc basic spectrum released january 2002 many improvements made subsequent releases zilog z80 version bbc basic also used tiki 100 desktop computer cambridge z88 portable amstrad nc100 notepad amstrad nc200 notebook computers version implemented ti-83 plus ti-84 plus series graphing calculators pc-based systems bbc basic also implemented dos bbcbasic 86 aimed maximum compatibility bbc micro bbasic concentrated basic language enhancements based basic ii version bbc basic integrated microsoft windows graphical user interface bbc basic windows created richard russell developer z80 x86 versions released 2001 version still active development seeing much industry use currently whilst supporting nearly completely original bbc basic specification basic iv windows version supports much basic v/vi syntax well advanced features features unique bbc basic windows include interpreter support record/structure types ability call windows api routines external dll recent versions included advanced features comparable languages like c external library recently added support objects sdl based version bbc basic available windows linux number mobile devices supporting sdl library gpl clone bbc basic named brandy written portable c also available emulator bbc micro commodore amiga produced ariadne software cbm uk extremely fast emulate 6502 full speed assembly code would run slower real bbc basic programs would run much faster due way optimised basic 6502 emulation interacted almost commercial games would run well behaved code educational software generally worked additionally used slightly less precise floating-point numeric format bundled special academic package amiga 500 hope schools would replace ageing bbc bs amiga 500s version bbc basic v z80 also made ti-83/84+ texas instruments calculator families benjamin ryves commodore 64 version shado produced small software house aztec software early 1980s | [
2630,
5367,
1255,
4759,
12,
2379,
2463,
6891,
7718,
8183,
4139,
5651,
2925,
7448,
5926,
5129,
5571,
7906,
5137,
5234,
2941,
3303,
4339,
931,
1304,
61,
336,
4540,
4003,
6394,
7864,
1789,
7588,
4277,
4012,
6778,
2164,
4745,
1435,
1064
] | Test |
5,878 | 9 | Homoiconicity:homoiconicity computer programming homoiconicity greek words homo- meaning icon meaning representation property programming languages language homoiconic program written manipulated data using language thus program internal representation inferred reading program example lisp program written regular lisp list manipulated lisp code homoiconic languages code accessed transformed data using representation property often summarized saying language treats code data homoiconic language primary representation programs also data structure primitive type language makes metaprogramming easier language without property reflection language examining program entities runtime depends single homogeneous structure handle several different structures would appear complex syntax noted commonly cited example programming language lisp created easy lists manipulation structure given s-expressions take form nested lists lisp programs written form lists result program access functions procedures running programmatically alter fly homoiconic languages typically include full support syntactic macros allowing programmer express transformations programs concise way examples programming languages clojure contemporary dialect lisp rebol also successor red refal recently julia original source paper macro instruction extensions compiler languages according early influential paper trac text-handling language alan kay used possibly popularized term homoiconic use term 1969 phd thesis one advantage homoiconicity extending language new concepts typically becomes simpler data representing code passed meta base layer program abstract syntax tree function may composed manipulated data structure meta layer evaluated much easier understand manipulate code since easily understood simple data since format language data format typical demonstration homoiconicity meta-circular evaluator von neumann architecture systems includes vast majority general purpose computers today implicitly described homoiconic due way raw machine code executes memory data type bytes memory however feature also abstracted programming language level languages lisp dialects scheme clojure racket employ s-expressions achieve homoiconicity languages considered homoiconic include lisp uses s-expressions external representation data code s-expressions read primitive lisp function codice_1 codice_1 returns lisp data lists symbols numbers strings primitive lisp function codice_3 uses lisp code represented lisp data computes side-effects returns result result printed primitive function codice_4 creates external s-expression lisp data lisp data list using different data types sub lists symbols strings integer numbers lisp code example uses lists symbols numbers create expression primitive lisp function codice_5 set variable codice_6 result change codice_7 term codice_8 evaluate expression print expression string read expression string line 4 create new clause operator codice_9 separates head body clause codice_10 add existing clauses add database call later languages would call creating function runtime also remove clauses database codice_11 codice_12 nowiki /nowiki number clause name number arguments take also called arity also query database get body clause codice_13 analogous lisp codice_14 function concept treating code data manipulation evaluation thereof demonstrated neatly rebol rebol unlike lisp require parentheses separate expressions following example code rebol note codice_15 represents interpreter prompt spaces elements added readability codice_16 fact built-in function rebol language construct keyword enclosing code square brackets interpreter evaluate merely treats block containing words block type block furthermore assigned value word using appears syntax assignment actually understood interpreter special type codice_17 takes form word followed colon block still interpreted using codice_18 function provided rebol similar codice_14 lisp possible interrogate elements block change values thus altering behavior code evaluated | [
6507,
718,
5915,
5734,
8082,
4864,
5482,
486,
1102,
4705,
7383,
6470,
7113,
3570,
8025,
7032,
4543,
6669,
1889,
4193,
6585,
6778,
7135,
1901,
360
] | Test |
5,879 | 1 | U-DISE:u-dise u-dise unified district information system education database schools india database developed national university educational planning administration records information level dropouts condition school toilets | [] | Test |
5,880 | 5 | Point-to-Point_Protocol:point-to-point protocol computer networking point-to-point protocol ppp data link layer layer 2 communications protocol used establish direct connection two nodes connects two routers directly without host networking device provide connection authentication transmission encryption compression ppp used many types physical networks including serial cable phone line trunk line cellular telephone specialized radio links fiber optic links sonet internet service providers isps used ppp customer dial-up access internet since ip packets transmitted modem line without data link protocol two derivatives ppp point-to-point protocol ethernet pppoe point-to-point protocol atm pppoa used commonly isps establish digital subscriber line dsl internet service connection customers ppp commonly used data link layer protocol connection synchronous asynchronous circuits largely superseded older serial line internet protocol slip telephone company mandated standards link access protocol balanced lapb x.25 protocol suite requirement ppp circuit provided duplex ppp designed work numerous network layer protocols including internet protocol ip trill novell internetwork packet exchange ipx nbf decnet appletalk like slip full internet connection telephone lines via modem reliable slip double checks make sure internet packets arrive intact resends damaged packets ppp designed somewhat original hdlc specifications designers ppp included many additional features seen proprietary data-link protocols time ppp specified rfc 1661 rfc 2516 describes point-to-point protocol ethernet pppoe method transmitting ppp ethernet sometimes used dsl rfc 2364 describes point-to-point protocol atm pppoa method transmitting ppp atm adaptation layer 5 aal5 also common alternative pppoe used dsl ppp layered protocol three components lcp initiates terminates connections gracefully allowing hosts negotiate connection options integral part ppp defined standard specification lcp provides automatic configuration interfaces end setting datagram size escaped characters magic numbers selecting optional authentication lcp protocol runs top ppp ppp protocol number 0xc021 therefore basic ppp connection established lcp able configure rfc 1994 describes challenge-handshake authentication protocol chap preferred establishing dial-up connections isps although deprecated password authentication protocol pap still sometimes used another option authentication ppp extensible authentication protocol eap described rfc 2284 link established additional network layer 3 configuration may take place commonly internet protocol control protocol ipcp used although internetwork packet exchange control protocol ipxcp appletalk control protocol atcp popular internet protocol version 6 control protocol ipv6cp see extended use future ipv6 replaces ipv4 dominant layer-3 protocol ppp permits multiple network layer protocols operate communication link every network layer protocol used separate network control protocol ncp provided order encapsulate negotiate options multiple network layer protocols negotiates network-layer information e.g network address compression options connection established example internet protocol ip uses ip control protocol ipcp internetwork packet exchange ipx uses novell ipx control protocol ipx/spx ncps include fields containing standardized codes indicate network layer protocol type ppp connection encapsulates following ncps may used ppp ppp detects looped links using feature involving magic numbers node sends ppp lcp messages messages may include magic number line looped node receives lcp message magic number instead getting message peer magic number previous section introduced use lcp options meet specific wan connection requirements ppp may include following lcp options ppp frames variants hdlc frames peers agree address field control field compression lcp fields omitted likewise peers agree protocol field compression 0x00 byte omitted protocol field indicates type payload packet 0xc021 lcp 0x80xy various ncps 0x0021 ip 0x0029 appletalk 0x002b ipx 0x003d multilink 0x003f netbios 0x00fd mppc mppe etc ppp limited contain general layer 3 data unlike ethertype information field contains ppp payload variable length negotiated maximum called maximum transmission unit default maximum 1500 octets might padded transmission information particular protocol padded protocol must allow information distinguished padding ppp frames encapsulated lower-layer protocol provides framing may provide functions checksum detect transmission errors ppp serial links usually encapsulated framing similar hdlc described ietf rfc 1662 flag field present ppp hdlc-like framing used address control fields always value hex ff stations hex 03 unnumbered information omitted whenever ppp lcp address-and-control-field-compression acfc negotiated frame check sequence fcs field used determining whether individual frame error contains checksum computed frame provide basic protection errors transmission crc code similar one used layer two protocol error protection schemes one used ethernet according rfc 1662 either 16 bits 2 bytes 32 bits 4 bytes size default 16 bits polynomial x x x 1 fcs calculated address control protocol information padding fields message encapsulated multilink ppp also referred mlppp mp mppp mlp multilink provides method spreading traffic across multiple distinct ppp connections defined rfc 1990 used example connect home computer internet service provider using two traditional 56k modems connect company two leased lines single ppp line frames arrive order possible frames divided among multiple ppp connections therefore multilink ppp must number fragments put right order arrive multilink ppp example link aggregation technology cisco ios release 11.1 later supports multilink ppp ppp one establish several simultaneous distinct ppp connections single link possible multilink ppp either multilink ppp uses contiguous numbers fragments packet consequence possible suspend sending sequence fragments one packet order send another packet prevents running multilink ppp multiple times links multiclass ppp kind multilink ppp class traffic uses separate sequence number space reassembly buffer multiclass ppp defined rfc 2686 pptp point-to-point tunneling protocol form ppp two hosts via gre using encryption mppe compression mppc many protocols used tunnel data ip networks like ssl ssh l2tp create virtual network interfaces give impression direct physical connections tunnel endpoints linux host example interfaces would called tun0 ppp0 two endpoints tunnel tunnel point-to-point connection ppp natural choice data link layer protocol virtual network interfaces ppp assign ip addresses virtual interfaces ip addresses used example route networks sides tunnel ipsec tunneling mode create virtual physical interfaces end tunnel since tunnel handled directly tcp/ip stack l2tp used provide interfaces technique called l2tp/ipsec case ppp provides ip addresses extremities tunnel ppp defined rfc 1661 point-to-point protocol july 1994 rfc 1547 requirements internet standard point-to-point protocol december 1993 provides historical information need ppp development series related rfcs written define variety network control protocols-including tcp/ip decnet appletalk ipx others-work ppp | [
7148,
709,
4676,
4677,
7170,
4316,
4683,
6432,
1462,
1464,
2566,
5039,
6446,
2219,
3640,
4709,
7916,
3312,
414,
7569,
768,
7581,
7214,
7217,
2612,
3337,
4014,
1900,
444,
6871,
456,
6879,
2281,
6521,
106,
1543,
2644,
3698,
6531,
2650,
12... | Test |
5,881 | 2 | Nokia_N950:nokia n950 nokia n950 developers-only phone aimed toward linux-based meego os nokia n9 developers 5,000 units produced sent developers throughout july 2011 nokia exclusively distributed device developers offered sale public phone exists several variations final device issued developers black 1 gb main memory 16 gb emmc internal storage whilst prototypes known model number n9-00 confused n9-01 silver 512 mb main memory 64 gb emmc although marked sale sold ebay €2,000 device received unofficial android port nitdroid community also port nemomobile firefox os nokia n950 phone uses hardware components nokia n9 phone following exceptions nokia n950 developers use tools nokia including qt sdk harmattan python software development | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
5044,
578,
5493,
1202,
5315,
3029,
499,
5236,
5499,
139,
7012,
6465,
5062,
3039,
3653,
1582,
4894,
5068... | Test |
5,882 | 1 | Oracle_SQL_Developer:oracle sql developer oracle sql developer integrated development environment ide working sql oracle databases oracle corporation provides product free uses java development kit oracle sql developer supports oracle products past variety third-party plugins supported users able deploy connect non-oracle databases oracle sql developer worked ibm db2 microsoft access microsoft sql server mysql sybase adaptive server amazon redshift teradata databases oracle sql developer supports automatic tabs code insight bracket matching syntax coloring pl/sql oracle sql developer product components include owa oracle web agent mod_plsql extension module apache web server helps setting dynamic web-pages pl/sql within oracle sql developer addition extensions provided oracle third parties written extensions add new features sql developer integrate products | [
1155,
7715,
6270,
6184,
1185,
6279,
6281,
7368,
1105,
4427,
4163,
418,
6386,
1223,
1590,
5252,
7213,
971
] | Train |
5,883 | 9 | T_(programming_language):programming language programming language dialect language scheme developed early 1980s jonathan a. rees kent m. pitman norman i. adams yale university experiment language design implementation purpose test thesis developed guy l. steele jr. gerald jay sussman series papers scheme scheme may used basis practical programming language exceptional expressive power implementations scheme could perform better lisp systems competitively implementations programming languages c bliss usually considered inherently efficient lisp conventional machine architectures much occurs via optimizing compiler named orbit contains features modern scheme lacks example object-oriented first-class environments called locales modified non-locally used module system several extra special forms lazy evaluation flow control equivalent common lisp setf like scheme supports call-with-current-continuation call/cc also limited form called codice_1 manual hypothetical implementation codice_2 could example shows objects intimately related closures message-passing primitive called codice_3 puts two objects together allowing something resembling inheritance ported many hardware platforms operating systems including | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
1854,
2218,
4704,
5055,
5757,
6116,
1116,
6471,
7573,
2600,
5077,
1885,
5079,
1889,
5450,
6507,
795,
6876,
6888,
1557,
4789,
5494,
5501,
6210,
144,
4074,
4085,
7298,
5515,
8025,
3749,
... | Test |
5,884 | 2 | Kernel-based_Virtual_Machine:kernel-based virtual machine kernel-based virtual machine kvm virtualization module linux kernel allows kernel function hypervisor merged linux kernel mainline kernel version 2.6.20 released february 5 2007 kvm requires processor hardware virtualization extensions intel vt amd-v. kvm also ported operating systems freebsd illumos form loadable kernel modules kvm originally designed x86 processors since ported s/390 powerpc ia-64 arm kvm provides hardware-assisted virtualization wide variety guest operating systems including linux bsd solaris windows haiku reactos plan 9 aros research operating system macos addition android 2.2 gnu/hurd debian k16 minix 3.1.2a solaris 10 u3 darwin 8.0.1 together operating systems newer versions listed known work certain limitations additionally kvm provides paravirtualization support linux openbsd freebsd netbsd plan 9 windows guests using virtio api includes paravirtual ethernet card disk i/o controller balloon device vga graphics interface using spice vmware drivers avi kivity began development kvm qumranet technology startup company acquired red hat 2008 kvm surfaced october 2006 merged linux kernel mainline kernel version 2.6.20 released 5 february 2007 kvm maintained paolo bonzini kvm perform emulation instead exposes /dev/kvm interface userspace host use linux qemu versions 0.10.1 later one userspace host qemu uses kvm available virtualize guests near-native speeds otherwise falls back software-only emulation internally kvm uses seabios open source implementation 16-bit x86 bios kvm support hot plug vcpus dynamic memory management live migration since february 2007 among features kvm parts licensed various gnu licenses | [
4293,
3256,
4295,
2182,
9,
3613,
7528,
7532,
5744,
6443,
5396,
2942,
3978,
6117,
4341,
2585,
5760,
5762,
412,
754,
5064,
415,
7581,
3666,
2970,
7956,
1522,
5453,
4759,
5460,
7242,
7969,
1535,
1924,
6892,
1176,
7979,
1933,
1547,
4050,
58... | Train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.