node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,885
0
Text_mining:text mining text mining also referred text data mining roughly equivalent text analytics process deriving high-quality information text high-quality information typically derived devising patterns trends means statistical pattern learning text mining usually involves process structuring input text usually parsing along addition derived linguistic features removal others subsequent insertion database deriving patterns within structured data finally evaluation interpretation output 'high quality text mining usually refers combination relevance novelty interest typical text mining tasks include text categorization text clustering concept/entity extraction production granular taxonomies sentiment analysis document summarization entity relation modeling i.e learning relations named entities text analysis involves information retrieval lexical analysis study word frequency distributions pattern recognition tagging/annotation information extraction data mining techniques including link association analysis visualization predictive analytics overarching goal essentially turn text data analysis via application natural language processing nlp analytical methods typical application scan set documents written natural language either model document set predictive classification purposes populate database search index information extracted term text analytics describes set linguistic statistical machine learning techniques model structure information content textual sources business intelligence exploratory data analysis research investigation term roughly synonymous text mining indeed ronen feldman modified 2000 description text mining 2004 describe text analytics latter term used frequently business settings text mining used earliest application areas dating 1980s notably life-sciences research government intelligence term text analytics also describes application text analytics respond business problems whether independently conjunction query analysis fielded numerical data truism 80 percent business-relevant information originates unstructured form primarily text techniques processes discover present knowledge – facts business rules relationships – otherwise locked textual form impenetrable automated processing subtasks—components larger text-analytics effort—typically include text mining technology broadly applied wide variety government research business needs three groups may use text mining records management searching documents relevant daily activities legal professionals may use text mining e-discovery governments military groups use text mining national security intelligence purposes scientific researchers incorporate text mining approaches efforts organize large sets text data i.e. addressing problem unstructured data determine ideas communicated text e.g. sentiment analysis social media support scientific discovery fields life sciences bioinformatics business applications used support competitive intelligence automated ad placement among numerous activities many text mining software packages marketed security applications especially monitoring analysis online plain text sources internet news blogs etc national security purposes also involved study text encryption/decryption range text mining applications biomedical literature described including computational approaches assist studies protein docking protein interactions protein-disease associations addition large patient textual datasets clinical field datasets demographic information population studies adverse event reports text mining facilitate clinical studies precision medicine text mining algorithms facilitate stratification indexing specific clinical events large patient textual datasets symptoms side effects comorbidities electronic health records event reports reports specific diagnostic tests one online text mining application biomedical literature pubgene publicly accessible search engine combines biomedical text mining network visualization gopubmed knowledge-based search engine biomedical texts text mining techniques also enable us extract unknown knowledge unstructured documents clinical domain text mining methods software also researched developed major firms including ibm microsoft automate mining analysis processes different firms working area search indexing general way improve results within public sector much effort concentrated creating software tracking monitoring terrorist activities text mining used large media companies tribune company clarify information provide readers greater search experiences turn increases site stickiness revenue additionally back end editors benefiting able share associate package news across properties significantly increasing opportunities monetize content text mining starting used marketing well specifically analytical customer relationship management coussement van den poel 2008 ref name= 10.1016/j.im.2008.01.005 /ref apply improve predictive analytics models customer churn customer attrition text mining also applied stock returns prediction sentiment analysis may involve analysis movie reviews estimating favorable review movie analysis may need labeled data set labeling affectivity words resources affectivity words concepts made wordnet conceptnet respectively text used detect emotions related area affective computing text based approaches affective computing used multiple corpora students evaluations children stories news stories issue text mining importance publishers hold large databases information needing indexing retrieval especially true scientific disciplines highly specific information often contained within written text therefore initiatives taken nature proposal open text mining interface otmi national institutes health common journal publishing document type definition dtd would provide semantic cues machines answer specific queries contained within text without removing publisher barriers public access academic institutions also become involved text mining initiative computational methods developed assist information retrieval scientific literature published approaches include methods searching determining novelty clarifying homonyms among technical reports automatic analysis vast textual corpora created possibility scholars analyze millions documents multiple languages limited manual intervention key enabling technologies parsing machine translation topic categorization machine learning automatic parsing textual corpora enabled extraction actors relational networks vast scale turning textual data network data resulting networks contain thousands nodes analyzed using tools network theory identify key actors key communities parties general properties robustness structural stability overall network centrality certain nodes automates approach introduced quantitative narrative analysis whereby subject-verb-object triplets identified pairs actors linked action pairs formed actor-object content analysis traditional part social sciences media studies long time automation content analysis allowed big data revolution take place field studies social media newspaper content include millions news items gender bias readability content similarity reader preferences even mood analyzed based text mining methods millions documents analysis readability gender bias topic bias demonstrated flaounas et al showing different topics different gender biases levels readability possibility detect mood patterns vast population analyzing twitter content demonstrated well text mining computer programs available many commercial open source companies sources see list text mining software lack flexibilities european copyright database law mining in-copyright works web mining without permission copyright owner illegal uk 2014 recommendation hargreaves review government amended copyright law allow text mining limitation exception second country world following japan introduced mining-specific exception 2009 however owing restriction copyright directive uk exception allows content mining non-commercial purposes uk copyright law allow provision overridden contractual terms conditions european commission facilitated stakeholder discussion text data mining 2013 title licenses europe fact focus solution legal issue licenses limitations exceptions copyright law led representatives universities researchers libraries civil society groups open access publishers leave stakeholder dialogue may 2013 contrast europe flexible nature us copyright law particular fair use means text mining america well fair use countries israel taiwan south korea viewed legal text mining transformative meaning supplant original work viewed lawful fair use example part google book settlement presiding judge case ruled google digitization project in-copyright books lawful part transformative uses digitization project displayed—one use text data mining recently websites often used text-based searches found documents containing specific user-defined words phrases use semantic web text mining find content based meaning context rather specific word additionally text mining software used build large dossiers information specific people events example large datasets based data extracted news reports built facilitate social networks analysis counter-intelligence effect text mining software may act capacity similar intelligence analyst research librarian albeit limited scope analysis text mining also used email spam filters way determining characteristics messages likely advertisements unwanted material text mining plays important role determining financial market sentiment increasing interest paid multilingual data mining ability gain information across languages cluster similar items different linguistic sources according meaning challenge exploiting large proportion enterprise information originates unstructured form recognized decades recognized earliest definition business intelligence bi october 1958 ibm journal article h.p luhn business intelligence system describes system ... utilize data-processing machines auto-abstracting auto-encoding documents creating interest profiles 'action points organization incoming internally generated documents automatically abstracted characterized word pattern sent automatically appropriate action points yet management information systems developed starting 1960s bi emerged '80s '90s software category field practice emphasis numerical data stored relational databases surprising text unstructured documents hard process emergence text analytics current form stems refocusing research late 1990s algorithm development application described prof. marti a. hearst paper untangling text data mining almost decade computational linguistics community viewed large text collections resource tapped order produce better text analysis algorithms paper attempted suggest new emphasis use large online text collections discover new facts trends world suggest make progress need fully artificial intelligent text analysis rather mixture computationally-driven user-guided analysis may open door exciting new results hearst 1999 statement need fairly well describes state text analytics technology practice decade later
[ 1519, 3601, 706, 3931, 1718, 1444, 98, 2819, 4760, 8065, 7138, 715, 1730, 2921, 7539, 2566, 1555, 2748, 5304, 3292, 2215, 1751, 7372, 4337, 4067, 7198, 3807, 3651, 4349, 7202, 7389, 2054, 1879, 3658, 4089, 5429, 6942, 2884, 3410, 5528, ...
Test
5,886
3
Socket_495:socket 495 socket 495 sometimes referred µpga2 cpu socket intel pentium iii celeron mobile processors socket also used microsoft xbox console bga ball grid array format socket replaced socket 615 µpga1 used pentium ii early celeron mobile processors socket 495 pin cpu socket designed house processor socket 495 package socket 1.27mm pitch designed support heatsink
[ 2541, 4123, 3849, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 8021, 7302, 5963, 866, 3333, 7134, 262, 6683 ]
Test
5,887
5
Beonex_Communicator:beonex communicator beonex communicator discontinued open-source internet suite based mozilla application suite mas ben bucksch german mozilla developer intended higher security privacy level commercial products internet suite contains web browser email news client html editor based mozilla composer irc client based chatzilla beonex business services offered suite free provided documentation easy install routines third-party plug-ins tried sell support customer-specific changes browser main goal implement kerberos openpgp ldap beonex marked failed mid-2004 discontinued reaching production release stage mozilla organization stated mozilla application suite developers testing purposes meant end users 5 january 2001 beonex included linux distribution kmlinux version s-0.4 removed version s-0.5 released 23 march 2001 beonex 0.8 released june 2002 received positive reviews speed beonex launcher beol spoken b-o-l additional upcoming product never left alpha status stripped-down version beonex communicator web browser combined email client chat client preview releases version 0.9 mid-2002 bucksch showed new features wanted integrate version gained stable status announced 2 march 2004 new releases planned mozilla foundation decided future policy 2005 mozilla foundation officially changed policies created mozilla corporation provide end-user support beonex communicator 0.8.2-stable several known security issues beonex never received much market share browser transmit referrers default possibility create fake referrers browser deletes cookies upon exiting disables several javascript functions could served attack vectors beonex also allows changing user agent following comparison table releases netscape mas included complete table see gecko layout engine contrast netscape beonex included nearly features except proprietary parts like integrated net2phone aol instant messenger online chatting chatzilla integrated sidebar search engines also pre-configured beonex less resource-intensive netscape beonex includes migration tool import old profiles netscape communicator beonex communicator fork mas rather separate branch significant changes made html email javascript turned default thus displays email plain text bold cursive additions added later mas 1.1 search engines compatible mycroft project located sidebar providing features
[ 4655, 6802, 5378, 2205, 7537, 6809, 393, 735, 1475, 3291, 2574, 2577, 6452, 6458, 4352, 5070, 4725, 3999, 1136, 7587, 6858, 2261, 84, 445, 1152, 1525, 4755, 4759, 7975, 7628, 5821, 5127, 1190, 6540, 6908, 3383, 8006, 8009, 5506, 3043, 1...
Test
5,888
3
Spy_vs._Spy_(1984_video_game):spy vs. spy 1984 video game spy vs. spy game written michael riedel commodore 64 published first star software 1984 port atari 8-bit family released simultaneously two-player split-screen game based mad magazine long running cartoon strip spy vs. spy slapstick antics two spies trying kill improbably elaborate traps weapons ported apple ii zx spectrum acorn electron atari st bbc micro commodore 16 msx amstrad cpc amiga master system game boy game boy color nintendo entertainment system emulated game boy advance object game collect various secret items briefcase exit building door airport opposing player timer runs searching items traps laid take opponent player careless spy personal countdown timer depletes 30 seconds upon death arena embassy constructed series interconnected rooms laid grid pattern higher levels rooms therefore larger play area well hand-to-hand combat achieved wiggling joystick directional pad left right spies proximity spies place traps furniture doors occupy playing area traps triggered spy searches piece furniture item opens booby trapped door resulting cartoon style animation showing subject shot blown etc floating heaven angel strategy introduced limiting quantity trap spy use allowing traps triggered either spy pieces furniture also contain 'remedies match specific traps – allow trap defused fetched one time video magazine described rousing action-strategy contest praised game excellent graphics befit ting game rooted visual medium reviewer also noted one successfully captured original feel source offered satisfying result ahoy agreed review calling faithful adaptation comics praising simultaneous two-player one-player options antic called one original clever games atari computers yet magazine praised simultaneous two-player display concluded recommend game highly enough zx spectrum version rated number 20 sinclair official top 100 games time remake including original version released ios 2012 longer available two sequels original 1984 game produced spy vs. spy ii island caper spy vs. spy iii arctic antics third game also released ibm pc kept basic gameplay tweaking core features spy vs. spy ii island caper adds side-scrolling play area spies longer start fixed number traps must collect raw materials build spy vs. spy iii arctic antics switches location tropical island arctic spies fight throwing snowballs setting traps decreases body heat bar tools include saw cut holes ice second player fall lost body heat restored moving heated igloo
[ 3324 ]
Test
5,889
6
Cloud_storage:cloud storage cloud storage model computer data storage digital data stored logical pools physical storage spans multiple servers sometimes multiple locations physical environment typically owned managed hosting company cloud storage providers responsible keeping data available accessible physical environment protected running people organizations buy lease storage capacity providers store user organization application data cloud storage services may accessed colocated cloud computing service web service application programming interface api applications utilize api cloud desktop storage cloud storage gateway web-based content management systems cloud computing believed invented joseph carl robnett licklider 1960s work arpanet connect people data anywhere time 1983 compuserve offered consumer users small amount disk space could used store files chose upload 1994 launched personalink services online platform personal business communication entrepreneurship storage one first web-based referenced commercials think electronic meeting place cloud amazon web services introduced cloud storage service aws s3 2006 gained widespread recognition adoption storage supplier popular services smugmug dropbox pinterest 2005 box announced online file sharing personal cloud content management service businesses cloud storage based highly virtualized infrastructure like broader cloud computing terms accessible interfaces near-instant elasticity scalability multi-tenancy metered resources cloud storage services utilized off-premises service amazon s3 deployed on-premises vion capacity services cloud storage typically refers hosted object storage service term broadened include types data storage available service like block storage object storage services like amazon s3 oracle cloud storage microsoft azure storage object storage software like openstack swift object storage systems like emc atmos emc ecs hitachi content platform distributed storage research projects like oceanstore vision cloud examples storage hosted deployed cloud storage characteristics cloud storage outsourcing data storage increases attack surface area companies permanent services products provide change outsourcing data storage another company needs careful investigation nothing ever certain contracts set stone worthless company ceases exist circumstances change companies several options available avoid issues one option use private cloud instead public cloud well providers offer private cloud storage another option ingest data encrypted format key hold within premise infrastructure access often use cloud storage gateways premise gateways options encrypt compress data prior transfer well mirror storage across multiple cloud storage providers remove risk single providers shutdown gateways offer well option cache data recently used algorithm premise along data analytics data cached fetched valuable form instead recently used form
[ 370, 1076, 1447, 10, 7165, 3954, 3958, 6806, 22, 3627, 2212, 3973, 3309, 754, 5064, 2960, 2961, 5440, 84, 1514, 5447, 6505, 1911, 4386, 2988, 7613, 1917, 4045, 1930, 4406, 7258, 1550, 6906, 5135, 3028, 5496, 2317, 842, 2683, 4081, 8020,...
Test
5,890
3
Application_checkpointing:application checkpointing checkpointing technique add fault tolerance computing systems basically consists saving snapshot application state restart point case failure particularly important long running applications executed failure-prone computing systems distributed computing checkpointing technique helps tolerate failures otherwise would force long-running application restart beginning basic way implement checkpointing stop application copy required data memory reliable storage e.g. parallel file system continue execution case failure application restarts need start scratch rather read latest state checkpoint stable storage execute two main approaches checkpointing systems coordinated checkpointing uncoordinated checkpointing coordinated checkpointing approach processes must ensure checkpoints consistent usually achieved kind two-phase commit protocol algorithm uncoordinated checkpointing process checkpoints state independently must stressed simply forcing processes checkpoint state fixed time intervals sufficient ensure global consistency need establishing consistent state i.e. missing messages duplicated messages may force processes roll back checkpoints turn may cause processes roll back even earlier checkpoints extreme case may mean consistent state found initial state so-called domino effect one original common means application checkpointing save state feature interactive applications user application could save state variables data storage medium time using either continue working exit application later time restart application restore saved state implemented save command menu option application many cases became standard practice ask user unsaved work exiting application wanted save work sort functionality became extremely important usability applications particular work could completed one sitting playing video game expected take dozens hours writing book long document amounting hundreds thousands pages work done long period time data entry document rows spreadsheet problem save state requires operator program request save non-interactive programs including automated batch processed workloads ability checkpoint applications also automated batch applications began handle tens hundreds thousands transactions transaction might process one record one file several different files need application restartable point without need rerun entire job scratch became imperative thus checkpoint/restart capability born number transactions processed snapshot checkpoint state application could taken point application failed next checkpoint could restarted giving checkpoint information last place transaction file transaction successfully completed application could restart point checkpointing would tend expensive generally done every record reasonable compromise cost checkpoint vs. value computer time needed reprocess batch records thus number records processed checkpoint might range 25 200 depending cost factors relative complexity application resources needed successfully restart application fti library aims provide computational scientists easy way perform checkpoint/restart scalable fashion fti leverages local storage plus multiple replications erasures techniques provide several levels reliability performance fti provides application-level checkpointing allows users select data needs protected order improve efficiency avoid space time energy waste offers direct data interface users need deal files and/or directory names metadata managed fti transparent fashion user desired users dedicate one process per node overlap fault tolerance workload scientific computation post-checkpoint tasks executed asynchronously future technologies group lawrence national laboratories developing hybrid kernel/user implementation checkpoint/restart called blcr goal provide robust production quality implementation checkpoints wide range applications without requiring changes made application code blcr focuses checkpointing parallel applications communicate mpi compatibility software suite produced scidac scalable systems software isic work broken 4 main areas checkpoint/restart linux cr checkpointable mpi libraries resource management interface checkpoint/restart development process management interfaces dmtcp distributed multithreaded checkpointing tool transparently checkpointing state arbitrary group programs spread across many machines connected sockets modify user program operating system among applications supported dmtcp open mpi python perl many programming languages shell scripting languages use tightvnc also checkpoint restart x window applications long use extensions e.g opengl video among linux features supported dmtcp open file descriptors pipes sockets signal handlers process id thread id virtualization ensure old pids tids continue work upon restart ptys fifos process group ids session ids terminal attributes mmap/mprotect including mmap-based shared memory dmtcp supports ofed api infiniband experimental basis recent protocols perform collaborative checkpointing storing fragments checkpoint nearby nodes helpful avoids cost storing parallel file system often becomes bottleneck large-scale systems uses storage closer found use particularly large-scale supercomputing clusters challenge ensure checkpoint needed recovering failure nearby nodes fragments checkpoints available docker underlying technology contain checkpoint restore mechanism criu user space checkpoint library mementos software system transform general-purpose tasks interruptible program platforms frequent power outages designed batteryless embedded devices rfid tags smart cards rely harvesting energy ambient background mementos frequently senses available energy system decides checkpoint program continue computation case checkpointing data stored non-volatile memory energy become sufficient reboot data retrieved memory program continues stored state mementos implemented msp430 family microcontrollers mementos named christopher nolan memento idetic set automatic tools helps application-specific integrated circuit asic developers automatically embed checkpoints designs targets high-level synthesis tools adds checkpoints register-transfer level verilog code uses dynamic programming approach locate low overhead points state machine design since checkpointing hardware level involves sending data dependent registers non-volatile memory optimum points required minimum number registers store idetic deployed evaluated energy harvesting rfid tag device
[ 1438, 5983, 3511, 553, 5371, 7712, 5022, 1923, 5559, 4771, 1546, 4049, 4318, 3458, 5042, 7453, 4154, 1481, 5939, 4159, 1023, 4839, 1295, 5947, 6748, 757, 3041, 1405, 240, 1678, 515, 1586, 2688, 8024, 2961, 3578, 8130, 4993, 3667, 1786, ...
Validation
5,891
8
IBM_Unica_NetInsight:ibm unica netinsight ibm unica netinsight web analytics application utilizes extract transform load methodology populate database queried using browser-based interface netinsight family tools unica nettracker affinium netinsight first released june 2006 version 7.0 release version 8.0 affinium netinsight renamed unica netinsight dropping along rest unica products affinium brand ibm acquires unica corporation unica netinsight software adopts ibm name ibm unica netinsight april 2014 ibm announced unica netinsight would discontinued netinsight extract transform load process read log files virtually format including logs web servers proxy servers streaming media servers ftp servers well processing normal server log files netinsight use log files derived page tags replace augment log file data netinsight stores processed log files database oracle database microsoft sql server ibm db2 netezza appliance
[ 3273, 2451, 3915, 5571, 4600, 2054, 5907, 7715, 1435 ]
Test
5,892
4
CryptoRights_Foundation:cryptorights foundation cryptorights foundation inc. crf 501 c 3 non-profit organization based san francisco cryptorights foundation helps human rights groups ngos use encryption protect online communications contributed encryption standards openpgp ipsec gnupg organization founded 26 february 1998 total solar eclipse near maximum totality active volcanic caribbean island montserrat boat chartered attendees international financial cryptography association conference anguilla dave del torto group fellow ″cypherpunk″ cryptology experts significant technology projects include development highfire human rights firewall distributed communications platform private ngo communications miniaturized pc called firebox size cable modem related highwire wireless human rights communications networking project became open source software defined radio source code maintained gnuradio crf provides free security training support human rights journalism organizations use cryptography crf team also developed gpg plug-in squirrelmail
[ 5773, 2644 ]
Test
5,893
3
DLX:dlx dlx pronounced deluxe risc processor architecture designed john l. hennessy david a. patterson principal designers stanford mips berkeley risc designs respectively two benchmark examples risc design named berkeley design dlx essentially cleaned modernized simplified mips cpu dlx simple 32-bit load/store architecture somewhat unlike modern mips cpu dlx intended primarily teaching purposes dlx design widely used university-level computer architecture courses two known implementations aspida vamp aspida project resulted core many nice features open source supports wishbone asynchronous design supports multiple isa asic proven vamp dlx-variant mathematically verified part verisoft project specified pvs implemented verilog runs xilinx fpga full stack compiler kernel tcp/ip built original mips architecture one methods used gain performance force instructions complete one clock cycle forced compilers insert no-ops cases instruction would definitely take longer one clock cycle thus input output activities like memory accesses specifically forced behaviour leading artificial program bloat general mips programs forced lot wasteful nop instructions behaviour unintended consequence dlx architecture force single clock cycle execution therefore immune problem dlx design modern approach handling long instructions used data-forwarding instruction reordering case longer instructions stalled functional units re-inserted instruction stream complete externally design behaviour makes appear execution occurred linearly dlx instructions broken three types r-type i-type j-type r-type instructions pure register instructions three register references contained 32-bit word i-type instructions specify two registers use 16 bits hold immediate value finally j-type instructions jumps containing 26-bit address opcodes 6 bits long total 64 possible basic instructions select one 32 registers 5 bits needed dlx like mips design bases performance use instruction pipeline dlx design fairly simple one classic risc concept pipeline contains five stages
[ 1252, 895, 4224, 6177, 7533, 4408, 5483, 3014, 7541, 5225, 1556, 2929, 5934, 5055, 4251, 2130, 2226, 6922, 1772, 154, 3747, 1237, 3156, 5614, 6236, 263, 534, 441, 1430, 7777, 2443, 971 ]
Test
5,894
1
Amazon_Neptune:amazon neptune amazon neptune fully managed graph database product amazon.com used web service part amazon web services announced november 29 2017 amazon neptune supports popular graph models property graph w3c rdf respective query languages apache tinkerpop gremlin sparql including amazon web services products amazon neptune general availability ga announced may 30 2018 currently available 11 aws regions neptune hipaa eligible december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso compliance programs amazon neptune supports open source apache tinkerpop gremlin graph traversal language w3c standard resource description framework ’ rdf sparql query language used neptune instance allow user build queries navigate highly connected data sets provides high performance graph models neptune also uses aws product features amazon s3 amazon ec2 amazon cloudwatch amazon neptune database clusters created stored amazon virtual private cloud vpc allows user isolate database private network using neptune vpc configuration user configure firewall settings needs order control network access database instances amazon neptune integrated aws identity access management iam allows user create aws iam groups control actions groups aws iam users neptune allows user encrypt databases using keys created aws key management service kms database instance running neptune encryption encrypts stored data backups snapshots replicas cluster amazon neptune allows user use https encrypt data transfer clients neptune service endpoints using transport layer security tls data stored cluster volume virtual volume utilizing ssd drives sizes volumes dynamic increase depending much data stored database maximum 64 tb amazon neptune sla policy designed offer monthly uptime percentage greater 99.9 increasing database performance availability integrating engine virtual storage based ssd drives specially made database workloads neptune maintains copies user data multiple availability zones case failures neptune automatically detects failed segments disk volume repairs neptune generally available us east n. virginia us east ohio us west oregon europe ireland europe london europe frankfurt asia pacific singapore asia pacific sydney asia pacific tokyo asia pacific mumbai asia pacific seoul aws regions pricing determined aws regions region different prices available services on-demand instance pricing lets user pay instance use hour instead fixed sum price also differs depending instance class similarly user pays storage consumed database payments advance price based storage rate i/o rate billed gb per month per million request increments respectively pricing model beneficial short-term small-scale projects available aws regions price backup storage also billed per gb-month increments albeit different rates data transfer priced per gb increments amount depends whether data transferred amazon neptune much data transferred per month tb per month september 12 2018 announced neptune achieved hipaa eligibility enabling process data sets containing protected health information phi december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso 9001 iso 27001 iso 27017 iso 27018 compliance programs user use amazon neptune applications subject pci compliance require iso certification may 17 2019 announced neptune achieved ssae_16 eligibility neptune powers graph use cases recommendation engines fraud detection knowledge graphs drug discovery network security social networking notable customers amazon neptune include samsung electronics pearson intuit siemens astrazeneca finra lifeomic blackfynn amazon alexa
[ 3928, 1438, 4217, 2988, 7613, 632, 4303, 1634, 3091, 6262, 3953, 7722, 6986, 8083, 2390, 3627, 1550, 6806, 651, 2566, 5927, 2212, 5135, 1757, 3028, 5672, 7838, 842, 4163, 7102, 5064, 330, 6219, 7757, 684, 518, 2961, 4635, 7037, 2700, 57...
Test
5,895
3
Socket_939:socket 939 socket 939 cpu socket released amd june 2004 supersede previous socket 754 athlon 64 processors socket 939 succeeded socket am2 may 2006 second socket designed amd amd64 range processors socket 939 processors motherboards became available june 2004 superseded socket am2 may 2006 amd ceased production socket focus current future platforms however least one new socket 939 motherboard produced utilizing modern amd chipset since amd transitioned socket am2 2009 motherboard maker asrock released new socket 939 motherboard motherboard utilizes amd 785g igp chipset sb710 southbridge single dual-core processors manufactured socket athlon 64 athlon 64 fx athlon 64 x2 sempron opteron names opteron 190 featuring 2.8 ghz clock speed 1 mb level 2 cache per core fastest dual-core processor manufactured socket however availability processor limited opteron 185 locked multiplier athlon 64 fx-60 unlocked multiplier slightly slower clock speed 2.6 ghz fastest widely available dual-core processors socket opteron 156 ran slightly faster 3 ghz making fastest single core processor supporting socket 939 interface socket 939 supports dual channel ddr sdram memory 6.4 gb/s memory bandwidth processors socket support 3dnow sse2 sse3 revision e later instruction sets features one 16 bit hypertransport link running 1000 mt/s regards video expansion slots socket 939 systems found agp slots pci-e slots processors using socket 64kb level 1 instruction data caches either 256kb 512kb 1 mb level 2 cache
[ 2539, 5799, 2541, 6599, 4931, 7163, 2997, 3362, 1735, 5377, 6351, 913, 7826, 2751, 6545, 6373, 5063, 6655, 6562, 4077, 3145, 4090, 866, 5436, 780, 1143 ]
Validation
5,896
9
Cerner_CCL:cerner ccl cerner ccl cerner command language cerner corporation fourth-generation programming language expressed cerner discern explorer solution ccl patterned structured query language sql cerner millennium health information technology solutions use ccl/discern explorer select insert update delete cerner millennium database ccl allows programmer fetch data oracle database display user wants see features like record structure subroutines allows us get data database manipulate storing temporary structure execute particular section code required using subroutine complete ccl cerner command language provided cerner corporation discern explorer provides several applications used create execute analyze ad hoc queries reports programs applications provide flexibility skill set needed build programs design reports discern explorer programs written using visualexplorer.exe discernvisualdeveloper.exe dvdev operating system command-line editor text editor explorermenu.exe em used execute discern explorer programs demand exploreranalyzer.exe ea allows users analyze system resources used rdbms queries ccl hello world examples call echo hello world go drop program helloworld2 go drop program helloworld3 go drop program jcmclass1a go
[]
Validation
5,897
2
Pygame:pygame pygame cross-platform set python modules designed writing video games includes computer graphics sound libraries designed used python programming language pygame originally written pete shinners replace pysdl development stalled community project since 2000 released open source free software gnu lesser general public license pygame uses simple directmedia layer sdl library intention allowing real-time computer game development without low-level mechanics c programming language derivatives based assumption expensive functions inside games abstracted game logic making possible use high-level programming language python structure game features sdl n't include vector math collision detection 2d sprite scene graph management midi support camera pixel-array manipulation transformations filtering advanced freetype font support drawing applications using pygame run android phones tablets use pygame subset android pgs4a sound vibration keyboard accelerometer supported android regular competition called pyweek write games using python usually necessarily pygame community created many tutorials pygame
[ 2002, 2275, 4130, 7898, 5571, 8195, 6759, 3571, 336, 5965, 3915, 7310, 6497, 6498, 1989, 1606, 4833, 1435 ]
Test
5,898
9
KnowledgeMan:knowledgeman knowledgeman early computer database management system created micro data base systems lafayette indiana knowledgeman introduced 1983 pc-sized version company mainframe computing database software knowledgeman promoted users dbase faster database using sophisticated computing power macro language sql structured query language allowed reports spreadsheet interface statistical graphics i.e. pie charts bar charts etc knowledgeman designed david bartkus knowledgeman first database management system ported mainframe system also first written 16-bit pc processor knowledgeman first separate database engine command interface something microsoft access lauded decade later micro data base systems developed graphical user interface knowledgeman frequently called kman 1985 although popular developers preferred use software command line interface 1986 introduced guru expert system incorporated knowledgeman database graphical user interface mid-1990s knowledgeman folded guru 2004 micro data base systems folded product line taken savitar corporation savitar folded 2008 besides uses business computing knowledgeman used archaeologists including neanderthal site france remains new amsterdam new york city elsewhere physicists fermilab wide range domains
[ 5252, 3255 ]
Validation
5,899
4
Brian_LaMacchia:brian lamacchia brian a. lamacchia computer security specialist lamacchia best known work massachusetts institute technology establishing mit pgp key server first key centric pki implementation see wide-scale use lamacchia wrote first web interface pgp key server lamacchia currently works microsoft director security cryptography microsoft research previously director security cryptography microsoft extreme computing group played leading role design xkms security architecture .net palladium designed led development team .net security architecture security architect palladium most-referenced work .net framework played leading role design w3c xmldsig xkms standards particular author versions 1.0 1.1 2.0 xmldsig contributor xkms coauthor oasis standard ws-security lamacchia earned s.b. s.m. ph.d. degrees mit 1990 1991 1996 respectively primary community activity involvement seattle international film festival treasurer 2013 currently president
[ 7567, 5773, 1805 ]
Test
5,900
6
Specfs:specfs unix-like computer systems specfs short special filesystem physical network file system mount point either simply filesystem layer access device special files hosted regular filesystems
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 4469, 1624, 44...
Validation
5,901
9
M2001:m2001 m2001 modular educational mathematical programming language developing presenting mathematical algorithms modern discrete classical continuous mathematics m2001 built semantic framework based category theory syntax similar pascal modula-2 designed purely pedagogic use efficiency ease implementation far less important development generality range application created play important role forming formal algorithmic foundation first-year college math students based multi-layered datatyping scheme m2001 includes collection eight computational types another six structured types two respectively collections mathematical classes abstract classes built latter encompassing commonly used abstract data types computer science lower two layers m2001 typing scheme based earlier experimental called cat programming language modular mathematical programming language ronald e. prather
[ 154, 5948, 4589 ]
Test
5,902
4
DNS_leak:dns leak dns leak refers security flaw allows dns requests revealed isp dns servers despite use vpn service attempt conceal although primary concern vpn users also possible prevent proxy direct internet users vulnerability allows isp well on-path eavesdroppers see websites user may visiting possible browser dns requests sent isp dns server directly sent vpn occurs certain types vpns e.g split-tunnel vpns traffic still sent local network interface even vpn active starting windows 8 microsoft introduced smart multi-homed named resolution altered way windows 8 handled dns requests ensuring dns request could travel across available network interfaces computer general consensus new method domain name resolution accelerated time required dns look-up completed also exposed vpn users dns leaks connected vpn endpoint computer would longer use dns servers assigned vpn service instead dns request would sent available interfaces thus dns traffic would travel vpn tunnel expose user default dns servers websites exist allow testing determine whether dns leak occurring dns leaks addressed number ways websites may report false positive test results advisable always check result manually making sure note country provider ip home isp something different foreign may always easy know whether one using set dns whether dns leaks safest way verify via one online dns leak tests sometimes isp may already using one public dns servers default setting public one may show difference servers isp may collecting data case safest change different dns test dns leaks example isp using google public dns using may wise try cloudflare dns see leaks google dns
[ 1805 ]
Test
5,903
4
Jungle_Disk:jungle disk jungle disk name online backup software service privately held data security company suite products also includes network protection service email archiving one first backup services use cloud storage amazon s3 2009 acquired rackspace service added rackspace cloud files name word association amazon rainforest jungle disk common shorthand hard disk drive jungle disk backup monthly subscription software service supports laptops desktops servers microsoft windows macos linux operating systems data backed online disk using either continuous backup aka sync scheduled back selected files folders everything system data accessed software client web browser mobile devices running android ios also provides webdav server integration applications customers protect data using aes-256 encryption key even jungle disk employees access records subscription includes 10 gigabytes storage pay-as-you-go additional data jungle disk founded atlanta dave wright 2006 october 22 2008 jungle disk entered agreement acquired rackspace hosting inc. rackspace purchased jungle disk order expand cloud hosting services acquisition integration dave left rackspace found solidfire jungle disk relocated san antonio 2010 pace development slowed rackspace focused cloud infrastructure software platform became openstack 2013 rackspace revived jungle disk customer support going ticket service include phone chat ticketing january 5 2016 jungle disk spun rackspace us inc. privately held company headquartered san antonio tx december 5 2017 jungle disk announced acquired safetynet first backup quickbooks online jobber march 6 2018 jungle disk announced acquired teampassword password manager connected teams simplify password management security addition teampassword jungle disk product portfolio gives small businesses data security tool help generate secure unique passwords share access applications services enabling users productive work collaboration jungle disk raised 11 million equity 2016 part spin-off rackspace investors include number san antonio family offices january 18th 2017 jungle disk announced tripled growth capital additional funding existing investors december 7 2016 jungle disk tech-onomic impact award 2016 tech titans awards presented san antonio business journal january 31 2017 jungle disk named one ten finalists 'the best cloud storage file sharing providers businesses 2017 pc magazine march 2017 jungle disk named 'top 10 cloud storage solution provider cloud technology insights may 23 2017 jungle disk named one five finalists 'best cloud backup services businesses pc magazine tied second scoring affordable price large margin may 11 2018 jungle disk named one lifewire list 21 online backup services jungle disk client software receive update 2012-2014 part cloud office portfolio new version released december 2015 june 3 2011 colin percival owner tarsnap competitor jungle disk identified two potential weaknesses jungle disk security
[ 7838, 2961, 4594, 651, 2700, 2566, 4759, 5571, 578 ]
Test
5,904
4
Application_virtualization:application virtualization application virtualization also known process virtualization software technology encapsulates computer programs underlying operating system executed fully virtualized application installed traditional sense although still executed application behaves runtime like directly interfacing original operating system resources managed isolated sandboxed varying degrees context term virtualization refers artifact encapsulated application quite different meaning hardware virtualization refers artifact abstracted physical hardware full application virtualization requires virtualization layer application virtualization layers replace part runtime environment normally provided operating system layer intercepts disk operations virtualized applications transparently redirects virtualized location often single file application remains unaware accesses virtual resource instead physical one since application working one file instead many files spread throughout system becomes easy run application different computer previously incompatible applications run side-by-side examples technology windows platform include application virtualization allows applications run environments suit native application example wine allows microsoft windows applications run linux application virtualization reduces system integration administration costs maintaining common software baseline across multiple diverse computers organization lesser integration protects operating system applications poorly written buggy code cases provides memory protection ide-style debugging features may even run applications written correctly example applications try store user data read-only system-owned location feature assists implementation principle least privilege removing requirement end-users administrative privileges order run poorly written applications allows incompatible applications run side-by-side time minimal regression testing one another isolating applications operating system security benefits well exposure application automatically entail exposure entire os application virtualization also enables simplified operating system migrations applications transferred removable media computers without need installing becoming portable software application virtualization uses fewer resources separate virtual machine computer programs virtualized examples include applications require device driver form integration os 16-bit applications need run shared memory space anti-virus programs applications require heavy os integration windowblinds stylexp difficult virtualize moreover software licensing application virtualization bears great licensing pitfalls mainly application virtualization software virtualized applications must correctly licensed application virtualization address file registry-level compatibility issues legacy applications newer operating systems applications n't manage heap correctly execute windows vista still allocate memory way regardless whether virtualized reason specialist application compatibility fixes shims may still needed even application virtualized technology categories fall application virtualization include
[ 3761, 4293, 2182, 5545, 4759, 2465, 3781, 1547, 4498, 7357, 5571, 5396, 578, 6731, 3544, 7508, 5667, 5754, 3978, 5244, 7570, 3042, 1128, 1050, 2703, 5884, 972, 3756 ]
Test
5,905
2
Check_Point_IPSO:check point ipso check point ipso operating system 'check point firewall appliance security devices based freebsd numerous hardening features applied ip ipso refers ipsilon networks company specialising ip switching acquired nokia 1997 2009 check point acquired nokia security appliance business including ipso nokia ipso version 6.2 fork freebsd 6 two systems called ipso-sx ipso-lx linux-based check point offers three lines security appliances one based ipso 6.x one based operating system called secureplatform latest based gaia platform rhel4 based ipso notable features firsts include ipso sb originally derived ipsilon networks freebsd 2.1-stable cross-compiled freebsd 2.2.6-release 3.5-release platforms major components ipso versions 2.x sold ipsilon networks part atm tag-switching solutions originally pioneered ipso 3.0 onwards designed host check point firewall-1 third party packages ipso 3.0 3.9 spanned 1999 2005 adding many features significant performance hardware refinements recognizably administrator ipso 4.0 designed major update internally numbered ipso 3.10 however check point software unable process two-digit dot version also included refresh voyager html interface point javascript frames avoided order facilitate use lynx command line interface together resulted renumbered 4.0 ipso 4.1 ipso 4.2 incremental releases ipso 4.2 gain source-based routing last scheduled new feature new development continue ipso 6.x ipso 5.0 build 056 released 2009 vsx r65 support ip appliance ipso 6.0 announced nokia relation ip2450 ip690 hardware based freebsd 6.x primary advantage ipso 4.x improved memory management performance scheduling threading posix-compliance operating system features ipso 6.0.7 released 2009 ip690 ip2450 corexl multi-core support ipso 6.1 contains enhancements freebsd 6.x without corexl support step change nokia advertised ipso 4.2 6.07 6.1 run alongside period time check point acquired nokia ip appliance business 6.07 6.1 development branches merged combined 6.2 recent version ipso 6.2mr6 released february 2017 nokia offered ipso 7 actually ipso lx discontinued 7.2 2008 acquiring nokia ip appliance business check point announced project gaia combine ipso secure platform first release expected 2011
[ 4655, 2451, 689, 6583, 2746, 5571, 6043 ]
Test
5,906
4
Loren_Kohnfelder:loren kohnfelder loren kohnfelder best known mit s.b bscse thesis written may 1978 describing practical means applying public key cryptography secure network communications kohnfelder thesis introduced terms 'certificate 'certificate revocation list well introducing numerous concepts established important parts public key infrastructure x.509 certificate specification provides basis ssl s/mime modern pki implementations based kohnfelder thesis also co-creator praerit garg stride model security threats widely used threat modeling
[ 341, 7567, 6795 ]
Validation
5,907
8
Unica_NetTracker:unica nettracker unica nettracker web analytics application processes web log files unica nettracker first released 1996 sane solutions sold unica corporation current version december 2006 7.1.0 unica announce end-of-life end-of-support december 31 2011 nettracker processes log files virtually format using custom log definition logs processed web servers proxy servers streaming media servers ftp servers well processing log files nettracker use page tag data augment log file data nettracker stores processed log files internal database based upon sqlite
[ 3273, 5891, 4600, 84 ]
Validation
5,908
4
Health_Insurance_Portability_and_Accountability_Act:health insurance portability accountability act health insurance portability accountability act 1996 hipaa kennedy–kassebaum act ref name= atchinson/fox /ref enacted 104th united states congress signed president bill clinton 1996 created primarily modernize flow healthcare information stipulate personally identifiable information maintained healthcare healthcare insurance industries protected fraud theft address limitations healthcare insurance coverage act consists five titles title hipaa protects health insurance coverage workers families change lose jobs title ii hipaa known administrative simplification provisions requires establishment national standards electronic health care transactions national identifiers providers health insurance plans employers title iii sets guidelines pre-tax medical spending accounts title iv sets guidelines group health plans title v governs company-owned life insurance policies five sections act known titles title hipaa regulates availability breadth group health plans certain individual health insurance policies amended employee retirement income security act public health service act internal revenue code title requires coverage also limits restrictions group health plan place benefits preexisting conditions group health plans may refuse provide benefits relation preexisting conditions either 12 months following enrollment plan 18 months case late enrollment title allows individuals reduce exclusion period amount time creditable coverage enrolling plan significant breaks coverage creditable coverage defined quite broadly includes nearly group individual health plans medicare medicaid significant break coverage defined 63-day period without creditable coverage along exception allowing employers tie premiums co-payments tobacco use body mass index title also requires insurers issue policies without exclusion leaving group health plans creditable coverage see exceeding 18 months renew individual policies long offered provide alternatives discontinued plans long insurer stays market without exclusion regardless health condition health care plans exempted title requirements long-term health plans limited-scope plans like dental vision plans offered separately general health plan however benefits part general health plan hipaa still applies benefits example new plan offers dental benefits must count creditable continuous coverage old health plan towards exclusion periods dental benefits alternate method calculating creditable continuous coverage available health plan title 5 categories health coverage considered separately including dental vision coverage anything 5 categories must use general calculation e.g. beneficiary may counted 18 months general coverage 6 months dental coverage beneficiary general health plan covered dental 6 months prior application date since limited-coverage plans exempt hipaa requirements odd case exists applicant general group health plan obtain certificates creditable continuous coverage independent limited-scope plans dental apply towards exclusion periods new plan include coverages hidden exclusion periods valid title e.g. accident covered must occurred beneficiary covered exact health insurance contract clauses must acted upon health plan also must re-written comply hipaa title ii hipaa establishes policies procedures maintaining privacy security individually identifiable health information outlines numerous offenses relating health care establishes civil criminal penalties violations also creates several programs control fraud abuse within health-care system however significant provisions title ii administrative simplification rules title ii requires department health human services hhs increase efficiency health-care system creating standards use dissemination health-care information rules apply covered entities defined hipaa hhs covered entities include health plans health care clearinghouses billing services community health information systems health care providers transmit health care data way regulated hipaa per requirements title ii hhs promulgated five rules regarding administrative simplification privacy rule transactions code sets rule security rule unique identifiers rule enforcement rule hipaa privacy rule composed national regulations use disclosure protected health information phi healthcare treatment payment operations covered entities effective compliance date privacy rule april 14 2003 one-year extension certain small plans hipaa privacy rule regulates use disclosure protected health information phi held covered entities generally health care clearinghouses employer-sponsored health plans health insurers medical service providers engage certain transactions regulation hhs extended hipaa privacy rule independent contractors covered entities fit within definition business associates phi information held covered entity regarding health status provision health care health care payment linked individual interpreted rather broadly includes part individual medical record payment history covered entities must disclose phi individual within 30 days upon request also must disclose phi required law reporting suspected child abuse state child welfare agencies covered entities may disclose protected health information law enforcement officials law enforcement purposes required law including court orders court-ordered warrants subpoenas administrative requests identify locate suspect fugitive material witness missing person covered entity may disclose phi certain parties facilitate treatment payment health care operations without patient express written authorization disclosures phi require covered entity obtain written authorization individual disclosure case covered entity discloses phi must make reasonable effort disclose minimum necessary information required achieve purpose privacy rule gives individuals right request covered entity correct inaccurate phi also requires covered entities take reasonable steps ensuring confidentiality communications individuals example individual ask called work number instead home cell phone numbers privacy rule requires covered entities notify individuals uses phi covered entities must also keep track disclosures phi document privacy policies procedures must appoint privacy official contact person responsible receiving complaints train members workforce procedures regarding phi individual believes privacy rule upheld file complaint department health human services office civil rights ocr however according wall street journal ocr long backlog ignores complaints complaints privacy violations piling department health human services april 2003 november 2006 agency fielded 23,886 complaints related medical-privacy rules yet taken enforcement actions hospitals doctors insurers anyone else rule violations spokesman agency says closed three-quarters complaints typically found violation provided informal guidance parties involved however july 2011 ucla agreed pay 865,500 settlement regarding potential hipaa violations hhs office civil rights investigation showed 2005 2008 unauthorized employees repeatedly without legitimate cause looked electronic protected health information numerous uclahs patients january 2013 hipaa updated via final omnibus rule updates included changes security rule breach notification portions hitech act significant changes related expansion requirements include business associates covered entities originally held uphold sections law addition definition significant harm individual analysis breach updated provide scrutiny covered entities intent disclosing breaches previously unreported previously organization needed proof harm occurred whereas organizations must prove harm occurred protection phi changed indefinite 50 years death severe penalties violation phi privacy requirements also approved hipaa privacy rule may waived natural disaster case hurricane harvey 2017 see privacy section health information technology economic clinical health act hitech act privacy rule requires medical providers give individuals access phi individual requests information writing typically using provider form purpose provider 30 days provide copy information individual individual may request information electronic form hard-copy provider obligated attempt conform requested format providers using electronic health record ehr system certified using cehrt certified electronic health record technology criteria individuals must allowed obtain phi electronic form providers encouraged provide information expediently especially case electronic record requests individuals right access health-related information including health condition treatment plan notes images lab results billing information explicitly excluded private psychotherapy notes provider information gathered provider defend lawsuit providers charge reasonable amount relates cost providing copy however charge allowable providing data electronically certified ehr using view download transfer feature required certification delivered individual electronic form individual may authorize delivery using either encrypted un-encrypted email delivery using media usb drive cd etc. may involve charge direct messaging secure email technology common use healthcare industry possibly methods using un-encrypted email individual must understand accept risks privacy using technology information may intercepted examined others regardless delivery technology provider must continue fully secure phi system deny delivery method poses additional risk phi system individual may also request writing phi delivered designated third party family care provider individual may also request writing provider send phi designated service used collect manage records personal health record application example patient request writing ob-gyn provider digitally transmit records latest pre-natal visit pregnancy self-care app mobile phone according interpretations hipaa hospitals reveal information phone relatives admitted patients instances impeded location missing persons asiana airlines flight 214 san francisco crash hospitals reluctant disclose identities passengers treating making difficult asiana relatives locate one instance man washington state unable obtain information injured mother janlori goldman director advocacy group health privacy project said hospitals overcautious misapplying law times reports suburban hospital bethesda md. interpreted federal regulation requires hospitals allow patients opt included hospital directory meaning patients want kept directory unless specifically say otherwise result patient unconscious otherwise unable choose included directory relatives friends might able find goldman said hipaa intended make health care system united states efficient standardizing health care transactions hipaa added new part c titled administrative simplification title xi social security act supposed simplify healthcare transactions requiring health plans engage health care transactions standardized way hipaa/edi provision scheduled take effect october 16 2003 one-year extension certain small plans however due widespread confusion difficulty implementing rule cms granted one-year extension parties january 1 2012 newer versions asc x12 005010 ncpdp d.0 become effective replacing previous asc x12 004010 ncpdp 5.1 mandate asc x12 005010 version provides mechanism allowing use icd-10-cm well improvements july 1 2005 medical providers file electronically file electronic claims using hipaa standards order paid hipaa hipaa-covered health plans required use standardized hipaa electronic transactions see 42 usc § 1320d-2 45 cfr part 162 information found final rule hipaa electronic transaction standards 74 fed reg 3296 published federal register january 16 2009 cms website key edi x12 transactions used hipaa compliance edi health care claim transaction set 837 used submit health care claim billing information encounter information except retail pharmacy claims see edi retail pharmacy claim transaction sent providers health care services payers either directly via intermediary billers claims clearinghouses also used transmit health care claims billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment health care services within specific health care/insurance industry segment example state mental health agency may mandate healthcare claims providers health plans trade professional medical health care claims electronically must use 837 health care claim professional standard send claims many different business applications health care claim slight derivations cover claims involving unique claims institutions professionals chiropractors dentists etc edi retail pharmacy claim transaction ncpdp telecommunications standard version 5.1 used submit retail pharmacy claims payers health care professionals dispense medications either directly via intermediary billers claims clearinghouses also used transmit claims retail pharmacy services billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment retail pharmacy services within pharmacy health care/insurance industry segment edi health care claim payment/advice transaction set 835 used make payment send explanation benefits eob send explanation payments eop remittance advice make payment send eop remittance advice health insurer health care provider either directly via financial institution edi benefit enrollment maintenance set 834 used employers unions government agencies associations insurance agencies enroll members payer payer healthcare organization pays claims administers insurance benefit product examples payers include insurance company healthcare professional hmo preferred provider organization ppo government agency medicaid medicare etc organization may contracted one former groups edi payroll deducted another group premium payment insurance products 820 transaction set making premium payment insurance products used order financial institution make payment payee edi health care eligibility/benefit inquiry 270 used inquire health care benefits eligibility associated subscriber dependent edi health care eligibility/benefit response 271 used respond request inquiry health care benefits eligibility associated subscriber dependent edi health care claim status request 276 transaction set used provider recipient health care products services authorized agent request status health care claim edi health care claim status notification 277 transaction set used healthcare payer authorized agent notify provider recipient authorized agent regarding status health care claim encounter request additional information provider regarding health care claim encounter transaction set intended replace health care claim payment/advice transaction set 835 therefore used account payment posting notification summary service line detail level notification may solicited unsolicited edi health care service review information 278 transaction set used transmit health care service information subscriber patient demographic diagnosis treatment data purpose request review certification notification reporting outcome health care services review edi functional acknowledgement transaction set 997 transaction set used define control structures set acknowledgments indicate results syntactical analysis electronically encoded documents although specifically named hipaa legislation final rule necessary x12 transaction set processing encoded documents transaction sets grouped functional groups used defining transactions business data interchange standard cover semantic meaning information encoded transaction sets final rule security standards issued february 20 2003 took effect april 21 2003 compliance date april 21 2005 covered entities april 21 2006 small plans security rule complements privacy rule privacy rule pertains protected health information phi including paper electronic security rule deals specifically electronic protected health information ephi lays three types security safeguards required compliance administrative physical technical types rule identifies various security standards standard names required addressable implementation specifications required specifications must adopted administered dictated rule addressable specifications flexible individual covered entities evaluate situation determine best way implement addressable specifications privacy advocates argued flexibility may provide much latitude covered entities software tools developed assist covered entities risk analysis remediation tracking standards specifications follows hipaa covered entities providers completing electronic transactions healthcare clearinghouses large health plans must use national provider identifier npi identify covered healthcare providers standard transactions may 23 2007 small health plans must use npi may 23 2008 effective may 2006 may 2007 small health plans covered entities using electronic communications e.g. physicians hospitals health insurance companies forth must use single new npi npi replaces identifiers used health plans medicare medicaid government programs however npi replace provider dea number state license number tax identification number npi 10 digits may alphanumeric last digit checksum npi contain embedded intelligence words npi simply number additional meaning npi unique national never re-used except institutions provider usually one institution may obtain multiple npis different sub-parts free-standing cancer center rehab facility february 16 2006 hhs issued final rule regarding hipaa enforcement became effective march 16 2006 enforcement rule sets civil money penalties violating hipaa rules establishes procedures investigations hearings hipaa violations many years prosecutions violations march 2013 u.s. dept health human services hhs investigated 19,306 cases resolved requiring changes privacy practice corrective action noncompliance determined hhs entities must apply corrective measures complaints investigated many different types businesses national pharmacy chains major health care centers insurance groups hospital chains small providers 9,146 cases hhs investigation found hipaa followed correctly 44,118 cases hhs find eligible cause enforcement example violation started hipaa started cases withdrawn pursuer activity actually violate rules according hhs website following lists issues reported according frequency common entities required take corrective action voluntary compliance according hhs listed frequency title iii standardizes amount may saved per person pre-tax medical savings account beginning 1997 medical savings account msa available employees covered employer-sponsored high deductible plan small employer self-employed individuals title iv specifies conditions group health plans regarding coverage persons pre-existing conditions modifies continuation coverage requirements also clarifies continuation coverage requirements includes cobra clarification title v includes provisions related company-owned life insurance employers providing company-owned life insurance premiums prohibiting tax-deduction interest life insurance loans company endowments contracts related company also repeals financial institution rule interest allocation rules finally amends provisions law relating people give united states citizenship permanent residence expanding expatriation tax assessed deemed giving u.s. status tax reasons making ex-citizens names part public record creation quarterly publication individuals chosen expatriate enactment privacy security rules caused major changes way physicians medical centers operate complex legalities potentially stiff penalties associated hipaa well increase paperwork cost implementation causes concern among physicians medical centers august 2006 article journal annals internal medicine detailed concerns implementation effects hipaa hipaa restrictions researchers affected ability perform retrospective chart-based research well ability prospectively evaluate patients contacting follow-up study university michigan demonstrated implementation hipaa privacy rule resulted drop 96 34 proportion follow-up surveys completed study patients followed heart attack another study detailing effects hipaa recruitment study cancer prevention demonstrated hipaa-mandated changes led 73 decrease patient accrual tripling time spent recruiting patients tripling mean recruitment costs addition informed consent forms research studies required include extensive detail participant protected health information kept private information important addition lengthy legalistic section privacy may make already complex documents even less user-friendly patients asked read sign data suggest hipaa privacy rule currently implemented may negative impacts cost quality medical research dr. kim eagle professor internal medicine university michigan quoted annals article saying privacy important research also important improving care hope figure right complexity hipaa combined potentially stiff penalties violators lead physicians medical centers withhold information may right review implementation hipaa privacy rule u.s. government accountability office found health care providers uncertain legal privacy responsibilities often responded overly guarded approach disclosing information ... necessary ensure compliance privacy rule reports uncertainty continue period immediately prior enactment hipaa privacy security acts medical centers medical practices charged getting compliance early emphasis potentially severe penalties associated violation many practices centers turned private for-profit hipaa consultants intimately familiar details legislation offered services ensure physicians medical centers fully compliance addition costs developing revamping systems practices increase paperwork staff time necessary meet legal requirements hipaa may impact finances medical centers practices time insurance companies medicare reimbursement also declining education training healthcare providers paramount correct implementation hipaa privacy security acts effective training must describe statutory regulatory background purpose hipaa general summary principles key provisions privacy rule.although hipaa training course tailored towards roles employees attending course vital elements included although hipaa fits 1996 public law 104-191 health insurance portability accountability act references title ii privacy rule often stated health information privacy portability act hippa usa federal state county government sectors governmental agencies issued corrective followups regarding hippa hipaa according us department health human services office civil rights april 2003 january 2013 received 91,000 complaints hipaa violations 22,000 led enforcement actions varying kinds settlements fines 521 led referrals us department justice criminal actions examples significant breaches protected information hipaa violations include according koczkodaj et al. 2018 total number individuals affected since october 2009 173,398,820 differences civil criminal penalties summarized following table
[ 1998, 2987, 6251, 5280, 2727, 2390, 6098, 6353, 8091, 5392, 6189, 6542, 7649, 2666, 7741, 1115, 5599, 854, 1972, 1882, 2513, 860, 4449, 7144 ]
Test
5,909
2
Nokia_E71:nokia e71 nokia e71 smartphone introduced may 2008 eseries range qwerty keyboard targeting business users worldwide runs symbian os v9.2 series 60 3rd edition second generation feature pack 1 nokia e71 succeeded nokia e61/61i models building base design form factor enhancing feature set nokia e71 well received highly popular often considered one nokia finest devices superseded nokia e72 2009 primary 3.15 mp 2048x1536 pixels autofocus led flash video qvga 15fps secondary videocall camera pre-installed several open source developers well paid third party developers created software various functions utilities car headsets power colors grey steel white red black e71 currently sold mainland china wi-fi 802.11b/g wlan networking back mounted camera 3g also excluded licenses 3g mainland china approved early 2009 reduction price phones lacking features firmware update bring back hardware missing e71 sold macau hong kong lack features software bundled chinese version slightly different also qq client along chinese specific programs e71 received highly positive critical reception widely praised battery life software features like push email slim design hardware including keyboard trusted reviews reviewer gave 5 stars 5 cnet uk wrote n't like camera think rest pretty close perfect techradar called terrific device well thought package listing lack 3.5 mm headphone jack disadvantage publications dubbed blackberry killer iphone killer
[ 1066, 5979, 6788, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 8072, 1544, 2922, 4407, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6378, 6465, 5062, 3039, 3653, 1582, 489...
Test
5,910
2
OLE_Automation:ole automation microsoft windows applications programming ole automation later renamed simply automation inter-process communication mechanism created microsoft based subset component object model com intended use scripting languages – originally visual basic – used several languages windows automation objects required implement idispatch interface provides infrastructure whereby applications called automation controllers access manipulate i.e set properties call methods shared automation objects exported applications supersedes dynamic data exchange dde older mechanism applications control one another dde ole automation automation controller client application exporting automation objects server contrary name automation objects necessarily use microsoft ole although automation objects used ole environments confusion roots microsoft earlier definition ole previously less synonym com ensure interoperability automation interfaces limited use subset com types specifically automation interfaces must use safearray instead raw com arrays automation-compatible com servers however rely in-built ole marshalling implementation avoids need additional proxy/stub projects marshalling out-of-process automation designed ease scripting mind controllers often provide languages visual basic applications end users allowing control automation objects via scripts automation objects often written conventional languages c++ c++ attributes used simplify development languages visual basic borland delphi also provides convenient syntax automation hides complexity underlying implementation order automate application developer automation controller must know object model employed target application exporting activation objects requires developer target application publicly document object model development automation controllers without knowledge target application object model difficult impossible complications automation components usually provided type libraries contain metadata classes interfaces features exposed object library interfaces described microsoft interface definition language type libraries viewed using various tools microsoft ole/com object viewer codice_1 part microsoft platform sdk object browser visual basic version 6 visual studio .net type libraries used generate proxy pattern/stub code interoperating com platforms microsoft .net java instance .net framework sdk includes tools generate proxy .net dll access automation objects using early binding information interfaces extracted type library late binding via idispatch mapped .net reflection api built-in .net-to-com bridge called com interop java lacks built-in com support toolsets like jacob jsegue generate proxy source code consisting two parts set java classes c++ source java native interface dll type libraries solutions work windows another java based j-interop library enables interoperability com components without jni using dcom wire protocol msrpc works non-windows platforms also microsoft publicly documented object model applications microsoft office software developers also documented object models applications object models presented automation controllers type libraries interfaces described odl automation available variety languages including limited
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 6840, 422, 6844, 1499, 2245, 435, 5442, 4377, 4017, 3340, 5090, 7602, 4026, 6164, 1161, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 486, 3711, 5134, ...
Test
5,911
3
PDP-10:pdp-10 digital equipment corporation pdp-10 later marketed decsystem-10 mainframe computer family manufactured beginning 1966 discontinued 1983 1970s models beyond marketed decsystem-10 name especially tops-10 operating system became widely used pdp-10 architecture almost identical dec earlier pdp-6 sharing 36-bit word length slightly extending instruction set improved hardware implementation aspects instruction set unusual notably byte instructions operated bit fields size 1 36 bits inclusive according general definition byte contiguous sequence fixed number bits pdp-10 machine made time-sharing common features made common fixture many university computing facilities research labs 1970s notable harvard university aiken lab mit ai lab project mac stanford sail computer center corporation ccc eth zir carnegie mellon university main operating systems tops-10 tenex used build early arpanet reasons pdp-10 looms large early hacker folklore projects extend pdp-10 line eclipsed success unrelated vax superminicomputer cancellation pdp-10 line announced 1983 original pdp-10 processor ka10 introduced 1968 uses discrete transistors packaged dec flip-chip technology backplanes wire wrapped via semi-automated manufacturing process cycle time 1 μs add time 2.1 μs 1973 ka10 replaced ki10 uses transistor–transistor logic ttl ssi joined 1975 higher-performance kl10 later faster variants built emitter-coupled logic ecl microprogrammed cache memory kl10 performance 1 megaflops using 36-bit floating point numbers matrix row reduction slightly faster newer vax-11/750 although limited memory smaller less expensive model ks10 introduced 1978 using ttl am2901 bit-slice components including pdp-11 unibus connect peripherals ks marketed decsystem-2020 dec entry distributed processing arena introduced world lowest cost mainframe computer system ka10 maximum main memory capacity virtual physical 256 kilowords equivalent 1152 kilobytes supplied dec include paging hardware memory management consisted two sets protection relocation registers called base bounds registers allows half user address space limited set section main memory designated base physical address size allows model separate read-only shareable code segment normally high segment read-write data/stack segment normally low segment used tops-10 later adopted unix ka10 machines first mit later bolt beranek newman bbn modified add virtual memory support demand paging ka10 weighed 10/50 top-of-the-line uni-processor ka machine time pa1050 software package introduced two ka10 models uniprocessor 10/40 dual-processor 10/55 ki10 later processors offer paged memory management also support larger physical address space 4 megawords ki10 models include 1060 1070 1077 latter incorporating two cpus original kl10 pdp-10 also marketed decsystem-10 models 1080 1088 etc use original pdp-10 memory bus external memory modules module context meant cabinet dimensions roughly wxhxd 30 x 75 x 30 capacity 32 256 kwords magnetic core memory picture right hand side introduction shows six cabinets processors used decsystem-20 2040 2050 2060 2065 commonly incorrectly called kl20 use internal memory mounted cabinet cpu 10xx models also different packaging come original tall pdp-10 cabinets rather short ones used later decsystem-20 differences 10xx 20xx models cosmetic real 10xx systems 20-style internal memory i/o 20xx systems 10-style external memory i/o bus particular arpanet tops-20 systems i/o bus an20 imp interface i/o bus device could run either tops-10 tops-20 microcode thus corresponding operating system later model b version 2060 processors removed 256 kiloword limit virtual address space allowing use 32 sections 256 kilowords along substantial changes instruction set model model b kl10 processors thought different cpus first operating system took advantage model b capabilities tops-20 release 3 user mode extended addressing offered tops-20 release 4 tops-20 versions release 4.1 would run model b. tops-10 versions 7.02 7.03 also use extended addressing run 1090 1091 model b processor running tops-20 microcode final upgrade kl10 mca25 upgrade 2060 2065 1091 1095 gave performance increases programs run multiple sections ks10 design crippled model even though necessary data paths needed support model b architecture present doubt intended segment market greatly shortened ks10 product life frontend processors computers extend functionality systems connected kl class machines started without assistance pdp-11/40 frontend computer installed every system pdp-11 booted dual-ported rp06 disk drive alternatively 8 floppy disk drive dectape commands given pdp-11 start main processor typically booted rp06 disk drive pdp-11 pdp-11 performs watchdog functions main processor running networking remote job entry rje accomplished via pdp-11/34a frontend dec used terms dn60 d60spl ks system uses similar boot procedure 8080 cpu loads microcode rm03 rm80 rp06 disk magnetic tape starts main processor 8080 switches modes operating system boots controls console remote diagnostic serial ports i/o architecture 20xx series kl machines based dec bus design called massbus many attributed success pdp-11 dec decision make pdp-11 unibus open architecture dec reverted prior philosophy kl making massbus unique proprietary consequently aftermarket peripheral manufacturers made devices massbus dec chose price massbus devices notably rp06 disk drive substantial premium comparable ibm-compatible devices compuserve one designed alternative disk controller could operate massbus connect ibm style 3330 disk subsystems two models tape drives supported tm10 magnetic tape control subsystem mix eight could supported providing seven-track /or nine-track devices tu20 tu30 came 9 track b 7 track versions aforementioned tape drives could read/write from/to 200 bpi 556 bpi 800 bpi ibm-compatible tapes tm10 magtape controller available two submodels first pdp-6s model kl-10s user-mode instruction set architecture largely section covers architecture multi-section extended addressing covered decsystem-10/decsystem-20 processor reference manual pdp-10 36-bit words 18-bit word addresses supervisor mode instruction addresses correspond directly physical memory user mode addresses translated physical memory earlier models give user process high low memory addresses 0 top bit used one base register higher addresses used another segment contiguous later architectures paged memory access allowing non-contiguous address spaces cpu general-purpose registers also addressed memory locations 0-15 16 general-purpose 36-bit registers right half registers register 0 may used indexing instructions operate pairs registers pc word consists 13-bit condition register plus 5 always zero bits left half 18-bit program counter right half condition register records extra bits results arithmetic operations e.g overflow accessed instructions two operational modes supervisor user mode besides difference memory referencing described supervisor-mode programs execute input/output operations communication user-mode supervisor-mode done unimplemented user operations uuos instructions defined hardware trapped supervisor mechanism also used emulate operations may hardware implementations cheaper models major datatypes directly supported architecture two complement 36-bit integer arithmetic including bitwise operations 36-bit floating-point halfwords extended 72-bit floating point supported special instructions designed used multi-instruction sequences byte pointers supported special instructions word structured count half pointer half facilitates use bounded regions memory notably stacks instruction set symmetrical every instruction consists 9-bit opcode 4-bit register code 23-bit effective address field consists turn 1-bit indirect bit 4-bit register code 18-bit offset instruction execution begins calculating effective address adds contents given register non-zero offset indirect bit 1 fetches word calculated address repeats effective address calculation effective address zero indirect bit reached resulting effective address used instruction either fetch memory contents simply constant thus example movei a,3 c adds 3 18 lower bits register c puts result register without touching memory three main classes instruction arithmetic logical move conditional jump conditional skip may side effects also several smaller classes arithmetic logical move operations include variants operate immediate-to-register memory-to-register register-to-memory register-and-memory-to-both memory-to-memory since registers may addressed part memory register-to-register operations also defined variants useful though well-defined example add operation variants addi add 18-bit mmediate constant register addm add register contents emory location addb add b oth add register contents memory also put result register elaborate example hlrom h alf l eft r ight nes emory takes left half register contents places right half memory location replaces left half memory location ones halfword instructions also used linked lists hlrz lisp car operator hrrz cdr conditional jump operations examine register contents jump given location depending result comparison mnemonics instructions start jump jumpa meaning jump always jump meaning jump never – consequence symmetric design instruction set contains several no-ops jump example jumpn loc jumps address loc contents register non-zero also conditional jumps based processor condition register using jrst instruction ka10 ki10 jrst faster jumpa standard unconditional jump jrst conditional skip operations compare register memory contents skip next instruction often unconditional jump depending result comparison simple example camn loc compares contents register contents location loc skips next instruction equal elaborate example tlce loc read test left complement skip equal using contents loc mask selects corresponding bits left half register bits e qual zero skip next instruction case replace bits boolean complement smaller instruction classes include shift/rotate instructions procedure call instructions particularly notable stack instructions push pop corresponding stack call instructions pushj popj byte instructions use special format indirect word extract store arbitrary-sized bit fields possibly advancing pointer next unit original pdp-10 operating system simply called monitor later renamed tops-10 eventually pdp-10 system renamed decsystem-10 early versions monitor tops-10 formed basis stanford waits operating system compuserve time-sharing system time pdp-10 operators began running operating systems assembled major components developed outside dec. example main scheduler might come one university disk service another commercial timesharing services compuserve on-line systems ols rapidata maintained sophisticated inhouse systems programming groups could modify operating system needed businesses without dependent dec others also strong user communities decus users share software developed bbn developed alternative operating system tenex fairly quickly became de facto standard research community dec later ported tenex kl10 enhanced considerably named tops-20 forming decsystem-20 line mit developed ctss compatible time-sharing system run ibm 709 later modified ibm 7094 system also developed incompatible timesharing system run pdp-6 later modified pdp-10 naming related since ibm dec/pdp hardware different i.e incompatible despite 36-bit cpu name selected tom knight play ctss name tymshare developed tymcom-x derived tops-10 using page-based file system like tops-20 1971 1972 researchers xerox parc frustrated top company management refusal let buy pdp-10 xerox bought scientific data systems sds 1969 wanted parc use sds machine instead group led charles p. thacker designed constructed two pdp-10 clone systems named maxc pronounced max honour max palevsky sold sds xerox use maxc also backronym multiple access xerox computer maxc ran modified version tenex third-party attempts sell pdp-10 clones relatively unsuccessful see foonly systems concepts xkl one largest collections decsystem-10 architecture systems ever assembled compuserve peak operated 200 loosely coupled systems three data centers columbus ohio compuserve used systems 'hosts providing access commercial applications compuserve information service first systems bought dec dec abandoned pdp-10 architecture favor vax compuserve pdp-10 customers began buying plug compatible computers systems concepts january 2007 compuserve operating small number pdp-10 architecture machines perform billing routing functions main power supplies used kl-series machines inefficient compuserve engineers designed replacement supply used half energy compuserve offered license design kl supply dec free dec would promise new kl bought compuserve would efficient supply installed dec declined offer another modification made pdp-10 compuserve engineers replacing hundreds incandescent indicator lamps ki10 processor cabinet led lamp modules cost conversion easily offset cost savings electricity use reduced heat labor needed replace burned-out lamps digital followed step world picture right hand side shows light panel mf10 memory contemporary ki10 cpu item part computer museum populated leds 2008 demonstration purposes similar banks indicator lamps kl ks processors pdp-10 eventually eclipsed vax superminicomputer machines descendants pdp-11 dec recognized pdp-10 vax product lines competing decided concentrate software development effort profitable vax pdp-10 product line cancellation announced 1983 including cancelling ongoing jupiter project produce new high-end pdp-10 processor despite project good shape time cancellation minnow project produce desktop pdp-10 may prototyping stage event spelled doom technical cultures spawned original jargon file 1990s become something badge honor among old-time hackers cut one teeth pdp-10 pdp-10 assembly language instructions ldb dpb load/deposit byte live functions programming language common lisp see references section lisp article 36-bit word size pdp-6 pdp-10 influenced programming convenience 2 lisp pointers 18 bits one word crowther created adventure prototypical computer adventure game pdp-10 daglow created first computer baseball game 1971 dungeon 1975 first role-playing video game pdp-10 walter bright originally created empire pdp-10 roy trubshaw richard bartle created first mud pdp-10 zork written pdp-10 infocom used pdp-10s game development testing bill gates paul allen originally wrote altair basic using intel 8080 emulator running pdp-10 harvard university founded microsoft shortly software simulation historical computers simh contains module emulate ks10 cpu windows unix-based machine copies dec original distribution tapes available downloads internet running tops-10 tops-20 system may established also available simh ken harrenstien klh10 software unix-like systems emulates kl10b processor extended addressing 4 mw memory ks10 processor 512 kw memory kl10 emulation supports v.442 kl10 microcode enables run final versions tops-10 tops-20 ks10 emulation supports v.262 microcode final version ks10 dec v.130 microcode final versions ks tops-10 tops-20
[ 5012, 1445, 391, 5401, 1855, 2582, 5055, 2226, 1116, 1867, 56, 1877, 5784, 785, 1522, 3347, 6908, 5494, 1570, 5849, 6561, 8025, 7678, 3060, 3747, 1237, 3749, 4099, 1992, 190, 8066, 6784, 5911, 2733, 1638, 5571, 4145, 7372, 931, 7383, 59...
Test
5,912
2
APT_(Package_Manager):apt package manager advanced package tool apt free-software user interface works core libraries handle installation removal software debian ubuntu related linux distributions apt simplifies process managing software unix-like computer systems automating retrieval configuration installation software packages either precompiled files compiling source code apt collection tools distributed package named apt significant part apt defined c++ library functions apt also includes command-line programs dealing packages use library three programs codice_1 codice_2 codice_3 commonly used examples apt simple ubiquitous apt package important priority current debian releases therefore included default debian installation apt considered front-end codice_4 friendlier older codice_5 front-end codice_4 performs actions individual packages apt manages relations especially dependencies well sourcing management higher-level versioning decisions release tracking version pinning apt often hailed one debian best features debian developers attribute strict quality controls debian policy major feature apt way calls codice_4 — topological sorting list packages installed removed calls codice_4 best possible sequence cases utilizes codice_9 options codice_4 however unable calculate avoid reason codice_4 requires action forced user indicates one packages installed package name phrased name portion package fully qualified filename instance debian system libc6 would argument provided codice_12 notably apt automatically gets installs packages upon indicated package depends necessary original distinguishing characteristic apt-based package management systems avoided installation failure due missing dependencies type dependency hell another distinction remote repository retrieval packages apt uses location configuration file codice_13 locate desired packages might available network removable storage medium example retrieve also obtain information available installed packages apt provides command options override decisions made apt-get conflict resolution system one option force particular version package downgrade package render dependent software inoperable user must careful finally codice_14 mechanism allows user create alternative installation policy individual packages user specify packages posix regular expression apt searches cached list packages lists dependencies must installed updated apt retrieves configures installs dependencies automatically triggers treatment deferred actions usage modes apt apt-get facilitate updating installed packages include codice_19 apt configuration folders files apt-config apt configuration query program codice_20 shows configuration apt relies concept repositories order find software resolve dependencies apt repository directory containing packages along index file specified networked cdrom location debian project keeps central repository 25,000 software packages ready download installation number additional repositories added apt sources.list configuration file codice_13 queried apt graphical front-ends often allow modifying codice_29 simply apt-setup package repository specified like system installation packages repository installed without specifying source kept up-to-date automatically addition network repositories compact discs storage media usb keydrive hard disks ... used well using apt-cdrom adding codice_33 source list file apt-cdrom specify different folder cd-rom using codice_34 option i.e hard disk usb keydrive debian cds available download contain debian repositories allows non-networked machines upgraded also one use apt-zip problems may appear several sources offer package systems possibly conflicting sources use apt pinning control sources preferred apt pinning feature allows administrators force apt choose particular versions packages may available different versions different repositories allows administrators ensure packages upgraded versions may conflict packages system sufficiently tested unwelcome changes order pins apt preferences file codice_35 must modified although graphical front-ends often make pinning simpler several front-ends apt exist provide advanced installation functions intuitive interfaces include apt front-ends apt front-ends list dependencies packages installed upgraded ask administrator packages recommended suggested newly installed packages installed automatically install dependencies perform operations system removing obsolete files packages original effort led apt-get program dselect replacement project known codename deity project commissioned brian white debian release manager time first functional version apt-get called dpkg-get intended test program core library functions would underpin new ui much original development apt done irc records lost 'deity creation team mailing list archives include major highlights deity name abandoned official name project due concerns religious nature name apt name eventually decided considerable internal public discussion ultimately name proposed irc accepted finalized mailing lists apt introduced 1998 original test builds circulated irc first debian version included debian 2.1 released 9 march 1999 end original goal deity project replacing dselect user interface ui failure work ui portion project abandoned ui directories removed cvs system first public release apt-get response apt dselect method command line utility great positive development efforts focused maintaining improving tool much later several independent people built uis top libapt-pkg eventually new team picked project began build new features released version 0.6 apt introduced secure apt feature using strong cryptographic signing authenticate package repositories apt originally designed front-end dpkg work debian codice_36 packages version apt modified also work rpm package manager system released apt-rpm fink project ported apt mac os x package management tasks apt also available opensolaris apt-file command packaged separately apt find package includes specific file list files included package remote repositories
[ 5017, 5726, 6086, 4675, 2916, 6428, 5386, 2581, 7555, 2585, 2594, 7587, 781, 5092, 1155, 1523, 4759, 7969, 7619, 7251, 3366, 4778, 2297, 4059, 6549, 3036, 1582, 4441, 523, 163, 1598, 5523, 5530, 6951, 1989, 8055, 1621, 5200, 5545, 6609, ...
Test
5,913
1
Integrated_test_facility:integrated test facility integrated test facility itf creates fictitious entity database process test transactions simultaneously live input used incorporate test transactions normal production run system advantage periodic testing require separate test processes however careful planning necessary test data must isolated production data moreover itf validates correct operation transaction application ensure system operated correctly integrated test facility considered useful audit tool audit uses programs compare processing using independently calculated data involves setting dummy entities application system processing test production data entity means verifying processing accuracy
[ 2054 ]
Validation
5,914
4
Endgame,_Inc.:endgame inc endgame provides cyber operations platform supporting detection exploitation mitigation cyber-threats endgame started executives iss internet security systems endgame started 2008 chris rouland executives previously worked cia iss october 2010 saw investment 29 million usd raised bessemer ventures columbia capital kleiner perkins caufield byers kpcb techoperators company offers commercial web-based malware detection services defensive digital security intelligence big data analysis software february 2011 company announced partnerships hewlett-packard ibm use endgame ip reputation intelligence service within hp tippingpoint digital vaccine service ibm managed services offerings month emails sent hb gary endgame leaked revealed company sold zero-day vulnerabilities 2014 endgame moved away zero-day exploitations identifying protecting consumers potential cyber threats endgame offers services companies within financial services industry consumer technology companies software company collects information data sources accessed consumers identifying potential security threats december 2012 endgame announced appointment nathaniel fick chief executive officer replacing chris rouland former marine author bestseller one bullet away fick previously ceo center new american security independent nonpartisan national security defense policy research institution remains operating partner bessemer venture partners march 2013 endgame closed 23 million series b equity financing stated purpose fund growth existing federal customer base well expand commercial market round led new investor paladin capital group multi-stage private equity firm included participation existing investors bessemer venture partners columbia capital kleiner perkins caufield byers techoperators endgame initially became known providing cyber intelligence us agencies national security agency 2013 expanded financial commercial clients within private sector raising additional 30 million funding investment edgemore capital top tier capital partners savano capital partners endgame offers defensive analytics company network servers data exploits endgame acquired onyxware 2014 florida-based mobile security technology company provides applications detecting third-party network threats november 2014 endgame boasts approximately 100 employees endgame board directors led christopher darby president ceo in-q-tel independent strategic investment firm supporting missions intelligence community endgame announced march 2013 kenneth minihan former director national security agency managing director paladin also joined board directors april 2014 james n. miller former secretary defense policy appointed board advisers niloofar howe appointed chief strategy officer jamie butler serves chief scientist jon brody senior vice president marketing jim tosh vice president engineering
[ 4184, 7194, 3764, 1395, 7359, 4201, 1805 ]
Test
5,915
9
Meta-circular_evaluator:meta-circular evaluator computing meta-circular evaluator mce meta-circular interpreter mci interpreter defines feature interpreted language using similar facility interpreter host language example interpreting lambda application may implemented using function application meta-circular evaluation prominent context lisp self-interpreter meta-circular interpreter interpreted language nearly identical host language two terms often used synonymously dissertation corrado böhm describes design self-hosting compiler self-interpreter meta-circular interpreter host language also language interpreted self-interpreter displays universal function language question helpful learning certain aspects language self-interpreter provide circular vacuous definition language constructs thus provides little insight interpreted language semantics example evaluation strategy addressing issues produces general notion definitional interpreter combination existing language implementation meta-circular interpreters provide baseline system extend language either upwards adding features downwards compiling away features rather interpreting also useful writing tools tightly integrated programming language sophisticated debuggers language designed meta-circular implementation mind often suited building languages general even ones completely different host language many languages one meta-circular implementations partial list languages meta-circular implementation designed bottom grouped chronological order languages meta-circular implementation via third parties
[ 2451, 7152, 6428, 3368, 6016, 313, 7005, 154, 7032, 4543, 5965, 5878, 6585, 6778, 2619 ]
Train
5,916
3
Macintosh_LC:macintosh lc macintosh lc personal computer designed manufactured sold apple computer inc. october 1990 march 1992 first macintosh lc family lc introduced macintosh classic repackaging older macintosh plus macintosh iisi new entry-level machine macintosh ii series offered half price macintosh ii significantly lesser performance overall creation lc prompted apple desire produce product could sold school boards price apple ii designed inexpensive manufacturing five major components robots could assemble computer 2400 list price new 600 12-inch color display 3500 less expensive macintosh ii long apple iie card introduced lc apple officially announced retirement ii company wanted focus sales marketing efforts lc original macintosh lc introduced october 1990 initial shipments dealers following december january replaced macintosh lc ii largely built around motorola 68030 processor lc uses pizza box case processor direct slot pds nubus slots 16 mhz 68020 microprocessor lacks floating-point coprocessor although one could added via pds lc 16-bit data bus major performance bottleneck 68020 32-bit cpu lc memory management chipset places limit 10 mb ram matter much installed lc shipped 256 kb vram supporting display resolution 512×384 pixels 8-bit color vram upgradeable 512 kb supporting display resolution 512×384 pixels 16-bit color 640×480 pixels 8-bit color lc commonly purchased apple 12 rgb monitor fixed resolution 512×384 pixels form factor exactly matching width lc chassis giving two together near all-in-one appearance apple 13 640×480 trinitron display also available list price 999 cost almost much lc introduction lc lowest resolution supported color macs 640×480 many programs written color macintosh ii family computers assumed minimum unusable lower resolution several years software developers add support smaller screen resolution order guarantee software would run lcs well color classics use resolution overall general performance machine disappointing due crippling data bus bottleneck making run far slower 16 mhz 68020-based macintosh ii 1987 identical processor ran almost twice fast one difference mac ii mac lc latter socket 68851 mmu therefore could take advantage system 7 virtual memory features standard configuration included floppy drive 40 mb 80 mb hard drive version available education market apple ii card pds slot two floppy drives hard drive lc final macintosh model allow dual internal floppy drives lc macs day featured built-in networking serial port using localtalk ethernet also available option via single pds slot single expansion slot limitation multifunction cards available combining ethernet functionality mmu fpu socket apple iie card pds slot offered bundle education models lcs card allowed lc emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition aging apple ii models macintosh platform instead new low-cost ibm pc compatibles despite lc minimal video specs 12 monitor lc supports card switched 560×384 resolution better compatibility iie 280×192 high-resolution graphics essentially doubled introduced october 15 1990
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 405, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 5...
Validation
5,917
3
Xilleon:xilleon xilleon brand family socs combining low-power cpu asics accelerated video decompression functions major worldwide broadcast networks including pal ntsc secam atsc targeting digital television i.e products like set-top boxes integrated digital television digital television adapters smart tvs etc. xilleon-branded socs revealed next generation avivo named unified video decoder uvd based xilleon video processor provide hardware decoding h.264 vc-1 video codec standards amd trueaudio amd unified video decoder uvd based cadence tensilica xtensa processor originally licensed ati technologies inc. 2004 owner brand xilleon ati technologies later advanced micro devices broadcom amd announced completion acquisition ati technologies third quarter 2006 xilleon products would sold amd brand amd xilleon august 25 2008 xilleon line sold semiconductor company broadcom new line xilleon video processors flat panel lcd tvs named xilleon panel processors four models 410 411 420 421 announced ces 2008 supporting 1080p video resolution featuring technology advanced motion estimation motion compensation frame rate conversion technology based enhanced phase-plane correlation technology converts 24 60 hz input video signals 100 120 hz refresh rates used lcd tvs creating additional frames form smoother motion amd signed agreement divx inc. allow several future xilleon video processors implement hardware divx video decoding divx certification january 2008 however result company restructuring amd divested digital tv chipset business starting second quarter 2008
[ 2903, 5804, 6074, 551, 5208, 6865, 4234, 650, 5740, 5055, 1023, 4365, 4368, 4370, 1237, 4372, 536, 2443 ]
Test
5,918
6
Volume_serial_number:volume serial number volume serial number serial number assigned disk volume tape volume originated 1950s mainframe computer operating systems os/360 line human-configurable maximum length six characters uppercase must start letter identifies volume system unique manner example sysres often used system residence volume fat ntfs file systems volume serial number feature used determine disk present drive detect exchanged another one identification system created microsoft ibm development os/2 introduced ms-dos 4.01 1988 volume serial number 32-bit number determined date time real-time clock current computer time disk formatting previously method used discern whether disk swapped identified reading drive volume label much similar concept os/360 however even time volume label required unique optional therefore many users given disks meaningful name old method failed
[ 2717, 1254, 6380, 1534 ]
Validation
5,919
2
Funtouch_OS:funtouch os funtouchos operating system created vivo fork google operating system android major difference android funtouch os latter includes features unavailable former features include customizable gestures communication drawer bottom top swipe security centre lock screen resize options long screen shot eye protection changing warmer color temperature others funtouch os respects looks similar ios made apple list funtouchos releases
[ 3507, 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 195, 6978, 5473, 6427, 7346, 561, 201, 474, 2107, 2017, 6183, 822, 649, 1095, 3863, 4234, 5302, 5571, 7357, 2398, 740, 2037, 2756, 7007, 136, 42, 4340, 7749, 6209, 3310, 2591, 1399, ...
Test
5,920
2
Ethernut:ethernut ethernut open source hardware software project use embedded-ethernet-system currently four different reference designs exist ethernut 1 ethernut 2 ethernut 3 ethernut 5 available ready use boards reference designs share set interfaces designs mainly differ used microcontroller ethernut 1 2 8-bit avr ethernut 3 5 32-bit arm available memory size since ethernut 3 board mmc slot available ethernut 5 also includes usb host device interfaces rise idea internet things different groups people different aims started around 2000 developing embedded systems would able integrate existing tcp/ip networks limited resources mostly 8-bit embedded systems rarely reached exceeded 64 kb main memory imposed great challenge year 2000 british developer dave hudson released source code real-time operating system integrated tcp/ip stack named liquorice another challenge suitable hardware kind development nearly non-existing nearly network controllers time used pci-bus interface complex small microcontrollers one still-in-production controllers isa-bus interface also recommended new designs used together atmega103 microcontroller create single board computer layout board released bsd license one early open hardware projects one year hudson ceased work project source code liquorice used software foundation new ethernut project aimed integrate software hardware development first versions released avr freaks board project switched sourceforge 2002 open source operating system boards called nut/os modular real-time operating system licensed bsd license characteristics nut/os supported popular ssl/tls libraries wolfssl embedded security ethernut project implements network stack called nut/net implements substantial protocol socket api use nut/os programs supported protocols configuring nut/os nut/net quite simple download source packages nut/os configurator executed build needed libraries selected hardware configuration application programmers use nut/os nut/net libraries write software beside nut/os libraries application programmer use standard c libraries programming languages c used c++ mostly supported well additionally lua interpreter exists lua scripts executed interactively runtime board multitude simple sample applications exists easy introduction nut/os following architectures supported actively maintained research group distributed systems eth zurich developed distributed sensor network nodes based avr sensor nodes communicate via bluetooth system software open source btnut bluetooth stack used btnut stack based nut/os system extends nut/os functionality bluetooth access functions although btnut stack developed mainly btnode sensor nodes easily ported applications according german manufacturer egnite gmbh 33.000 ethernut boards sold state december 2013 several manufacturers compatible hardware achatz electronics netherlands proconx australia propox poland soc robotics canada hw group s.r.o czech republic thermotemp embedded-it germany beside nut/os operating system used base btnode sensor network eth zurich
[ 4382, 3775, 3855, 3368, 7637, 5571, 6014, 3797, 4336, 2043, 1772, 3821, 6489, 3747, 5880, 3755, 1435 ]
Test
5,921
4
H._D._Moore:h. d. moore h moore network security expert open source programmer hacker developer metasploit framework penetration testing software suite founder metasploit project served chief research officer boston based security firm rapid7 provider security data analytics software cloud solutions remained chief architect metasploit framework departure rapid7 2016 since leaving rapid7 moore joined atredis partners vice president research development founded critical research corporation software firm develops rumble network discovery referred industry famous white hat hacker moore developed security software utilities united states department defense teenager founded metasploit project summer 2003 goal becoming public resource exploit code research development known work warvox axman metasploit decloaking engine rogue network link detection tools. started month browser bugs mobb initiative 2006 experiment fast-paced vulnerability discovery full disclosure started month bugs project meme resulted number web browser patches improved security measures moore discovered involved discovery number critical security vulnerabilities metasploit framework development platform creating security tools exploits framework used network security professionals perform penetration testing system administrators verify patch installations product vendors perform regression testing security researchers worldwide framework written ruby programming language includes components written c assembly language october 2009 metasploit project acquired rapid7 metasploit framework continues free rapid7 added commercial edition called metasploit express acquisition project hd moore became chief security officer rapid7 remaining chief architect metasploit warvox software suite exploring classifying auditing telephone systems unlike normal wardialing tools warvox processes raw audio call use modem directly model allows warvox find classify wide range interesting lines including modems faxes voice mail boxes pbxs loops dial tones ivrs forwarders using signal processing techniques axman activex fuzzing engine goal axman discover vulnerabilities com objects exposed internet explorer since axman web-based security changes browser also affect results fuzzing process metasploit decloaking engine system identifying real ip address web user regardless proxy settings using combination client-side technologies custom services vulnerabilities exploited tool properly configured tor setup result identifying information exposed rogue network link detection tools designed detect unauthorized outbound network links large corporate networks tools send spoofed tcp syn icmp echo requests original destination ip encoded packet read back external listening host moore work gained praise antagonism industry companies microsoft credited discovering vulnerabilities yet criticism metasploit similar tools due capacity used criminal purposes instead offensive security criticism fallen upon moore moore warned us law enforcement involvement critical.io scanning project according moore though 're always chasing bad guys – good guys never ahead 're ones wrote exploits often found wild defenders generally following black hats
[ 113, 3932, 6991, 5616, 1584, 4699 ]
Validation
5,922
2
X-Agent:x-agent x-agent xagent spyware malware program designed collect transmit hacked files machines running windows linux ios android servers operated hackers employs phishing attacks program designed hop device device 2016 crowdstrike identified android variant malware first time claimed malware targeted members ukrainian military distributing infected version app control d-30 howitzer artillery ukrainian army denied crowdstrike report stated losses howitzer artillery pieces nothing stated cause slovakian computer security company eset obtained x-agent source code 2015 described inner workings report released october 2016 washington dc grand jury indictment resulting robert mueller investigation russian election interference charges agents russian gru moscow developed customized monitored x-agent malware used hack dccc democratic congressional campaign committee dnc democratic national committee networks beginning around april 2016 item 15 end page 4 beginning page 5
[ 704, 91, 3932, 4025, 7328, 1528, 2991, 7799, 7066, 2912, 376, 1173, 6526, 998, 3528, 3277, 2923, 7818, 208, 2021, 3864, 6628, 5571, 124, 5305, 1376, 6541, 6904, 6194, 924, 1383, 2854, 7600, 6740, 5675, 2587, 2678, 3038, 4531, 5330, 600,...
Test
5,923
2
Cabal_(software):cabal software haskell cabal common architecture building applications libraries aids packaging distribution software packages contained haskell platform cabal introduced simplify packaging haskell software modules added glasgow haskell compiler version 6.4 default package manager along ghc internal manager ghc-pkg actual binary cabal library cabal developed different packages throughout development gained additional features sandboxes allow escape so-called cabal hell see cabalizing process making library written haskell programming language conformant requirements cabal library infrastructure cabalizing may required library initially developed without taking requirements consideration developed prior introduction cabal haskell community cabal packages provide standard set metadata build process thus possible develop tools upload cabal packages cpan-like community repository software hackage even allow automated downloading compilation installation desired packages hackage since cabal uses global package repository default version conflicts dependencies lead cabal hell state certain packages get installed without re-installing already existing ones therefore breaking packages although version 1.18 introduced sandboxes improved dependency hell non-proper use sandboxes could still lead problems since packages hackage might build version boundaries dependencies loose result stable less bleeding edge variant hackage called stackage created fp complete
[ 2740, 4595, 1598, 3559, 4759, 5571, 1989, 1260 ]
Test
5,924
3
KiKi_KaiKai:kiki kaikai set feudal japan player must assume role shinto shrine maiden named sayo-chan must use o-fuda scrolls ohari gohei wand defeat number renegade spirits monsters japanese mythology game noteworthy using traditional fantasy setting genre otherwise filled science fiction motifs game follows adventures sayo-chan young shinto shrine maiden living feudal japan one night sayo-chan fanning ceremonial fire visited seven lucky gods warn great impending danger suddenly band mischievous youkai appear kidnap gods quickly retreating faraway mountain range sayo-chan determined help gods sets journey across countryside confronts number strange creatures japanese mythology including obake yurei defeating several powerful youkai leaders sayo must battle leader ancient serpent orochi kiki kaikai overhead multi-directional shooter game requires player move four directions various levels attacking harmful enemies approach screen sayo-chan player attack either throwing special o-fuda scrolls eight separate directions swinging purification rod directly front techniques upgraded finding special paper slips left defeated enemies either enhance power improve range sayo damaged coming contact enemy hit knocked must resume level preset continuation point end level player must face powerful boss monster takes several attacks defeat difficult normal enemies several hidden items found attacking objects sayo purification rod used either enhance attack grant player points certain number points gained player gain another life additional chance complete level player lives exhausted number match screen appears random 3-digit number 50-base increments 100 150 200 250 last three digits player total score match number displayed granted free game game ends family computer disk system version kiki kaikai introduced gameplay changes original arcade version including new levels enemies well limiting number times player may use sayo-chan ranged o-fuda attack along second playable character miki-chan another shrine maiden designated player two character though several additional ports would made years one would rely basic game mechanics kiki kaikai originally created 1986 taito game designer hisaya yabusaki pulling inspiration tales japanese mythology well several top-down arcade shooters popular era game put conventional spin usually technologically driven science-fiction shoot 'em titles time utilizing action game elements player free move screen choose instead forced forward normal scrolling shooter fashion similar earlier released game commando style presentation kiki kaikai described taito lovely action game offering exotic asian atmosphere shortly game japanese debut bootleg version called knight boy released arcades various countries version though officially licensed taito exact duplicate original kiki kaikai altered title screen contained new gameplay elements features kiki kaikai ported numerous home consoles personal computer systems since original arcade release game first home version released msx2 february 10 1987 minor gameplay adjustments august 28 1987 version disk system released entitled kiki kaikai dotouhen added two-player support new playable character miki-chan pc engine version released three years later march 27 1990 largely based previous disk system instalment game made jump consoles june 12 2003 taito developed java-based version kiki kaikai mobile phones called kiki kaikai bizarre world port programmed mediakite appeared may 14 2004 windows-based pcs web-based game service launched taito japanese website later year courtesy ezweb kiki kaikai also made available along various classic taito titles number compilations would appear japanese-only taito memories vol 1 playstation 2 july 28 2005 taito pocket memories playstation portable 2006 game would officially released english first time part taito legends 2 playstation 2 pc xbox released north america may 2007 later taito legends power-up playstation portable kiki kaikai soundtrack composed hisayoshi ogura reflective traditional japanese folk music mostly utilizing woodwind string instruments like shamisen electronic beat music originally presented mono format composed entirely synth-based chiptunes standard audio development system older video game hardware exclusive game soundtrack never released commercially music game featured 1987 album taito game music catalog number 28xa-110 published alfa music single track medley song later presented individualized tracks 2002 re-release taito game music scdc-00156 time published sci-tron digital content kiki kaikai garnered harsh reviews long initial release gamespot considers games one taito sleepier titles overall less quality classic games like bubble bobble double dragon latter licensed technos u.s. game graphics though unique time produced preserve well allgame remarking get initial amusement game smiling ghosts comical skeletons 'll find graphics dull controls seen simplistic yet responsive though game levels found monotonous like ninja warriors kiki kaikai one-off work 1992 taito allowed natsume release kiki kaikai nazo kuro mantle would known pocky rocky north american release natsume would follow pocky rocky 2 years later would help altron release pocky rocky becky modern continuation kiki kaikai kiki kaikai 2 originally development playstation 2 console starfish entertainment set 2006 release canceled early development reemerge unlicensed spiritual successor title kiki kai world later became heavenly guardian published protagonist game design well ghost enemies would later become heavy influences characters reimu hakurei equivalent ghost enemies respectively touhou project games pc-98 sayo-chan kiki kaikai appeared one microgames
[ 6072, 4759, 3313, 8015 ]
Test
5,925
4
AV-TEST:av-test av-test independent organization evaluates rates antivirus security suite software microsoft windows android operating systems according variety criteria every month researchers publish results testing list products awarded certification organisation based magdeburg germany 2013 security specialist ceo security company kaspersky lab eugene kaspersky criticized av-test changing certification process
[ 5452, 3506, 5546, 4759, 385, 4689, 5401, 6644, 7478, 4456, 6777 ]
Test
5,926
9
Commodore_BASIC:commodore basic commodore basic also known pet basic dialect basic programming language used commodore international 8-bit home computer line stretching pet 1977 c128 1985 core based 6502 microsoft basic shares many characteristics 6502 basics time applesoft basic commodore licensed basic microsoft pay royalties basis jack tramiel turned bill gates offer 3 per unit fee stating 'm already married would pay 25,000 perpetual license commodore took source code flat-fee basic developed internally 8-bit home computers commodore 128 v7.0 microsoft copyright notice displayed however microsoft built easter egg version 2 upgrade commodore basic proved provenance typing obscure command codice_1 would result codice_2 appearing screen easter egg well-obfuscated—the message show disassembly interpreter popular commodore 64 came basic v2.0 rom despite computer released pet/cbm series version 4.0 64 intended home computer pet/cbm series targeted business educational use built-in programming language presumed heavily used saved manufacturing costs v2 fit smaller roms convenient feature commodore rom-resident basic interpreter kernal full-screen editor although commodore keyboards featured two cursor keys alternated direction shift key held screen editor allowed users enter direct commands input edit program lines anywhere screen line prefixed line number tokenized stored program memory lines beginning number executed pressing key whenever cursor happened line marked significant upgrade program entry interfaces compared common home computer basics time typically used line editors invoked separate codice_3 command copy cursor truncated line cursor position also capability saving named files device including cassette – popular storage device days pet one remained use throughout lifespan 8-bit commodores inexpensive form mass storage systems supported filenames diskette made saving multiple files devices difficult user one systems note recorder counter display location file inaccurate prone error pet basic 2.0 files cassettes could requested name device would search filename reading data sequentially ignoring non-matching filenames file system also supported powerful record structure could loaded saved files commodore cassette data recorded digitally rather less expensive less reliable analog methods used manufacturers therefore specialized datasette required rather standard tape recorder adapters available used analog digital converter allow use standard recorder cost little less datasette command may used optional parameter load program memory address contained first two bytes file bytes discarded retained memory parameter used program load start basic program area widely differs machines commodore basic variants supplied codice_4 codice_5 commands worked like counterparts applesoft basic loading saving bitmaps specified memory locations pet support relocatable programs command always load first two bytes contained program file created problem trying load basic programs saved commodore machines would load higher address pet basic expected program workarounds move programs proper location program saved cbm-ii machine way load pet modifying first two bytes disk sector editor cbm-ii series basic program area 0 would result pet attempting load zero page locking like original microsoft basic interpreter based commodore basic slower native machine code test results shown copying 16 kilobytes rom ram takes less second machine code compared minute basic execute faster interpreter programmers started using various techniques speed execution one store often-used floating point values variables rather using literal values interpreting variable name faster interpreting literal number since floating point default type commands faster use floating point numbers arguments rather integers speed important programmers converted sections basic programs 6502 6510 assembly language loaded separately file poked memory data statements end basic program executed basic using codice_6 command either direct mode program execution speed machine language great game waiting user input programmers could poll reading selected memory locations c6 64 d0 128 denoting size keyboard queue delay halt execution commodore basic keywords could abbreviated entering first unshifted keypress shifted keypress next letter set high bit causing interpreter stop reading parse statement according lookup table meant statement high bit set accepted substitute typing entire command however since basic keywords stored memory single byte tokens convenience statement entry rather optimization default uppercase-only character set shifted characters appear graphics symbol e.g command codice_7 could abbreviated codice_8 resembled codice_9 onscreen commands two letters long cases longer cases like ambiguity unshifted letters command needed codice_10 codice_11 required codice_12 commands abbreviated form either due brevity ambiguity commands example command codice_13 abbreviation spelling collided separate codice_14 keyword located nearer beginning keyword lookup table heavily used codice_15 command single codice_16 shortcut common microsoft basic dialects abbreviating commands shifted letters unique commodore basic abbreviating keywords possible fit code single line line lengths usually limited 2 4 screen lines depending specific machine allowed slight saving overhead store otherwise necessary extra program lines nothing basic commands tokenized took 1 byte two case several commands basic 7 basic 10 memory matter way entered long lines could difficult edit codice_17 command displayed entire command keyword extending program line beyond 2 4 screen lines could entered program memory unique feature commodore basic use control codes perform tasks clearing screen positioning cursor within program invoked either issuing command x corresponds control code issued example control code clear screen pressing key question quote marks thus pressing following quote mark cause basic display visual representation control code case reversed heart acted upon program execution directly printing control codes uses less memory executes faster invoking function comparison implementations basic typically dedicated commands clear screen move cursor basic 3.5 proper commands clearing screen moving cursor program lines commodore basic require spaces anywhere command always display one line number statement e.g. common write programs spacing feature added conserve memory since tokenizer never removes space inserted keywords presence spaces results extra codice_18 bytes tokenized program merely skipped execution spaces line number program statement removed tokenizer program lines 80 characters total machines machines 40 column text would cause line wrap around next line screen vic-20 22 column display program lines could occupy many four basic 7.0 commodore 128 increased limit program line 160 characters four 40-column lines two 80-column lines using abbreviations instead possible fit even line basic 7.0 displays error user enters program line 160 characters length earlier versions produced error simply display ready prompt two lines line length exceeded line number counted number characters program line five digit line number result four fewer characters allowed one digit number order execution commodore basic lines determined line numbering instead followed order lines linked memory program lines stored memory singly linked list line number pointer containing address beginning next program line tokenized code line program entered basic would constantly reorder program lines memory line numbers pointers ascending order however program entered manually altering line numbers pointers poke commands could allow out-of-order execution even give line line number early days basic used commercially software protection technique discourage casual modification program line numbers range 0 65520 take five bytes store regardless many digits line number although execution faster fewer digits putting multiple statements line use less memory execute faster variable names significant 2 characters thus variable names codice_19 codice_20 codice_21 refer variable commodore basic also supports bitwise operators although feature part core microsoft 6502 basic code usually omitted implementations applesoft basic native number format commodore basic like parent ms basic floating point contemporary basic implementations used one byte characteristic exponent three bytes mantissa accuracy floating point number using three-byte mantissa 6.5 decimal digits round-off error common 6502 implementations microsoft basic utilized 40-bit floating point arithmetic meaning variables took five bytes store four byte mantissa one byte exponent unlike 32-bit floating point found basic-80 8080/z80 implementations microsoft basic supported integer double precision variables 6502 implementations floating point although commodore basic supports signed integer variables denoted percent sign range -32768 32767 practice used array variables serve function conserving memory limiting array elements two bytes array 2000 elements occupy 10,000 bytes declared floating point array 4000 declared integer array denoting variable integer simply causes basic convert back floating point slowing program execution wasting memory percent sign takes one additional byte store since also applies integer arrays programmer avoid using unless large arrays used would exceed available memory stored floating point also possible memory locations 32767 address defined signed integer period used place number 0 thus instead instead execute slightly faster statement used start machine language programs added commodore original microsoft basic code featured usr function invoking machine language routines automatically loads cpu registers values c64 varies machines -- used pass data machine language routines means calling kernal functions basic example clears screen since commodore 8-bit machines c128 automatically boot disk software usual technique include basic stub like begin program execution possible automatically start software loading require user type statement done piece code hooks basic ready vector versions microsoft basic array declared statement automatically set ten elements practice 11 since array elements counted 0 larger arrays must declared basic display error program run array re-dimensioned program unless variables wiped via clr statement numeric arrays automatically filled zeros created may momentary delay program execution large array dimensioned string variables represented tagging variable name dollar sign thus variables codice_22 codice_23 codice_24 would understood distinct array variables also considered distinct simple variables thus refer variable size string array merely refers many strings stored array size element allocated dynamically unlike implementations microsoft basic commodore basic require string space reserved start program unlike 8-bit machines apple ii commodore machines built-in clock initialized 0 power updated every tick pia/via/ted/cia timer thus 60 times per second assigned two system variables basic contain current time ti read-only modified result syntax error message may used set time via six number string error results using string six numbers clock reliable method timekeeping since stops whenever interrupts turned done kernal routines accessing iec ieee port pet port slow clock update ticks function commodore basic use clock generate random numbers accomplished however relatively limited use numbers 0 255 returned otherwise works implementations microsoft basic pseudo-random sequence used via fixed 5-byte seed value stored power memory locations c64 location differs machines number higher 0 generate random number amalgamated value included function seed value updated 1 time rnd function executed negative number goes point sequence current seed value specified number since true random number generation impossible statement typical c64 c128 utilize sid chip white noise channel random numbers basic 2.0 notoriously suffered extremely slow garbage collection strings garbage collection automatically invoked time function executed many string variables arrays manipulated course program clearing take hour worst conditions also possible abort garbage collection basic scan run/stop key performing routine basic 4.0 introduced improved garbage collection system back pointers later implementations commodore basic also function basic 2.0 suffered another technical flaw handle signed numbers 32768 thus function invoked c64 38k basic memory negative amount free basic memory displayed adding 65535 reported number obtain correct amount free memory pet vic-20 never 32k total memory available basic limitation become apparent c64 developed function basic 3.5 7.0 corrected problem basic 7.0 also split two functions one display free basic program text memory display free variable memory many basic extensions released commodore 64 due relatively limited capabilities native basic 2.0 one popular extensions dos wedge included commodore 1541 test/demo disk 1 kb extension basic added number disk-related commands including ability read disk directory without destroying program memory features subsequently incorporated various third-party extensions popular epyx fastload cartridge basic extensions added additional keywords make easier code sprites sound high-resolution graphics like simons basic although basic 2.0 lack sound graphics features frustrating many users critics argued ultimately beneficial since forced user learn machine language limitations basic 2.0 c64 led use built-in rom machine language basic load file designated memory location filename drive device number would read call location would specified x registers load routine would called disk magazine c64 loadstar venue hobbyist programmers shared collections proto-commands basic called command modern programming point view earlier versions commodore basic presented host bad programming traps programmer issues derived microsoft basic virtually every home computer basic era suffered similar deficiencies every line microsoft basic program assigned line number programmer common practice increment numbers value 5 10 100 make inserting lines program editing debugging easier bad planning meant inserting large sections program often required restructuring entire code common technique start program low line number jump table body program structured sections starting designated line number like 1000 2000 large section needed added could assigned next available major line number inserted jump table later basic versions commodore platforms included command well auto line numbering command would automatically select insert line numbers according selected increment addition variables treated global variables clearly defined loops hard create often causing programmer rely command later rectified basic 3.5 addition commands flag variables often needed created perform certain tasks earlier basics commodore also lack debugging commands meaning bugs unused variables hard trap structures standard part z80 microsoft basics added basic 3.5 unavailable earlier versions commodore basic common home computers commodore machines booted directly basic interpreter basic file programming commands could entered direct mode load execute software program execution halted using run/stop key variable values would preserved ram could printed debugging 128 even dedicated second 64k bank variable storage allowing values persist codice_25 codice_26 command issued along advanced screen editor included commodore basic gave programming environment repl-like feel programmers could insert edit program lines screen location interactively building program contrast business-oriented operating systems time like cp/m ms-dos typically booted command line interface programming language required platforms loaded separately versions commodore basic included disk-specific codice_27 codice_28 commands version built commodore 64 lacked requiring user specify disk drive device number typically 8 9 standard codice_29 command otherwise defaulted tape another omission commodore 64s basic 2.0 codice_30 command display disk contents without clearing main memory 64 viewing files disk implemented loading program listed showed directory pseudo basic program file block size line number effect overwriting currently loaded program addons like dos wedge overcame rendering directory listing direct screen memory list cbm basic versions chronological order successively added features
[ 5367, 1255, 12, 2463, 6891, 3359, 8183, 4139, 5651, 7353, 2925, 7448, 5129, 7906, 5137, 5234, 2941, 3303, 6380, 1670, 1304, 6662, 61, 6394, 4003, 7864, 1789, 5877, 6778, 4012, 5087, 2164, 4915, 4745, 5190, 1064 ]
Train
5,927
7
Heroku:heroku heroku cloud platform service paas supporting several programming languages one first cloud platforms heroku development since june 2007 supported ruby programming language supports java node.js scala clojure python php go reason heroku said polyglot platform features developer build run scale applications similar manner across languages heroku acquired salesforce.com 2010 212 million heroku initially developed james lindenbaum adam wiggins orion henry supporting projects compatible ruby programming platform known rack prototype development took around six months later heroku faced drawbacks lack proper market customers many app developers used tools environment jan 2009 new platform launched built almost scratch three-month effort october 2009 byron sebastian joined heroku ceo december 8 2010 salesforce.com acquired heroku wholly owned subsidiary salesforce.com july 12 2011 yukihiro matz matsumoto chief designer ruby programming language joined company chief architect ruby month heroku added support node.js clojure september 15 2011 heroku facebook introduced heroku facebook present heroku supports redis databases addition standard postgresql name heroku portmanteau heroic haiku japanese theme nod matz creating ruby name pronounced similarly “ widening ” japanese though creators heroku want name project particular meaning japanese language chose invent name applications run heroku typically unique domain typically applicationname.herokuapp.com used route http requests correct dyno application containers dynos spread across dyno grid consists several servers heroku git server handles application repository pushes permitted users heroku services hosted amazon ec2 cloud-computing platform
[ 370, 7165, 6428, 3954, 1086, 3958, 6806, 22, 3627, 2212, 397, 3309, 754, 5064, 2961, 2619, 1514, 2988, 7613, 1550, 7988, 6906, 5135, 3028, 2317, 842, 1982, 2700, 5889, 5894, 189, 1634, 3091, 6262, 7722, 7741, 5940, 5956, 3487, 2430, 596...
Test
5,928
3
Gun.Smoke:gun.smoke gun.smoke 1985 vertical scrolling shooter arcade game capcom wild west-themed game designed yoshiki okamoto gun.smoke centers character named billy bob nes version bounty hunter vicious criminals wild west red dead revolver first installment red dead series spiritual successor gun.smoke gun.smoke similar 1942 commando also developed capcom differences game scrolling shooter screen scrolls upward automatically players three ways shoot using three buttons left right center shooting player also change way gunman shoots button combinations player dies getting shot struck enemies getting caught obstacle bottom screen player collect special items including horse protection three hits get killed obstacle boots speed movement bullets faster shots rifles longer shot range items found shooting barrels rifles boots bullets stock five items add score points include stars bottles bags dragonflies cows two items watch yashichi 1up cattle skull reduces billy power note two versions gun.smoke released license america romstar one fixed sequence bosses third sixth levels swapped roy followed wolf chief pig joe followed ninja version also removes boss rundown gun.smoke ported many systems game later ported nintendo entertainment system family computer disk system 1988 objective free town hicksville band criminals known wingates order capture dangerous henchmen stage player must retrieve wanted sign said henchman otherwise impossible clear stage nes version also different music game main character bounty hunter named billy bob even though nes version stayed true gameplay arcade version major changes done although virtually identical nes version fds version featured several differences soundtrack arcade version composed ayako mori august 25 1986 alfa records released limited edition soundtrack featuring music arcade version well two unused tracks catalog number capcom game music – 28xa-94
[ 7859, 1237, 2892 ]
Validation
5,929
4
SpoonWEP/WPA:spoonwep/wpa spoonwep/wpa gui uses aircrack-ng autonomously crack wep wpa keys tool included so-called network-scrounging cards chinese usb wi-fi adapters promise internet access free
[ 5571, 848, 1942, 578, 7207, 6220, 7209 ]
Test
5,930
3
Interoperation:interoperation engineering interoperation setup ad hoc components methods make two systems work together combined system partial functionality certain time possibly requiring human supervision perform necessary adjustments corrections contrasts interoperability theoretically permits number systems compliant given standard work together long time smoothly unattended combined system full functionality standard another definition interoperation services effectively combining multiple resources domains ... requires interoperability interoperation usually performed systems combined designed standardization example legacy systems standard compliance expensive difficult immature interoperation may use following mechanisms components methods area data processing interoperation may also use following components methods
[ 374, 2087 ]
Test
5,931
2
Pipeline_(Unix):pipeline unix unix-like computer operating systems pipeline mechanism inter-process communication using message passing pipeline set processes chained together standard streams output text process stdout passed directly input stdin next one first process completed second started executed concurrently concept pipelines championed douglas mcilroy unix ancestral home bell labs development unix shaping toolbox philosophy named analogy physical pipeline key feature pipelines hiding internals ritchie thompson 1974 turn allows clarity simplicity system article anonymous pipes data written one process buffered operating system read next process uni-directional channel disappears processes completed differs named pipes messages passed pipe named making file remains processes completed standard shell syntax anonymous pipes list multiple commands separated vertical bars pipes common unix verbiage example list files current directory retain lines output containing string view result scrolling page user types following command line terminal codice_1 produces process output stdout piped input stdin process grep key likewise process less process takes input previous process produces output next process via standard streams codice_2 tells shell connect standard output command left standard input command right inter-process communication mechanism called anonymous pipe implemented operating system pipes unidirectional data flows pipeline left right widely used unix shells special syntax construct creation pipelines usage one writes commands sequence separated ascii vertical bar character codice_2 reason often called pipe character shell starts processes arranges necessary connections standard streams including amount buffer storage default standard error streams stderr processes pipeline passed pipe instead merged directed console however many shells additional syntax changing behavior csh shell instance using codice_4 instead codice_2 signifies standard error stream also merged standard output fed next process bourne shell also merge standard error codice_4 since bash 4.0 using codice_7 well redirect different file commonly used simple pipelines shell connects series sub-processes via pipes executes external commands within sub-process thus shell direct processing data flowing pipeline however possible shell perform processing directly using so-called mill pipemill since codice_8 command used mill results initial command construct generally looks something like pipemill may perform intended body loop includes commands codice_9 codice_10 read codice_11 loop first iteration program let call drain read remaining output codice_12 loop terminate results depending specifics drain couple possible ways avoid behavior first drains support option disable reading codice_11 e.g codice_14 alternatively drain need read input codice_11 something useful given codice_16 input pipelines created program control unix codice_17 system call asks operating system construct new anonymous pipe object results two new opened file descriptors process read-only end pipe write-only end pipe ends appear normal anonymous file descriptors except ability seek avoid deadlock exploit parallelism unix process one new pipes generally call codice_18 create new processes process close end pipe using producing consuming data alternatively process might create new thread use pipe communicate named pipes may also created using codice_19 codice_20 presented input output file programs invoked allow multi-path pipes created especially effective combined standard error redirection codice_21 unix-like systems processes pipeline started time streams appropriately connected managed scheduler together processes running machine important aspect setting unix pipes apart pipe implementations concept buffering example sending program may produce 5000 bytes per second receiving program may able accept 100 bytes per second data lost instead output sending program held buffer receiving program ready read data next program pipeline reads buffer linux size buffer 65,536 bytes 64kib open source third-party filter called bfr available provide larger buffers required tools like netcat socat connect pipes tcp/ip sockets pipeline concept invented douglas mcilroy first described man pages version 3 unix mcilroy noticed much time command shells passed output file one program input another ideas implemented 1973 one feverish night wrote mcilroy ken thompson added codice_17 system call pipes shell several utilities version 3 unix next day mcilroy continued saw unforgettable orgy one-liners everybody joined excitement plumbing mcilroy also credits thompson codice_2 notation greatly simplified description pipe syntax version 4 idea eventually ported operating systems dos os/2 microsoft windows beos often notation although developed independently unix pipes related preceded 'communication files developed ken lochner 1960s dartmouth time sharing system tony hoare communicating sequential processes csp mcilroy pipes developed robot icon apple automator also uses pipeline concept chain repetitive commands together holds pipe homage original unix concept feature unix borrowed operating systems taos ms-dos eventually became pipes filters design pattern software engineering
[ 3683, 361, 6789, 4759, 6167, 3085, 6885, 2638, 4771, 5116, 473, 6620, 3531, 4685, 1837, 5566, 7260, 3533, 1554, 5571, 5833, 6017, 3979, 5946, 5947, 1668, 6380, 938, 3990, 6470, 4447, 4539, 1600, 3236, 3751, 5264, 878 ]
Train
5,932
9
PL/I:pl/i pl/i programming language one pronounced procedural imperative computer programming language developed published ibm designed scientific engineering business system programming used academic commercial industrial organizations since introduced 1960s still used pl/i main domains data processing numerical computation scientific computing system programming supports recursion structured programming linked data structure handling fixed-point floating-point complex character string handling bit string handling language syntax english-like suited describing complex data formats wide set functions available verify manipulate 1950s early 1960s business scientific users programmed different computer hardware using different programming languages business users moving autocoders via comtran cobol scientific users programmed general interpretive programme gip fortran algol george others ibm system/360 announced 1964 delivered 1966 designed common machine architecture groups users superseding existing ibm architectures similarly ibm wanted single programming language users hoped fortran could extended include features needed commercial programmers october 1963 committee formed composed originally three ibmers new york three members share ibm scientific users group propose extensions fortran given constraints fortran unable embarked design new programming language based loosely algol labeled npl acronym conflicted uk national physical laboratory replaced briefly mppl multipurpose programming language 1965 pl/i roman numeral first definition appeared april 1964 ibm took npl starting point completed design level first compiler could written npl definition incomplete scope detail control pl/i language vested initially new york programming center later ibm uk laboratory hursley share guide user groups involved extending language role ibm process controlling language pl/i projects experience defining large language showed need formal definition pl/i project set 1967 ibm laboratory vienna make unambiguous complete specification led turn one first large scale formal methods development vdm fred brooks credited ensuring pl/i character data type language first specified detail manual pl/i language specifications c28-6571 written new york 1965 superseded pl/i language specifications gy33-6003 written hursley 1967 ibm continued develop pl/i late sixties early seventies publishing gy33-6003 manual manuals used multics group early implementers first compiler delivered 1966 standard pl/i approved 1976 goals pl/i evolved early development language competitiveness cobol record handling report writing required language scope usefulness grew include system programming event-driven programming additional goals pl/i achieve goals pl/i borrowed ideas contemporary languages adding substantial new capabilities casting distinctive concise readable syntax many principles capabilities combined give language character important meeting language goals language designed things programmers summary extracted ansi pl/i standard ansi pl/i general-purpose subset standard pl/i program consists set procedures written sequence statements codice_5 construct used include text sources program translation statement types summarized groupings give overview language standard uses organization names may declared represent data following types either single values aggregates form arrays lower-bound upper-bound per dimension structures comprising nested structure array scalar variables codice_6 type comprises attributes base scale precision scale factor codice_7 type encoded within codice_8 mode specified separately codice_9 applied real imaginary parts values computed expressions written using specific set operations builtin functions may applied aggregates well single values together user-defined procedures likewise may operate return aggregate well single values assignment statement assigns values one variables reserved words pl/i statement terminated semi-colon maximum length statement implementation defined comment may appear anywhere program space permitted preceded characters forward slash asterisk terminated characters asterisk forward slash i.e statements may label-prefix introducing entry name codice_10 codice_11 statements label name condition prefix enabling disabling computational condition e.g codice_12 entry label names may single identifiers identifiers followed subscript list constants codice_13 sequence statements becomes group preceded codice_4 statement followed codice_15 statement groups may include nested groups begin blocks codice_16 statement specifies group single statement codice_17 part codice_18 part see sample program group unit iteration begin block codice_19 may contain declarations names internal procedures local block procedure starts codice_11 statement terminated syntactically codice_15 statement body procedure sequence blocks groups statements contains declarations names procedures local procedure codice_22 procedure on-unit single statement block statements written executed one conditions occur computational condition input/output condition one conditions declaration identifier may contain one following attributes need mutually consistent current compilers kednos micro focus particularly ibm implement many extensions standardized version language ibm extensions summarised implementation sub-section compiler later although extensions common compilers lack current standard means compatibility guaranteed language standardization began april 1966 europe ecma tc10 1969 ansi established composite language development committee nicknamed kludge later renamed x3j1 pl/i standardization became joint effort ecma tc/10 ansi x3j1 subset gy33-6003 document offered joint effort ibm became base document standardization major features omitted base document multitasking attributes program optimization e.g codice_27 codice_28 proposals change base document voted upon committees event committees disagreed chairs initially michael marcotty general motors c.a.r hoare representing icl resolve disagreement addition ibm honeywell cdc data general digital equipment prime computer burroughs rca univac served x3j1 along major users eastman kodak mitre union carbide bell laboratories various government university representatives development language occurred standards bodies continuing improvements structured programming internal consistency omission obscure contentious features language development neared end x3j1/tc10 realized number problems document written english text discussion single item might appear multiple places might might agree difficult determine omissions well inconsistencies consequently david beech ibm robert freiburghouse honeywell milton barber cdc m. donald maclaren argonne national laboratory craig franklin data general lois frampton digital equipment editor d.j andrews ibm undertook rewrite entire document producing one complete chapters standard couched formal definition using pl/i machine specify semantics first possibly programming language standard written semi-formal definition pl/i general-purpose subset subset-g standard issued ansi 1981 revision published 1987 general purpose subset widely adopted kernel pl/i implementations pl/i first implemented ibm hursley laboratories united kingdom part development system/360 first production pl/i compiler pl/i f compiler os/360 operating system built john nash team hursley uk runtime library team managed i.m nobby clarke pl/i f compiler written entirely system/360 assembly language release 1 shipped 1966 os/360 real-memory environment compiler designed systems little 64 kilobytes real storage – f 64 kb s/360 parlance fit large compiler 44 kilobytes memory available 64-kilobyte machine compiler consists control phase large number compiler phases approaching 100 phases brought memory disk one time handle particular language features aspects compilation phase makes single pass partially-compiled program usually held memory aspects language still designed pl/i f implemented omitted later releases pl/i record i/o shipped pl/i f release 2 list processing functions based variables pointers areas offsets locate-mode i/o first shipped release 4 major attempt speed pl/i code compete fortran object code pl/i f release 5 substantial program optimization do-loops facilitated reorder option procedures version pl/i f released tss/360 timesharing operating system system/360 model 67 adapted ibm mohansic lab ibm la gaude lab france developed language conversion programs convert fortran cobol algol programs pl/i f level pl/i pl/i compiler using 16 kilobytes memory developed ibm germany dos/360 low end operating system implements subset pl/i language requiring strings arrays fixed extents thus simplifying run-time environment reflecting underlying operating system lacks dynamic storage allocation controlled storage class shipped within year pl/i f. compilers implemented several groups early 1960s multics project mit one first develop operating system high-level language used early pl/i epl subset dialect pl/i implementation language 1964 epl developed bell labs mit douglas mcilroy robert morris others influential multics pl/i compiler source compiler technology used number manufacturers software groups honeywell pl/i compiler series 60 implementation full ansi x3j1 standard pl/i optimizer checkout compilers produced hursley support common level pl/i language aimed replace pl/i f compiler checkout compiler rewrite pl/i f bsl ibm pl/i-like proprietary implementation language later pl/s performance objectives set compilers shown ibm presentation bcs compilers produce identical results checkout compiler used debug programs would submitted optimizer given compilers entirely different designs handling full pl/i language goal challenging achieved pl/i optimizing compiler took pl/i f compiler ibm workhorse compiler 1970s 1990s like pl/i f multiple pass compiler 44 kilobyte design point entirely new design unlike f compiler perform compile time evaluation constant expressions using run-time library reducing maximum memory compiler phase 28 kilobytes second-time around design succeeded eliminating annoyances pl/i f cascading diagnostics written s/360 macro assembler team led tony burbridge worked pl/i f. macros defined automate common compiler services shield compiler writers task managing real-mode storage allowing compiler moved easily memory models gamut program optimization techniques developed contemporary ibm fortran h compiler deployed optimizer equaled fortran execution speeds hands good programmers announced ibm s/370 1970 shipped first dos/360 operating system august 1971 shortly afterward os/360 first virtual memory ibm operating systems os/vs1 mvs vm/cms developers unaware shoehorning code 28 kb sections ibm poughkeepsie finally ready ship virtual memory support os/360 supported batch programming environments tso cms could run interactively compiler went many versions covering mainframe operating systems including operating systems japanese plug-compatible machines pcms compiler superseded ibm pl/i os/2 aix linux z/os pl/i checkout compiler colloquially checker announced august 1970 designed speed improve debugging pl/i programs team led brian marks three-pass design cut time compile program 25 taken f compiler run interactive terminal converting pl/i programs internal format h-text format interpreted checkout compiler run-time detecting virtually types errors pointers represented 16 bytes containing target address description referenced item thus permitting bad pointer use diagnosed conversational environment error detected control passed user inspect variables introduce debugging statements edit source program time debugging capability mainframe programming environments developed functions offered compiler withdrawn 1990s perhaps commercially successful implementation aside ibm digital equipment 1988 release ansi pl/i 1987 subset implementation strict superset ansi x3.4-1981 pl/i general purpose subset provides features new ansi x3.74-1987 pl/i general purpose subset front end designed robert freiburghouse code generator implemented dave cutler managed design implementation vax/vms runs vms vax alpha tru64 uniprise systems inc. responsible compiler late 1960s early 1970s many us canadian universities establishing time-sharing services campus needed conversational compiler/interpreters use teaching science mathematics engineering computer science dartmouth developing basic pl/i popular choice concise easy teach ibm offerings unsuitable number schools built subsets pl/i interactive support examples compiler developed cornell university teaching dialect called pl/c unusual capability never failing compile program use extensive automatic correction many syntax errors converting remaining syntax errors output statements language almost pl/i implemented ibm pl/c fast compiler plago created polytechnic institute brooklyn used simplified subset pl/i language focused good diagnostic error messages fast compilation times computer systems research group university toronto produced sp/k compilers supported sequence subsets pl/i called sp/1 sp/2 sp/3 ... sp/8 teaching programming programs ran without errors sp/k compilers produced results contemporary pl/i compilers ibm pl/i f compiler ibm checkout compiler cornell university pl/c compiler examples pl0 p. grouse university new south wales plum marvin zelkowitz university maryland. pluto university toronto major revamp pl/i ibm santa teresa california launched entirely new compiler 1992 initial shipment os/2 included ansi-g features many new pl/i features subsequent releases covered additional platforms mvs vm os/390 aix windows -although support windows since withdrawn continued add functions make pl/i fully competitive languages offered pc particularly c c++ areas overtaken corresponding ibm language environment supports inter-operation pl/i programs database transaction systems programs written c c++ cobol compiler supports data types needed intercommunication languages pl/i design principles retained withstood major extension comprising several new data types new statements statement options new exception conditions new organisations program source resulting language compatible super-set pl/i standard earlier ibm compilers major topics added pl/i latest series pl/i compilers z/os called enterprise pl/i z/os leverage code generation latest z/architecture processors z14 z13 zec12 zbc12 z196 z114 via use archlvl parm control passed compilation second high level language supported z/os language environment xl c/c++ first enterprise cobol v5 last codice_30 new computational data type ordinal facilities like pascal e.g codice_39 addition name internal values accessible via built-in functions built-in functions provide access ordinal value predecessor successor codice_40 see allows additional codice_33s declared composed pl/i built-in attributes codice_42 locator data type similar codice_43 data type strongly typed bind particular data structure codice_44 operator used select data structure using handle codice_34 attribute equivalent codice_46 early pl/i specifications permits several scalar variables arrays structures share storage unit occupies amount storage needed largest alternative attributes added new string-handling functions added centre text edit using picture format trim blanks selected characters head tail text codice_63 codice_64 right codice_65 codice_66 functions compound assignment operators la c e.g codice_67 codice_68 codice_69 codice_70 added codice_71 equivalent codice_72 additional parameter descriptors attributes added omitted arguments variable length argument lists codice_73 attribute declares identifier constant derived specific literal value restricted expression parameters codice_74 pass address codice_37 pass value attributes codice_76 codice_77 attributes prevent unintended assignments codice_78 obviates need contrived construct codice_79 codice_40 introduces user-specified names e.g codice_81 combinations built-in attributes e.g codice_82 thus codice_83 creates codice_33 name codice_81 alias set built-in attributes fixed binary 31.0 codice_31 applies structures members provides codice_33 name set structure attributes corresponding substructure member declarations use structure declaration generalisation codice_88 attribute codice_89 statement exit loop codice_90 continue next iteration loop codice_56 codice_57 options iterative groups package construct consisting set procedures declarations use unit variables declared outside procedures local package use codice_93 codice_94 codice_95 storage procedure names used package also local made external means codice_96 option codice_97 codice_98 executed on-unit terminates execution on-unit raises condition procedure called current one thus passing control corresponding on-unit procedure codice_99 condition handles invalid operation codes detected pc processor well illegal arithmetic operations subtraction two infinite values codice_100 condition provided intercept conditions specific on-unit provided current procedure codice_101 condition raised codice_102 statement unable obtain sufficient storage number vendors produced compilers compete ibm pl/i f optimizing compiler mainframes minicomputers 1970s 1980s target usually emerging ansi-g subset pl/i implementations developed mainframes late 1960s mini computers 1970s personal computers 1980s 1990s although main use mainframes pl/i versions dos microsoft windows os/2 aix openvms unix widely used business data processing system use writing operating systems certain platforms complex powerful systems built pl/i sas system initially written pl/i sas data step still modeled pl/i syntax pioneering online airline reservation system sabre originally written ibm 7090 assembler s/360 version largely written using sabretalk purpose built subset pl/i compiler dedicated control program pl/i used write executable formal definition interpret ibm system network architecture pl/i fulfill supporters hopes would displace fortran cobol become major player mainframes remained minority significant player definitive explanation trends 1970s 1980s militated success progressively reducing territory pl/i enjoyed competitive advantage first nature mainframe software environment changed application subsystems database transaction processing cics ims oracle system 370 application generators became focus mainframe users application development significant parts language became irrelevant need use corresponding native features subsystems tasking much input/output fortran used application areas confining pl/i cobol territory users stayed cobol pc became dominant environment program development fortran cobol pl/i became minority languages overtaken c++ java like second pl/i overtaken system programming field ibm system programming community ready use pl/i instead ibm developed adopted proprietary dialect pl/i system programming – pl/s success pl/s inside ibm c outside ibm unique pl/i strengths system programming became less valuable third development environments grew capabilities interactive software development made unique pl/i interactive debugging strengths less valuable fourth cobol fortran added features structured programming character string operations object orientation reduced pl/i relative advantages mainframes substantial business issues stake ibm hardware competitors little gain much lose success pl/i compiler development expensive ibm compiler groups in-built competitive advantage many ibm users wished avoid locked proprietary solutions early support pl/i vendors best avoid pl/i article uses pl/i standard reference point language features number features significance early implementations standard offered non-ibm compilers de facto language continued grow standard ultimately driven developments personal computer multi tasking implemented pl/i f optimizer newer aix z/os compilers comprised data types codice_104 codice_105 codice_106 codice_107 fork codice_108 join codice_109 codice_110s record i/o statements codice_111 statement unlock locked records codice_112 files event data identify particular event indicate whether complete 1 b incomplete 0 b task data items identify particular task process indicate priority relative tasks first ibm compile time preprocessor built ibm boston advanced programming center located cambridge mass shipped pl/i f compiler codice_5 statement standard rest features dec kednos pl/i compilers implemented much set features ibm additions ibm continued add preprocessor features compilers preprocessor treats written source program sequence tokens copying output source file acting token encountered following compile time statement executed identifier token encountered identifier codice_114d codice_115d assigned compile time value identifier replaced value tokens added output stream require action e.g codice_116 values activated compile time expressions thus compile time variable codice_117 could declared activated assigned using codice_118 subsequent occurrences codice_117 would replaced codice_120 data type supported codice_121 integers codice_122 strings varying length maximum length structure statements simple statements also may label-list feature allowed programmers use identifiers constants e.g product part numbers mathematical constants superseded standard named constants computational data conditional compiling iterative generation source code possible compile-time facilities supported standard several manufacturers implemented facilities structured programming additions made pl/i standardization accepted standard features codice_133 exit iterative codice_4 codice_135 codice_136 added codice_4 case statement general form codice_138 br features included dec pl/i pl/i f offered debug facilities put forward standard implemented others notably check variable-list condition prefix codice_139 on-condition codice_140 option ibm optimizing checkout compilers added additional features appropriate conversational mainframe programming environment e.g codice_141 condition several attempts made design structure member type could one several datatypes codice_46 early ibm growth classes programming theory approaches became possible pl/i base codice_34 codice_33 etc added several compilers pl/i conceived single-byte character world support japanese chinese language becoming essential developments international code pages character string concept expanded accommodate wide non-ascii/ebcdic strings time date handling overhauled deal millennium problem introduction datetime function returned date time one 35 different formats several date functions deal conversions days seconds though language easy learn use implementing pl/i compiler difficult time-consuming language large pl/i needed subsets vendors could produce users master resolved ansi g published compile time facilities unique pl/i took added implementation effort additional compiler passes pl/i compiler two four times large comparable fortran cobol compilers also much slower—supposedly offset gains programmer productivity anticipated ibm first compilers written argue pl/i unusually hard parse pl/i keywords reserved programmers use variable procedure names programs original pl/i f compiler attempts auto-correction encounters keyword used incorrect context often assumes variable name leads cascading diagnostics problem solved later compilers effort needed produce good object code perhaps underestimated initial design language program optimization needed compete excellent program optimization carried available fortran compilers unusually complex owing side effects pervasive problems aliasing variables unpredictable modification occur asynchronously exception handlers may provided statements unseen callers together make difficult reliably predict program variables might modified runtime typical use however user-written error handlers codice_145 often make assignments variables spite aforementioned difficulties ibm produced pl/i optimising compiler 1971 pl/i contains many rarely-used features multitasking support ibm extension language add cost complexity compiler co-processing facilities require multi-programming environment support non-blocking multiple threads processes operating system compiler writers free select whether implement features undeclared variable default declared first occurrence—thus misspelling might lead unpredictable results implicit declaration different fortran programs pl/i f however attribute listing enables programmer detect misspelled undeclared variable many programmers slow move cobol fortran due perceived complexity language immaturity pl/i f compiler programmers sharply divided scientific programmers used fortran business programmers used cobol significant tension even dislike groups pl/i syntax borrowed cobol fortran syntax instead noticing features would make job easier fortran programmers time noticed cobol syntax opinion business language cobol programmers noticed fortran syntax looked upon scientific language cobol fortran programmers viewed bigger version language somewhat intimidated language disinclined adopt another factor pseudo -similarities cobol fortran algol pl/i elements looked similar one languages worked differently pl/i frustrations left many experienced programmers jaundiced view pl/i often active dislike language early unix fortune file contained following tongue-in-cheek description language speaking someone delved intricacies pl/i sure real men could written machine-hogging cycle-grabbing all-encompassing monster allocate array free middle third sure multiply character string times bit string assign result float decimal go ahead free controlled variable procedure parameter reallocate passing back overlay three different types variable memory location anything say write recursive macro well real men use rescan could language obviously designed written real men intended real man use positive side full support pointers data types including pointers structures recursion multitasking string handling extensive built-in functions pl/i indeed quite leap forward compared programming languages time however enough persuade majority programmers shops switch pl/i pl/i f compiler compile time preprocessor unusual outside lisp world using target language syntax semantics e.g compared c preprocessor directives pl/i provides several 'storage classes indicate lifetime variables storage managed codice_146 codice_94 simplest implement codice_93 indicates memory allocated initialized load-time done cobol working-storage early fortran default codice_22 variables pl/i default storage class codice_150 variables codice_151 similar block-structured languages influenced algol like auto storage class c language default storage allocation pascal local-storage ibm cobol storage codice_151 variables allocated upon entry codice_153 procedure on-unit declared compiler runtime system allocate memory stack frame contain housekeeping information variable declared codice_154 code set initial value executed time care required manage use initialization properly large amounts code executed initialize variables every time scope entered especially variable array structure storage codice_151 variables freed block exit codice_156 codice_94 variables used retain variables contents invocations procedure block codice_95 storage also managed using stack pushing popping allocations stack managed programmer using codice_102 codice_160 statements storage codice_94 variables managed using codice_162 instead stack allocations independent lifetimes addressed codice_163 codice_43 variables codice_23 attribute used declare programmer-defined heaps data allocated freed within specific area area deleted read written unit several ways accessing allocated storage different data declarations well defined safe used safely careful programming inherently unsafe and/or machine dependent passing variable argument parameter reference allows argument allocated storage referenced using parameter codice_166 attribute e.g codice_167 allows part variable storage used different consistent declaration language definition includes codice_46 attribute later renamed codice_34 allow different definitions data share storage supported many early ibm compilers usages safe machine independent record i/o list processing produce situations programmer needs fit declaration storage next record item knowing type data structure based variables pointers key programs data structures must designed appropriately typically using fields data structure encode information type size fields held preceding structure constraints current one encoding preceding structure program needs allocate based variable declaration matches current item using expressions extents needed type size information kept current structure self defining structures type-defining fields must ahead type dependent items place every version data structure codice_103-option used self-defining extents e.g string lengths codice_171 codice_172 used allocate instances data structure self-defining structures typing codice_173 fields placed ahead real data records data set items list data structures organised way handled safely machine independent way pl/i implementations except pl/i checkout compiler keep track data structure used storage first allocated codice_94 declaration used pointer storage access storage inherently unsafe machine dependent however usage become important pointer arithmetic typically adding certain amount known address contentious subject computer science addition problem wild references buffer overruns issues arise due alignment length data types used particular machines compilers many cases pointer arithmetic might needed involve finding pointer element inside larger data structure codice_175 function computes pointers safely machine independently pointer arithmetic may accomplished aliasing binary variable pointer codice_176 relies pointers length codice_177 integers aligned boundaries prevalence c free easy attitude pointer arithmetic recent ibm pl/i compilers allow pointers used addition subtraction operators giving simplest syntax compiler options disallow practices safety machine independence paramount pl/i designed programs ran batch mode possible intervention programmer terminal exceptional condition division zero would abort program yielding hexadecimal core dump pl/i exception handling via on-units allowed program stay control face hardware operating system exceptions recover debugging information closing gracefully program became properly debugged exception handling could removed disabled level control became less important conversational execution became commonplace computational exception handling enabled disabled condition prefixes statements blocks including on-units procedures – e.g codice_178 operating system exceptions input/output storage management always enabled on-unit single statement codice_179-block introduced codice_180 executing statement enables condition specified e.g. codice_181 exception condition occurs condition enabled on-unit condition executed on-units inherited call chain block procedure on-unit activated on-units established invoking activation inherited new activation may over-ridden another codice_180 reestablished codice_183 exception simulated using codice_184 – e.g help debug exception handlers dynamic inheritance principle on-units allows routine handle exceptions occurring within subroutines uses on-unit effect condition raised standard system action taken often raise codice_25 condition system action reestablished using codice_186 option codice_180 conditions possible complete executing on-unit return point interrupt e.g. codice_188 conditions resume normal execution conditions codice_189 codice_25 condition raised attempted on-unit may terminated codice_191 preventing return point interrupt permitting program continue execution elsewhere determined programmer on-unit needs designed deal exceptions occur on-unit codice_192 statement allows nested error trap error occurs within on-unit control might pass operating system system dump might produced computational conditions continue execution mentioned pl/i codice_193 i/o statements relatively simple syntax offer options many situations end-of-file record transmission errors occur record read written instead complexities handled on-units various file conditions approach adopted codice_23 sub-allocation codice_23 condition existence exception handling on-units effect optimization variables inspected altered on-units values variables might otherwise kept registers statements may need returned storage statements discussed section implementation issues
[ 5012, 4302, 6798, 3951, 5041, 5396, 2576, 2226, 6470, 1495, 1879, 64, 4361, 7213, 6849, 4366, 74, 1516, 6507, 1158, 4759, 3005, 7264, 4795, 839, 4428, 7278, 4454, 5711, 3749, 6957, 7331, 4128, 5571, 217, 578, 5932, 7003, 7005, 7375, 347...
Validation
5,933
5
Berkeley_r-commands:berkeley r-commands berkeley r-commands suite computer programs designed enable users one unix system log issue commands another unix computer via tcp/ip computer network r-commands developed 1982 computer systems research group university california berkeley based early implementation tcp/ip protocol stack internet csrg incorporated r-commands unix operating system berkeley software distribution bsd r-commands premiered bsd v4.1 among programs suite remote copy remote execution remote login remote shell remote r-commands significant innovation became de facto standards unix operating systems wider public adoption internet inherent security vulnerabilities became problem beginning development secure shell protocols applications 1995 adoption entirely supplanted deployment use r-commands telnet networked systems original berkeley package provides rlogin also features rcp remote-copy allowing files copied network rsh remote-shell allowing commands run remote machine without user logging share hosts.equiv .rhosts access-control scheme although connect different daemon rshd enables user log another server via computer network using tcp network port 513. rlogin also name application layer protocol used software part tcp/ip protocol suite authenticated users act physically present computer rfc 1282 defined states rlogin facility provides remote-echoed locally flow-controlled virtual terminal proper flushing output rlogin communicates daemon rlogind remote host rlogin similar telnet command customizable able connect unix-like hosts rsh opens shell remote computer without login procedure connected user execute commands remote computer shell command-line interface rsh passes input output standard streams sends standard output user console network standard input standard flow tcp port 514 standard error flows different tcp port rsh daemon rshd opens like rsh rexec enables user run shell commands remote computer however unlike rsh server rexec server rexecd requires login authenticates users reading username password unencrypted network socket rexec uses tcp port 512. rcp copy file directory local system remote system remote system local system one remote system another command line arguments cp rcp similar rcp remote files prefixed name remote system unix copy command cp rcp overwrites existing file name target unlike cp provides mechanism warning user overwriting target file like rsh rcp uses tcp port 514 command lists users logged local unix system rwho lists users logged multi-user unix systems local network rwho daemon rwhod maintains database status unix systems local network daemon database also used ruptime program command shows long unix system running since last restart requests status report computers local network returns uptime report computer respond within time limit ruptime reports system information tracked stored daemon rwhod also used rwho command r-commands involve user authentication rcp rexec rlogin rsh share several serious security vulnerabilities due problems r-commands fell relative disuse many unix linux distributions longer including default many networks formerly relied rlogin telnet replaced ssh rlogin-equivalent slogin
[ 7148, 361, 6789, 7170, 1462, 3638, 2219, 3640, 2589, 3312, 7214, 6489, 7217, 4020, 456, 6879, 2281, 6521, 1537, 5116, 2644, 6531, 2650, 5480, 7637, 6908, 5138, 3383, 5847, 5880, 3417, 5542, 6976, 3775, 3106, 1279, 5571, 578, 923, 3794, ...
Validation
5,934
3
MIPS-3D:mips-3d mips-3d extension mips v instruction set architecture isa added 13 new instructions improving performance 3d graphics applications instructions improved performance reducing number instructions required implement four common 3d graphics operations vertex transformation clipping transformation lighting vertex transformation clipping perspective division normalization
[ 5893, 2000, 1252, 3173, 4845, 2989, 4224, 6523, 6616, 1465, 5665, 742, 5669, 5670, 584, 5055, 6647, 2226, 1770, 4077, 6563, 6133, 1881, 5431, 3747, 6675, 6236, 352, 971, 6956, 3248 ]
Validation
5,935
2
Job_File_Table:job file table job file table jft dos data structure program segment prefix psp starts psp offset 0x18 20 bytes long open file handle dos stores index system file table sft file handle returned codice_1 codice_2 similar functions simply index jft dos stored sft entry index file device program opened program starts first 5 entries jft preconnected standard devices handles marked closed setting value entry 0xff standard devices initialised follows handles 0-2 connected console device program execution get modified closed redirected like handle size jft psp limited 20 bytes originally 15 files 20-5 standard devices could open time ms-dos 2.0 extended job file table introduced allowed 254 files opened ms-dos 3.30 size jft modified call codice_3
[]
Test
5,936
3
LEON:leon leon meaning lion 32-bit cpu microprocessor core based sparc-v8 risc architecture instruction set designed sun microsystems originally designed european space research technology centre estec part european space agency esa gaisler research described synthesizable vhdl leon dual license model lgpl/gpl floss license used without licensing fee proprietary license purchased integration proprietary product core configurable vhdl generics used system-on-a-chip soc designs research commercial settings leon project started european space agency esa late 1997 study develop high-performance processor used european space projects objectives project provide open portable non-proprietary processor design capable meet future requirements performance software compatibility low system cost another objective able manufacture single event upset seu tolerant sensitive semiconductor process maintain correct operation presence seus extensive error detection error handling functions needed goals detect tolerate one error register without software intervention suppress effects single event transient set errors combinational logic leon family includes first leon1 vhsic hardware description language vhdl design used leonexpress test chip developed 0.25 μm technology prove fault-tolerance concept second leon2 vhdl design used processor device at697 atmel f various system-on-chip devices two leon implementations developed esa gaisler research part cobham aeroflex gaisler developed third leon3 design announced availability fourth generation leon leon4 processor leon processor implemented programmable logic fpga manufactured asic section subsequent subsections focus leon processors soft ip cores summarise main features processor version infrastructure processor packaged referred leon distribution processors leon series based sparc-v8 risc architecture leon2 -ft five-stage pipeline later versions seven-stage pipeline leon2 leon2-ft distributed system-on-chip design modified using graphical configuration tool leon2 -ft design extended re-used designs structure emphasise re-using parts design building blocks enable designers easily incorporate new ip cores design standard leon2 -ft distribution includes following support cores leon3 leon3ft leon4 cores typically used together grlib ip library leon2 distributions contain one design used several target technologies grlib contains several template designs fpga development boards asic targets modified using graphical configuration tool similar one leon2 distribution leon/grlib package contains larger number cores compared leon2 distributions also include plug play extension on-chip amba bus ip cores available grlib include design flow documentation leon fpga available manufacturer third party resources term leon2/leon2-ft often refer leon2 system-on-chip design leon2 processor core together standard set peripherals available leon2 -ft distribution later processors leon series used wide range designs therefore tightly coupled standard set peripherals leon3 leon4 name typically refers processor core leon/grlib used refer complete system-on-chip design leon2 following characteristics leon2-ft processor single event upset fault tolerant ft version leon2 processor flip-flops protected triple modular redundancy internal external memories protected edac parity bits special licence restrictions apply ip distributed european space agency among satellites processor used esa intermediate experimental vehicle ixv 2015 china chang e 4 lunar lander leon3 synthesisable vhdl model 32-bit processor compliant sparc v8 architecture model highly configurable particularly suitable system-on-a-chip soc designs full source code available gnu gpl license allowing use purpose without licensing fee leon3 also available proprietary license allowing used proprietary applications several differences two leon2 processor models leon3 leon3 includes smp support seven-stage pipeline leon2 support smp five-stage pipeline leon3ft fault-tolerant version standard leon3 sparc v8 processor designed operation harsh space environment includes functionality detect correct single event upset seu errors on-chip ram memories leon3ft processor supports functionality standard leon3 processor adds following features following features standard leon3 processor supported leon3ft leon3ft core distributed together special ft version grlip ip library netlist distribution possible fpga implementation called leon3ft-rtax proposed critical space applications january 2010 fourth version leon processor released release following new features real-time operating systems support leon core currently rtlinux pikeos ecos rtems nucleus threadx opencomrtos vxworks per port gaisler research lynxos also per port gaisler research pok free arinc653 implementation released bsd licence ork+ open-source real-time kernel high-integrity real-time applications ravenscar profile
[ 3365, 7535, 1556, 2659, 7453, 4703, 4336, 4885, 2765, 5947, 7672, 8024, 4092, 2248, 7681, 1237, 7313, 7777, 971 ]
Test
5,937
2
Apple_Pascal:apple pascal apple pascal implementation pascal apple ii apple iii computer series based ucsd pascal like ucsd pascal implementations ran operating system apple pascal operating system derivative ucsd p-system graphical extensions originally released apple ii august 1979 apple dos 3.2 apple pascal pioneered number features would later incorporated dos 3.3 well others would seen introduction prodos apple pascal software package also included disk maintenance utilities assembler meant complement apple built-in monitor assembler fortran compiler written silicon valley software sunnyvale california compiling p-code pascal also available apple pascal operating system introduced new disk format instead dividing disk 256-byte sectors dos 3.2 apple pascal divides blocks 512 bytes each.. p-system also introduced different method saving retrieving files apple dos files saved available sector os could find regardless location time could lead file system fragmentation slowing access disk apple pascal attempted rectify saving consecutive blocks disk innovations introduced file system included introduction timestamp feature previously file name basic type size would shown disks could also named first time limitations p-system included new restrictions naming files writing files consecutive blocks also created problems time free space tended become fragmented store new files utility called krunch included package consolidate free space biggest problem apple pascal system big fit one floppy disk meant system one floppy disk drive frequent disk swapping needed system needed least two disk drives order use operating system properly br br
[ 1522, 6119, 304, 3412, 3955, 5948, 6113, 5639, 3751, 6277, 3069, 7970, 783, 4589 ]
Validation
5,938
9
Calculus_of_constructions:calculus constructions mathematical logic computer science calculus constructions coc type theory created thierry coquand serve typed programming language constructive foundation mathematics second reason coc variants basis coq proof assistants variants include calculus inductive constructions adds inductive types calculus co inductive constructions adds coinduction predicative calculus inductive constructions removes impredicativity coc higher-order typed lambda calculus initially developed thierry coquand well known top barendregt lambda cube possible within coc define functions integers integers well integers types types types types integers coc strongly normalizing although impossible prove property within coc since implies consistency gödel incompleteness theorem impossible prove within system coc developed alongside coq proof assistant features added possible liabilities removed theory became available coq variants coc used proof assistants matita calculus constructions considered extension curry–howard isomorphism curry–howard isomorphism associates term simply typed lambda calculus natural-deduction proof intuitionistic propositional logic calculus constructions extends isomorphism proofs full intuitionistic predicate calculus includes proofs quantified statements also call propositions term calculus constructions constructed using following rules words term syntax bnf calculus constructions five kinds objects calculus constructions allows proving typing judgments read implication valid judgments calculus constructions derivable set inference rules following use formula_7 mean sequence type assignments formula_8 use k mean either p t. shall write formula_9 mean result substituting term formula_10 free variable formula_11 term formula_6 inference rule written form means 1. formula_16 3. formula_17 4. formula_18 5. formula_19 calculus constructions basic operators logical operator forming propositions formula_20 however one operator sufficient define logical operators basic data types used computer science defined within calculus constructions note booleans naturals defined way church encoding however additional problems arise propositional extensionality proof irrelevance
[ 4322, 4359 ]
Test
5,939
3
General-purpose_computing_on_graphics_processing_units:general-purpose computing graphics processing units general-purpose computing graphics processing units gpgpu rarely gpgp use graphics processing unit gpu typically handles computation computer graphics perform computation applications traditionally handled central processing unit cpu use multiple video cards one computer large numbers graphics chips parallelizes already parallel nature graphics processing addition even single gpu-cpu framework provides advantages multiple cpus offer due specialization chip essentially gpgpu pipeline kind parallel processing one gpus cpus analyzes data image graphic form gpus operate lower frequencies typically many times number cores thus gpus process far pictures graphical data per second traditional cpu migrating data graphical form using gpu scan analyze create large speedup gpgpu pipelines developed beginning 21st century graphics processing e.g. better shaders pipelines found fit scientific computing needs well since developed direction principle arbitrary boolean function including addition multiplication mathematical functions built-up functionally complete set logic operators 1987 conway game life became one first examples general purpose computing using early stream processor called blitter invoke special sequence logical operations bit vectors general-purpose computing gpus became practical popular 2001 advent programmable shaders floating point support graphics processors notably problems involving matrices and/or vectors especially two- three- four-dimensional vectors easy translate gpu acts native speed support types scientific computing community experiments new hardware began matrix multiplication routine 2001 one first common scientific programs run faster gpus cpus implementation lu factorization 2005 early efforts use gpus general-purpose processors required reformulating computational problems terms graphics primitives supported two major apis graphics processors opengl directx cumbersome translation obviated advent general-purpose programming languages apis sh/rapidmind brook accelerator followed nvidia cuda allowed programmers ignore underlying graphical concepts favor common high-performance computing concepts newer hardware vendor-independent offerings include microsoft directcompute apple/khronos group opencl means modern gpgpu pipelines leverage speed gpu without requiring full explicit conversion data graphical form language allows code running cpu poll gpu shader return values create gpgpu framework opencl dominant open general-purpose gpu computing language open standard defined khronos group opencl provides cross-platform gpgpu platform additionally supports data parallel compute cpus opencl actively supported intel amd nvidia arm platforms khronos group also standardised implemented sycl higher-level programming model opencl single-source domain specific embedded language based pure c++11 dominant proprietary framework nvidia cuda nvidia launched cuda 2006 software development kit sdk application programming interface api allows using programming language c code algorithms execution geforce 8 series later gpus programming standards parallel computing include opencl vendor-independent openacc openhmpp mark harris founder gpgpu.org coined term gpgpu created xcelerit designed accelerate large existing c++ c code-bases gpus minimal effort provides simplified programming model automates parallelisation manages devices memory compiles cuda binaries additionally multi-core cpus accelerators targeted source code openvidia developed university toronto 2003-2005 collaboration nvidia. created altimesh compiles common intermediate language cuda binaries supports generics virtual functions debugging profiling integrated visual studio nsight available visual studio extension visual studio marketplace microsoft introduced directcompute gpu computing api released directx 11 api. created quantalea introduces native gpu computing capabilities microsoft .net language f c alea gpu also provides simplified gpu programming model based gpu parallel-for parallel aggregate using delegates automatic memory management matlab supports gpgpu acceleration using parallel computing toolbox matlab distributed computing server third-party packages like jacket gpgpu processing also used simulate newtonian physics physics engines commercial implementations include havok physics fx physx typically used computer video games close metal called stream amd gpgpu technology ati radeon-based gpus c++ accelerated massive parallelism c++ amp library accelerates execution c++ code exploiting data-parallel hardware gpus due trend increasing power mobile gpus general-purpose programming became available also mobile devices running major mobile operating systems google android 4.2 enabled running renderscript code mobile device gpu apple introduced proprietary metal api ios applications able execute arbitrary code apple gpu compute shaders computer video cards produced various vendors nvidia amd ati cards vendors differ implementing data-format support integer floating-point formats 32-bit 64-bit microsoft introduced shader model standard help rank various features graphic cards simple shader model version number 1.0 2.0 3.0 etc. pre-directx 9 video cards supported paletted integer color types various formats available containing red element green element blue element sometimes another alpha value added used transparency common formats early fixed-function limited programmability graphics i.e. including directx 8.1-compliant gpus sufficient also representation used displays important note representation certain limitations given sufficient graphics processing power even graphics programmers would like use better formats floating point data formats obtain effects high dynamic range imaging many gpgpu applications require floating point accuracy came video cards conforming directx 9 specification directx 9 shader model 2.x suggested support two precision types full partial precision full precision support could either fp32 fp24 floating point 32- 24-bit per component greater partial precision fp16 ati radeon r300 series gpus supported fp24 precision programmable fragment pipeline although fp32 supported vertex processors nvidia nv30 series supported fp16 fp32 vendors s3 graphics xgi supported mixture formats fp24 implementations floating point nvidia gpus mostly ieee compliant however true across vendors implications correctness considered important scientific applications 64-bit floating point values double precision float commonly available cpus universally supported gpus gpu architectures sacrifice ieee compliance others lack double-precision efforts occurred emulate double-precision floating point values gpus however speed tradeoff negates benefit offloading computing onto gpu first place operations gpu operate vectorized fashion one operation performed four values example one color r1 g1 b1 modulated another color r2 g2 b2 gpu produce resulting color r1*r2 g1*g2 b1*b2 one operation functionality useful graphics almost every basic data type vector either 2- 3- 4-dimensional examples include vertices colors normal vectors texture coordinates many applications put good use higher performance vector instructions termed single instruction multiple data simd long available cpus originally data simply passed one-way central processing unit cpu graphics processing unit gpu display device time progressed however became valuable gpus store first simple complex structures data passed back cpu analyzed image set scientific-data represented 2d 3d format video card understand gpu access every draw operation analyze data forms quickly whereas cpu must poll every pixel data element much slowly speed access cpu larger pool random-access memory even worse case hard drive slower gpus video cards typically contain smaller amounts expensive memory much faster access transferring portion data set actively analyzed gpu memory form textures easily readable gpu forms results speed increase distinguishing feature gpgpu design ability transfer information bidirectionally back gpu cpu generally data throughput directions ideally high resulting multiplier effect speed specific high-use algorithm gpgpu pipelines may improve efficiency especially large data sets and/or data containing 2d 3d imagery used complex graphics pipelines well scientific computing fields large data sets like genome mapping two- three-dimensional analysis useful especially present biomolecule analysis protein study complex organic chemistry pipelines also vastly improve efficiency image processing computer vision among fields well parallel processing generally heavily optimized pipelines yielded speed increases several hundred times original cpu-based pipeline one high-use task simple example would gpu program collects data average lighting values renders view either camera computer graphics program back main program cpu cpu make adjustments overall screen view advanced example might use edge detection return numerical information processed image representing outlines computer vision program controlling say mobile robot gpu fast local hardware access every pixel picture element image analyze average first example apply sobel edge filter convolution filter second much greater speed cpu typically must access slower random-access memory copies graphic question gpgpu fundamentally software concept hardware concept type algorithm piece equipment specialized equipment designs may however even enhance efficiency gpgpu pipelines traditionally perform relatively algorithms large amounts data massively parallelized gigantic-data-level tasks thus may parallelized even via specialized setups rack computing many similar highly tailored machines built rack adds third layer many computing units using many cpus correspond many gpus bitcoin miners used setups high-quantity processing historically cpus used hardware-managed caches earlier gpus provided software-managed local memories however gpus increasingly used general-purpose applications state-of-the-art gpus designed hardware-managed multi-level caches helped gpus move towards mainstream computing example geforce 200 series gt200 architecture gpus feature l2 cache fermi gpu 768 kib last-level cache kepler gpu 1.5 mib last-level cache maxwell gpu 2 mib last-level cache pascal gpu 4 mib last-level cache gpus large register files allow reduce context-switching latency register file size also increasing different gpu generations e.g. total register file size maxwell gm200 pascal gpus 6 mib 14 mib respectively comparison size register file cpus small typically tens hundreds kilobytes several research projects compared energy efficiency gpus cpus fpgas gpus designed specifically graphics thus restrictive operations programming due design gpus effective problems solved using stream processing hardware used certain ways following discussion referring vertices fragments textures concerns mainly legacy model gpgpu programming graphics apis opengl directx used perform general-purpose computation introduction cuda nvidia 2007 opencl vendor-independent 2008 general-purpose computing apis new gpgpu codes longer necessary map computation graphics primitives stream processing nature gpus remains valid regardless apis used see e.g. gpus process independent vertices fragments process many parallel especially effective programmer wants process many vertices fragments way sense gpus stream processors processors operate parallel running one kernel many records stream stream simply set records require similar computation streams provide data parallelism kernels functions applied element stream gpus vertices fragments elements streams vertex fragment shaders kernels run element read input perform operations write output permissible multiple inputs multiple outputs never piece memory readable writable arithmetic intensity defined number operations performed per word memory transferred important gpgpu applications high arithmetic intensity else memory access latency limit computational speedup ideal gpgpu applications large data sets high parallelism minimal dependency data elements variety computational resources available gpu fact program substitute write texture output instead framebuffer done either render texture rtt render-to-backbuffer-copy-to-texture rtbctt recent stream-out common form stream take gpgpu 2d grid fits naturally rendering model built gpus many computations naturally map grids matrix algebra image processing physically based simulation since textures used memory texture lookups used memory reads certain operations done automatically gpu compute kernels thought body loops example programmer operating grid cpu might code looks like gpu programmer specifies body loop kernel data loop invoking geometry processing sequential code possible control flow program using if-then-else statements various forms loops flow control structures recently added gpus conditional writes could performed using properly crafted series arithmetic/bit operations looping conditional branching possible recent gpus allow branching usually performance penalty branching generally avoided inner loops whether cpu gpu code various methods static branch resolution pre-computation predication loop splitting z-cull used achieve branching hardware support exist map operation simply applies given function kernel every element stream simple example multiplying value stream constant increasing brightness image map operation simple implement gpu programmer generates fragment pixel screen applies fragment program one result stream size stored output buffer computations require calculating smaller stream possibly stream 1 element larger stream called reduction stream generally reduction performed multiple steps results prior step used input current step range operation applied reduced one stream element remains stream filtering essentially non-uniform reduction filtering involves removing items stream based criteria scan operation also termed parallel prefix sum takes vector stream data elements arbitrary associative binary function '+ identity element input a0 a1 a2 a3 ... exclusive scan produces output a0 a0 a1 a0 a1 a2 ... inclusive scan produces output a0 a0 a1 a0 a1 a2 a0 a1 a2 a3 ... require identity exist first glance operation may seem inherently serial efficient parallel scan algorithms possible implemented graphics processing units scan operation uses e.g. quicksort sparse matrix-vector multiplication scatter operation naturally defined vertex processor vertex processor able adjust position vertex allows programmer control information deposited grid extensions also possible controlling large area vertex affects fragment processor perform direct scatter operation location fragment grid fixed time fragment creation altered programmer however logical scatter operation may sometimes recast implemented another gather step scatter implementation would first emit output value output address immediately following gather operation uses address comparisons see whether output value maps current output slot dedicated compute kernels scatter performed indexed writes gather reverse scatter scatter reorders elements according map gather restore order elements according map scatter used dedicated compute kernels gather may performed indexed reads shaders performed texture-lookups sort operation transforms unordered set elements ordered set elements common implementation gpus using radix sort integer floating point data coarse-grained merge sort fine-grained sorting networks general comparable data search operation allows programmer find given element within stream possibly find neighbors specified element gpu used speed search individual element instead used run multiple searches parallel mostly search method used binary search sorted elements variety data structures represented gpu following areas gpus used general purpose computing gpgpu usage bioinformatics † expected speedups highly dependent system configuration gpu performance compared multi-core x86 cpu socket gpu performance benchmarked gpu supported features may kernel kernel performance comparison details configuration used view application website speedups per nvidia in-house testing isv documentation ‡ q=quadro gpu t=tesla gpu nvidia recommended gpus application check developer isv obtain certification information
[ 2538, 5012, 6793, 1447, 5371, 3948, 7527, 7529, 1833, 5737, 4318, 1095, 2567, 1435, 4694, 5042, 744, 1481, 5055, 2226, 1864, 1117, 1867, 2961, 2248, 3667, 2969, 6148, 2614, 83, 441, 1901, 4742, 5447, 2266, 2270, 4760, 7966, 5117, 4047, ...
Test
5,940
7
Enstratius:enstratius enstratius formerly enstratus cloud computing infrastructure management platform intended address governance issues associated deploying systems public private hybrid clouds twenty public private clouds supported well configuration management tools chef puppet enstratius supports saas on-premises deployment models company originally formed 2008 enstratus networks spin-off marketing software maker valtira software forming backbone enstratus set cloud management tools valtira developed support cloud operations company announced publicly minnedemo conference february 2009 began accepting on-demand accounts co-founders david bagley george reese enstratius moved focus purely security wider problem governance multiple cloud computing environments 2010 enstratius spun part intellectual property open source project hosted github apache license called dasein cloud dasein cloud java abstraction api enstratius uses talk clouds supports company raised series financing 4.5 million november 2011 el dorado ventures vesbridge partners citrix march 2013 enstratus networks changed name enstratius inc. enstratius headquartered eden prairie minnesota remote workers across united states offices auckland new zealand edinburgh scotland may 2013 company acquired dell two weeks later dell discontinued cloud computing service june 2016 dell shifted enstratius product line support-only continue support customers longer selling cloud management platform
[ 3764, 4295, 7795, 2988, 7613, 632, 1634, 3091, 6262, 7415, 6806, 3627, 5571, 5927, 2212, 32, 5135, 1757, 3028, 842, 5064, 330, 7848, 5599, 2961, 7037, 2700, 84, 972, 1514, 3756, 5889 ]
Test
5,941
2
Advanced_Programming_in_the_Unix_Environment:advanced programming unix environment advanced programming unix environment computer programming book w. richard stevens describing application programming interface unix family operating systems book illustrates unix application programming c programming language first edition book published addison-wesley 1992 covered programming two popular families unix operating system berkeley software distribution particular 4.3 bsd 386bsd unix system v particularly svr4 book covers system calls operations single file descriptors special calls like ioctl operate file descriptors operations files directories covers stdio section c standard library parts library needed several chapters concern apis control processes process groups daemons inter-process communication signals one chapter devoted unix terminal control another pseudo terminal concept libraries like termcap curses build atop stevens adds three chapters giving concrete examples unix programming implements database library communicates postscript printer modem book cover network programming subject stevens 1990 book unix network programming subsequent three-volume tcp/ip illustrated stevens died 1999 leaving second edition incomplete increasing popularity technical diversification unix derivatives largely compatible systems like linux environment code coverage stevens original became increasingly outdated working stevens unfinished notes stephen a. rago completed second edition addison-wesley published 2005 added support freebsd linux sun solaris apple darwin added coverage multithreaded programming posix threads second edition features foreword dennis ritchie unix-themed dilbert strip scott adams book widely lauded well written well crafted comprehensive received hearty recommendation linux journal review osnews describes one best tech books ever published review second edition
[ 66, 4771, 5571, 414, 2118, 6016, 578, 1435, 6367 ]
Validation
5,942
6
Tree_(command):tree command computing codice_1 recursive directory listing command program produces depth-indented listing files available unix unix-like systems well dos digital research flexos ibm/toshiba 4690 os pts-dos freedos ibm os/2 microsoft windows reactos arguments codice_1 lists files current directory directory arguments given codice_1 lists files directories found given directories turn upon completion listing files directories found codice_1 returns total number files directories listed options change characters used output use color output command available ms-dos versions 3.2 later ibm pc dos releases 2 later dr dos 6.0 includes implementation command tree unix utility developed steve baker freedos version developed dave dunfield reactos version developed asif bahrainwala three implementations licensed gpl
[ 2811, 361, 4291, 6789, 1812, 2817, 4387, 4843, 6076, 4759, 1537, 2999, 6088, 2834, 204, 5480, 3106, 5571, 4955, 6997, 126, 578, 923, 1382, 5138, 3797, 5234, 7272, 667, 5946, 2589, 1213, 6380, 7021, 3664, 7494, 4547, 6773, 1140, 1793, 34...
Test
5,943
1
Database_audit:database audit database auditing involves observing database aware actions database users database administrators consultants often set auditing security purposes example ensure without permission access information access
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 4054, 6636, 2663, 2124, 6737, 6739, 3119, 3801, 7999, 2054, 6932, 6386, 6042, 684, 6390, 7937, 7303, 6144, 4457, 6320, 1902, 6594, 1805 ]
Test
5,944
4
Ben_Wizner:ben wizner ben wizner born 1971 american lawyer writer civil liberties advocate american civil liberties union since july 2013 lead attorney nsa whistleblower edward snowden wizner born 1971 new connecticut grew campus yale university father stephen wizner professor law yale law school mother dean described drawn social justice work least early high school graduating harvard college 1993 worked organization provided legal assistance homeless near-homeless people new york university school law planned work legal services impoverished communities capital punishment cases graduating clerked judge stephen reinhardt united states court appeals ninth circuit wizner began working american civil liberties union los angeles august 2001 initially focusing prison reform following september 11 attacks wizner focus shifted civil liberties issues relating u.s. national security around 2004 moved aclu headquarters new york city argued legal cases relating airport security government watchlists surveillance practices targeted killing extraordinary rendition torture made several trips guantanamo bay detention camp many cases wizner took dismissed later commented worst days believed ... n't litigation traditional sense n't trying get court something creating record ... people would able look back decide whether right decision disastrous decision starting 2005 wizner represented khalid el-masri german citizen arrested travelling macedonia suspicion links al qaeda held cia black site afghanistan five months despite evidence wrong person el-masri suit dismissed u.s. grounds state secrecy though cia ultimately admitted making mistake report released u.s. senate european court human rights ruled macedonia case 2011 wizner became director aclu speech privacy technology project wizner adjunct professor new york university school law contributor website lawfare written time freedom press foundation several media outlets testified u.s. congress regularly appeared television news analysis programs including democracy meet press politicking larry king 2013 edward snowden contacted journalist glenn greenwald filmmaker laura poitras longtime acquaintances wizner releasing classified information nsa programs poitras consulted wizner travelling meet snowden hong kong greenwald later put wizner contact snowden july 2013 snowden stranded transit zone moscow passport revoked u.s. government wizner snowden exchanged encrypted communications time snowden legal team also includes jesselyn radack advocate whistleblowers wolfgang kaleck european attorney attorneys expertise criminal asylum law team works pro bono ensure snowden continued freedom ability contribute public conversation began disclosures wizner describes gatekeeper media requests snowden said believes snowden return u.s. eventually wizner called snowden case work lifetime traditional legal work means previously spent decade trying bring cases u.s. intelligence agencies cases often dismissed lack standing snowden revelations verizon delivering metadata u.s. government aclu standing sue wizner defended right privacy critical use extensive surveillance enforce law highlighted role lawbreaking positive social change pointing lgbt civil rights movement drug prohibition areas illegal activities contributed positive changes law public opinion speaking u.s. intelligence apparatus said nsa uniquely evil uniquely capable wizner forcefully defended snowden calls punishment stating broke law public good noting elected officials held criminally liable torture human rights violations since 9/11 following april 2019 arrest wikileaks founder julian assange london ecuadorian embassy ben wizner said authorities prosecute assange violating u.s. secrecy laws would set especially dangerous precedent u.s. journalists routinely violate foreign secrecy laws deliver information vital public interest
[ 5676 ]
Test
5,945
2
Bondwell-2:bondwell-2 bondwell-2 early laptop personal computer running cp/m operating system introduced bondwell 1985 came zilog z80 cpu clocked 4 mhz 64 kb ram 4 kb rom 3.5 floppy disk drive highly unusual cp/m system os largely outmoded time 3.5 drives introduced model 2 main attraction price 995 usd also included micropro complete line cp/m software including wordstar also unusually cp/m system bondwell-2 capable displaying bitmapped graphics flip-up lcd display resolution 640x200 pixels 80x25 text characters 300 baud modem available option
[ 1237, 768, 5571 ]
Validation
5,946
9
Bc_(programming_language):bc programming language bc basic calculator often referred bench calculator arbitrary-precision calculator language syntax similar c programming language bc typically used either mathematical scripting language interactive mathematical shell typical interactive usage typing command codice_1 unix command prompt entering mathematical expression whereupon output bc work arbitrary precision actually defaults zero digits decimal point expression yields surprise new bc users unaware fact option bc sets default scale digits decimal point 20 adds several additional mathematical functions language bc first appeared version 6 unix 1975 written robert morris lorinda cherry bell labs bc preceded dc earlier arbitrary-precision calculator written authors dc could arbitrary-precision calculations reverse polish notation rpn syntax inconvenient users therefore bc written front-end dc bc simple compiler single yacc source file hundred lines converted new c-like bc syntax dc postfix notation piped results dc 1991 posix rigorously defined standardized bc two implementations standard survive today first traditional unix implementation front-end dc survives unix plan 9 systems second free software gnu bc first released 1991 philip a. nelson gnu implementation numerous extensions beyond posix standard longer front-end dc bytecode interpreter posix standardized bc language traditionally written program dc programming language provide higher level access features dc language without complexities dc terse syntax form bc language contains single-letter variable array function names standard arithmetic operators well familiar control-flow constructs codice_2 codice_3 codice_4 c. unlike c codice_5 clause may followed codice_6 functions defined using codice_7 keyword values returned using codice_8 followed return value parentheses codice_9 keyword optional c used declare variable local function numbers variable contents arbitrary-precision numbers whose precision decimal places determined global codice_10 variable numeric base input interactive mode output program constants may specified setting reserved codice_11 input base codice_12 output base variables output generated deliberately assigning result calculation variable comments may added bc code use c codice_13 codice_14 start end comment symbols following posix bc operators behave exactly like c counterparts modulus operators codice_15 codice_16 behave exactly like c counterparts global codice_10 variable set 0 i.e calculations integer-only otherwise computation done appropriate scale codice_18 defined codice_19 examples operators superficially resemble c bitwise exclusive-or operators fact bc integer exponentiation operators particular note use codice_20 operator negative numbers follow c operator precedence codice_21 gives answer 4 bc rather −4 bitwise boolean conditional operators available posix bc codice_22 function calculating square roots posix bc built-in mathematical function functions available external standard library codice_23 function determining precision codice_10 variable argument codice_25 function determining number significant decimal digits argument also built-in bc standard math library defined -l option contains functions calculating sine cosine arctangent natural logarithm exponential function two parameter bessel function j standard mathematical functions including inverse trigonometric functions constructed using see external links implementations many functions -l option changes scale 20 things modulo may work unexpectedly example writing codice_26 command codice_27 outputs 0 writing codice_28 codice_26 command codice_27 output 1 plan 9 bc identical posix bc additional codice_31 statement gnu bc derives posix standard includes many enhancements entirely separate dc-based implementations posix standard instead written c. nevertheless fully backwards compatible posix bc programs run unmodified gnu bc programs gnu bc variables arrays function names may contain one character operators included c notably codice_5 clause may followed codice_6 output achieved either deliberately assigning result calculation variable posix way using added codice_31 statement furthermore codice_35 statement allows interactive input number running calculation addition c-style comments codice_36 character cause everything next new-line ignored value last calculation always stored within additional built-in codice_37 variable following logical operators additional posix bc available use conditional statements within codice_5 statement note however still equivalent bitwise assignment operations functions available gnu bc inherited posix functions provided standard gnu distribution since bc codice_20 operator allows integer power right one first functions bc user might write power function floating-point exponent assume standard library included /* function return integer part x */ calculate pi using builtin arctangent function bc -lq scale=10000 4*a 1 atan 1 45 degrees pi/4 radians syntax bc similar c published numerical functions written c often translated bc quite easily immediately provides arbitrary precision bc example journal statistical software july 2004 volume 11 issue 5 george marsaglia published following c code cumulative normal distribution double phi double x necessary changes accommodate bc different syntax realizing constant 0.9189 ... actually log 2*pi /2 translated following gnu bc code define phi x bc used non-interactively input pipe useful inside shell scripts example contrast note bash shell performs integer arithmetic e.g one also use here-string idiom bash ksh csh
[ 361, 6789, 2817, 366, 3685, 4387, 4662, 8165, 3085, 7246, 1537, 1361, 2834, 4283, 204, 1837, 5480, 3106, 5571, 5931, 217, 923, 5933, 5138, 1389, 667, 1572, 5942, 6648, 3984, 2589, 5503, 1213, 7667, 6050, 7494, 6673, 6242, 7498, 7868, 34...
Test
5,947
3
Pipeline_(computing):pipeline computing computing pipeline also known data pipeline set data processing elements connected series output one element input next one elements pipeline often executed parallel time-sliced fashion amount buffer storage often inserted elements computer-related pipelines include operating systems may provide unix-like syntax string several program runs pipeline implement latter simple serial execution rather true pipelining — namely waiting program finish starting next one pipelining commonly used concept everyday life example assembly line car factory specific task — installing engine installing hood installing wheels — often done separate work station stations carry tasks parallel different car car one task performed moves next station variations time needed complete tasks accommodated buffering holding one cars space stations and/or stalling temporarily halting upstream stations next station becomes available suppose assembling one car requires three tasks take 20 10 15 minutes respectively three tasks performed single station factory would output one car every 45 minutes using pipeline three stations factory would output first car 45 minutes new one every 20 minutes example shows pipelining decrease latency total time one item go whole system however increase system throughput rate new items processed first one since throughput pipeline better slowest element designer try divide work resources among stages take time complete tasks car assembly example three tasks took 15 minutes instead 20 10 15 minutes latency would still 45 minutes new car would finished every 15 minutes instead 20 ideal circumstances processing elements synchronized take amount time process item received element released previous one single clock cycle way items flow pipeline constant speed like waves water channel wave pipelines synchronization buffering needed stages besides storage needed data items generally buffering pipeline stages necessary processing times irregular items may created destroyed along pipeline example graphics pipeline processes triangles rendered screen element checks visibility triangle may discard invisible may output two triangular pieces partly hidden buffering also needed accommodate irregularities rates application feeds items first stage consumes output last one buffer two stages may simply hardware register suitable synchronization signalling logic two stages stage stores data item register sends data available signal next stage b b used data responds data received signal stage halts waiting signal storing next data item register stage b halts waiting data available signal ready process next item stage provided yet processing times element variable whole pipeline may often stop waiting element previous ones consume items input buffers frequency pipeline stalls reduced providing space one item input buffer stage multiple-item buffer usually implemented first-in first-out queue upstream stage may still halted queue gets full frequency events decrease buffer slots provided queuing theory tell number buffer slots needed depending variability processing times desired performance stage takes may take much longer others sped designer provide two processing elements carry task parallel single input buffer single output buffer element finishes processing current data item delivers common output buffer takes next data item common input buffer concept non-linear dynamic pipeline exemplified shops banks two cashiers serving clients single waiting queue applications processing item stage may depend results effect processing previous item x later stage b pipeline case stage correctly process item item x cleared stage b situation occurs often instruction pipelines example suppose arithmetic instruction reads contents register supposed modified earlier instruction x let stage fetches instruction operands b stage writes result specified register stage tries process instruction instruction x reaches stage b register may still contain old value effect would incorrect order handle conflicts correctly pipeline must provided extra circuitry logic detects takes appropriate action strategies include pipelined system typically requires resources circuit elements processing units computer memory etc one executes one batch time stages share resources buffering additional synchronization logic may needed elements moreover transfer items separate processing elements may increase latency especially long pipelines additional complexity cost pipelining may considerable dependencies processing different items especially guess-and-backtrack strategy used handle indeed cost implementing strategy complex instruction sets motivated radical proposals simplify computer architecture risc vliw compilers also burdened task rearranging machine instructions improve performance instruction pipelines
[ 2903, 5012, 4661, 5371, 1452, 7529, 7533, 5737, 5042, 1481, 5055, 1867, 2602, 2961, 3667, 2969, 6148, 4742, 5447, 5100, 1162, 6170, 7246, 1546, 3365, 4049, 5483, 7637, 7990, 6198, 6922, 3041, 1586, 515, 8024, 3406, 1237, 4839, 5890, 4847,...
Test
5,948
9
Pascal_(programming_language):pascal programming language pascal imperative procedural programming language designed niklaus wirth small efficient language intended encourage good programming practices using structured programming data structuring named honor french mathematician philosopher physicist blaise pascal pascal developed pattern algol 60 language wirth involved process improve language part algol x efforts proposed version known algol w. accepted algol x process bogged 1968 wirth decided abandon algol x process improve algol w releasing pascal 1970 pascal became successful 1970s notably burgeoning minicomputer market compilers also available many microcomputers field emerged late 1970s widely used teaching language university-level programming courses 1980s also used production settings writing commercial software period displaced c programming language late 1980s early 1990s unix-based systems became popular especially release c++ derivative known object pascal designed object-oriented programming developed 1985 used apple computer borland late 1980s later developed delphi microsoft windows platform extensions pascal concepts led languages modula-2 oberon much history computer language design 1960s traced algol 60 language algol developed 1950s explicit goal able clearly describe algorithms included number features structured programming remain common languages day shortly introduction 1962 wirth began working dissertation helmut weber euler programming language euler based algol syntax many concepts derivative primary goal add dynamic lists types allowing used roles similar lisp language published 1965 time number problems algol identified notably lack standardized string system group tasked maintaining language begun algol x process identify improvements calling submissions wirth tony hoare submitted conservative set modifications add strings clean syntax considered minor worth using new standard algol wirth wrote compiler language became known algol w. algol x efforts would go choose dramatically complex language algol 68 complexity language led considerable difficulty producing high-performance compilers widely used industry left opening newer languages pascal influenced algol w efforts explicit goals producing language would efficient compiler run-time allow development well-structured programs useful teaching students structured programming generation students used pascal introductory language undergraduate courses one early successes language introduction ucsd pascal version ran custom operating system could ported different platforms key platform apple ii saw widespread use led use pascal becoming primary high-level language used development apple lisa later macintosh parts original macintosh operating system hand-translated motorola 68000 assembly language pascal sources typesetting system tex donald e. knuth written web original literate programming system based dec pdp-10 pascal successful commercial applications like adobe photoshop written macintosh programmer workshop pascal applications like total commander skype macromedia captivate written delphi object pascal apollo computer used pascal systems programming language operating systems beginning 1980 variants pascal also used everything research projects pc games embedded systems newer pascal compilers exist widely used work lisa larry tesler began corresponding wirth idea adding object oriented extensions language led initially clascal introduced 1983 lisa program faded replaced mac version known object pascal created introduced macintosh 1985 part macapp application framework became apple primary development language early 1990s object pascal extensions added turbo pascal release version 5.5 1989 years object pascal became basis delphi system microsoft windows still used developing windows applications cross-compile code systems free pascal open source cross-platform alternative wirth intention create efficient language regarding compilation speed generated code based structured programming recently popularized concept promoted book algorithms data structures programs pascal roots algol 60 language also introduced concepts mechanisms top algol scalars arrays enabled programmers define complex structured datatypes also made easier build dynamic recursive data structures lists trees graphs important features included records enumerations subranges dynamically allocated variables associated pointers sets make possible meaningful pascal strong typing objects means one type data converted interpreted another without explicit conversions similar mechanisms standard many programming languages today languages influenced pascal development simula 67 wirth algol w. pascal like many programming languages today unlike languages c family allows nested procedure definitions level depth also allows kinds definitions declarations inside subroutines procedures functions enables simple coherent syntax complete program syntactically nearly identical single procedure function except heading one three keywords first pascal compiler designed zürich cdc 6000 series mainframe computer family niklaus wirth reports first attempt implement fortran 1969 unsuccessful due fortran inadequacy express complex data structures second attempt implemented c-like language scallop max engeli translated hand r. schild pascal boot-strapping operational mid-1970 many pascal compilers since similarly self-hosting compiler written pascal compiler usually capable recompiling new features added language compiler ported new environment gnu pascal compiler one notable exception written c. first successful port cdc pascal compiler another mainframe completed welsh quinn queen university belfast qub 1972 target icl 1900 series compiler turn parent pascal compiler information computer systems ics multum minicomputer multum port developed – view using pascal systems programming language – findlay cupples cavouras davis working department computing science glasgow university thought multum pascal completed summer 1973 may first 16-bit implementation completely new compiler completed welsh et al qub 1977 offered source-language diagnostic feature incorporating profiling tracing type-aware formatted postmortem dumps implemented findlay watt glasgow university implementation ported 1980 icl 2900 series team based southampton university glasgow university standard pascal model implementation also based compiler adapted welsh hay manchester university 1984 check rigorously conformity bsi 6192/iso 7185 standard generate code portable abstract machine first pascal compiler written north america constructed university illinois donald b. gillies pdp-11 generated native machine code propagate language rapidly compiler porting kit created zurich included compiler generated code virtual stack machine i.e code lends reasonably efficient interpretation along interpreter code – pascal-p system p-system compilers termed pascal-p1 pascal-p2 pascal-p3 pascal-p4 pascal-p1 first version pascal-p4 last come zurich version termed pascal-p1 coined fact many different sources pascal-p existed compiler redesigned enhance portability issued pascal-p2 code later enhanced become pascal-p3 intermediate code backward compatible pascal-p2 pascal-p4 backward compatible pascal-p4 compiler/interpreter still run compiled systems compatible original pascal however accepts subset pascal language pascal-p5 created outside zurich group accepts full pascal language includes iso 7185 compatibility ucsd pascal branched pascal-p2 kenneth bowles utilized create interpretive ucsd p-system ucsd p-system one three operating systems available launch original ibm personal computer ucsd pascal used intermediate code based byte values thus one earliest byte code compilers pascal-p1 pascal-p4 rather based cdc 6600 60 bit word length compiler based pascal-p4 compiler created native binaries released ibm system/370 mainframe computer australian atomic energy commission called aaec pascal compiler abbreviation name commission apple computer created lisa pascal lisa workshop 1982 ported compiler apple macintosh mpw 1985 1985 larry tesler consultation niklaus wirth defined object pascal extensions incorporated lisa pascal mac pascal compilers 1980s anders hejlsberg wrote blue label pascal compiler nascom-2 reimplementation compiler ibm pc marketed names compas pascal polypascal acquired borland renamed turbo pascal turbo pascal became hugely popular thanks aggressive pricing strategy one first full-screen ides fast turnaround time seconds compile link run written highly optimized entirely assembly language making smaller faster much competition 1986 anders ported turbo pascal macintosh incorporated apple object pascal extensions turbo pascal extensions added back pc version turbo pascal version 5.5 time microsoft also implemented object pascal compiler turbo pascal 5.5 large influence pascal community began concentrating mainly ibm pc late 1980s many pc hobbyists search structured replacement basic used product also began adopted professional developers around time number concepts imported c let pascal programmers use c-based api microsoft windows directly extensions included null-terminated strings pointer arithmetic function pointers address-of operator unsafe typecasts turbo pascal derivatives units module concepts modular languages however provide nested module concept qualified import export specific symbols super pascal variant added non-numeric labels return statement expressions names types tmt pascal first borland-compatible compiler 32-bit dos protected mode os/2 win32 operating systems tmt pascal language first one allow function operator overloading universities wisconsin-madison zürich karlsruhe wuppertal developed pascal-sc pascal-xsc extensions scientific computation compilers aimed programming numerical computations development pascal-sc started 1978 supporting iso 7185 pascal level 0 level 2 support added later stage pascal-sc originally targeted z80 processor later rewritten dos x86 68000 pascal-xsc various times ported unix linux sunos hp-ux aix microsoft/ibm dos emx os/2 windows operating systems operates generating intermediate c source code compiled native executable pascal-sc language extensions adopted gnu pascal pascal sol designed around 1983 french team implement unix-like systems named sol standard pascal level-1 parametrized array bounds definition allowed alternative keywords predefined identifiers french language included extensions ease system programming e.g equivalent lseek sol team later moved chorusos project design distributed operating system ip pascal implementation pascal programming language using micropolis dos moved rapidly cp/m-80 running z80 moved 80386 machine types 1994 exists today windows/xp linux implementations 2008 system brought new level resulting language termed pascaline pascal calculator includes objects namespace controls dynamic arrays along many extensions generally features functionality type protection c implementation also compatible original pascal implementation standardized iso 7185 pascal original form purely procedural language includes traditional array algol-like control structures reserved words else case ranging single statement begin-end statements block pascal also data structuring constructs included original algol 60 types like records variants pointers enumerations sets procedure/pointers constructs part inherited inspired simula 67 algol 68 niklaus wirth algol w suggestions c. a. r. hoare pascal programs start program keyword list external file descriptors parameters ref name= iso/iec 7185:1990 6.10 pascal iso 7185:1990 6.10 /ref required turbo pascal etc follows main block bracketed begin end keywords semicolons separate statements full stop i.e. period ends whole program unit letter case ignored pascal source example source code use simple hello world program type pascal several popular programming languages defines variable way defines range values variable capable storing also defines set operations permissible performed variables type predefined types range values allowed except boolean implementation defined functions provided data conversions conversion codice_1 codice_2 following functions available codice_3 rounds integer using banker rounding codice_4 rounds towards zero programmer freedom define commonly used data types e.g byte string etc terms predefined types using pascal type declaration facility example subranges ordinal data type simple type except real also made contrast programming languages time pascal supports set type set fundamental concept modern mathematics may used many algorithms feature useful may faster equivalent construct language support sets example many pascal compilers executes faster sets non-contiguous values particularly useful terms performance readability examples involve sets small domains improved performance usually achieved compiler representing set variables bit vectors set operators implemented efficiently bitwise machine code operations types defined types using type declarations complex types constructed simple types shown example pascal files sequences components every file buffer variable denoted f^ procedures get reading put writing move buffer variable next element read introduced read f x x f^ get f write introduced write f x f^ x put f type text predefined file char buffer variable could used inspecting next character used check digit reading integer leads serious problems interactive programs early implementations solved later lazy i/o concept jensen wirth pascal strings represented packed arrays chars therefore fixed length usually space-padded pascal supports use pointers variable nodeptr pointer data type node record pointers used declared forward declaration exception rule things must declared used create new record assign value 10 character fields b record initialise pointer c null pointer nil pascal statements would could also done using statement follows inside scope statement b refer subfields record pointer nodeptr record node pointer type pnode linked lists stacks queues created including pointer type field c record unlike many languages feature pointers pascal allows pointers reference dynamically created variables anonymous allow reference standard static local variables pointers also must associated type pointer one type compatible pointer another type e.g pointer char compatible pointer integer helps eliminate type security issues inherent pointer implementations particularly used pl/i c. also removes risks caused dangling pointers ability dynamically deallocate referenced space using dispose function effect free library function found c means risk dangling pointers entirely eliminated languages java c provide automatic garbage collection entirely eliminate related problem memory leaks restrictions lifted newer dialects pascal structured programming language meaning flow control structured standard statements usually without 'goto commands pascal structures programs procedures functions procedures functions nested depth 'program construct logical outermost block default parameters passed value 'var precedes parameter name passed reference procedure function declarations goto labels constants types variables procedures functions must order ordering requirement originally intended allow efficient single-pass compilation however dialects embarcadero delphi strict ordering requirement declaration sections relaxed pascal adopted many language syntax features algol language including use semicolon statement separator contrast languages pl/i c etc use semicolon statement terminator semicolon needed end keyword record type declaration block case statement keyword repeat statement else keyword statement presence extra semicolon permitted early versions pascal however addition algol-like empty statements 1973 revised report later changes language iso 7185:1983 allow optional semicolons cases semicolon still permitted immediately else keyword statement else follows single statement statement sequence case nested ifs semicolon used avoid dangling else problem inner else outer putatively terminating nested semicolon – instead terminates clauses instead explicit codice_5 block must used several pascal compilers interpreters available general use 1983 language standardized international standard iec/iso 7185 several local country specific standards including american ansi/ieee770x3.97-1983 iso 7185:1983 two standards differed iso standard included level 1 extension conformant arrays array boundaries array known run time ansi allow extension original wirth version language 1989 iso 7185 revised iso 7185:1990 correct various errors ambiguities found original document iso 7185 stated clarification wirth 1974 language detailed user manual report jensen wirth also notable adding conformant array parameters level 1 standard level 0 pascal without conformant arrays addition made request c. a. r. hoare approval niklaus wirth precipitating cause hoare wanted create pascal version nag numerical algorithms library originally written fortran found possible without extension would allow array parameters varying size similar considerations motivated inclusion iso 7185 facility specify parameter types procedural functional parameters niklaus wirth referred 1974 language standard example differentiate machine specific features cdc 6000 compiler language documented pascal report second part pascal users manual report large machines mainframes minicomputers pascal originated standards generally followed ibm pc ibm pcs borland standards turbo pascal delphi greatest number users thus typically important understand whether particular implementation corresponds original pascal language borland dialect ibm pc versions language began differ advent ucsd pascal interpreted implementation featured several extensions language along several omissions changes many ucsd language features survive today including borland dialect 1990 extended pascal standard created iso/iec 10206 identical technical content ref name= iso/ansi identical /ref ieee/ansi 770x3.160-1989 2019 support extended pascal freepascal compiler planned niklaus wirth zurich version pascal issued outside eth two basic forms cdc 6000 compiler source porting kit called pascal-p system pascal-p compiler left several features full language required bootstrap compiler example procedures functions used parameters undiscriminated variant records packing dispose interprocedural gotos features full compiler omitted ucsd pascal professor kenneth bowles based pascal-p2 kit consequently shared several pascal-p language restrictions ucsd pascal later adopted apple pascal continued several versions although ucsd pascal actually expanded subset pascal pascal-p kit adding back standard pascal constructs still complete standard installation pascal early 1990s alan burns geoff davies developed pascal-fc extension pl/0 niklaus book 'algorithms+data structures=programs several constructs added use pascal-fc teaching tool concurrent programming semaphores monitors channels remote-invocation resources able demonstrate concurrency compiler output kind p-code could executed virtual machine virtual machine simulated normal – fair – environment could also simulate extreme conditions unfair mode borland turbo pascal written anders hejlsberg written assembly language independent ucsd zurich compilers however adopted much subset extensions ucsd compiler probably ucsd system common pascal system suitable developing applications resource-limited microprocessor systems available time shrink-wrapped turbo pascal version 3 later incarnations including borland object pascal delphi non-borland near-compatibles became popular programmers including shareware authors swag library pascal code features large amount code written versions delphi mind software products compilers ide/rapid application development rad category pascal generated wide variety responses computing community critical complimentary popular 1980s early 1990s implementations pascal closely followed wirth initial definition language widely criticized unsuitable use outside teaching brian kernighan popularized c language outlined notable criticisms pascal early 1981 article pascal favorite programming language serious problem described array sizes string lengths part type possible write function would accept variable-length arrays even strings parameters made unfeasible write example sorting library kernighan also criticized unpredictable order evaluation boolean expressions poor library support lack static variables raised number smaller issues also stated language provide simple constructs escape knowingly forcibly ignore restrictions limitations general complaints sources noted scope declarations clearly defined original language definition sometimes serious consequences using forward declarations define pointer types record declarations led mutual recursion identifier may may used enumeration list another difficulty like algol 60 language allow procedures functions passed parameters predefine expected type parameters kernighan criticisms directly addressed article pascal programming language bill catambay specifically myth 6 pascal serious programmers despite initial criticisms pascal continued evolve kernighan points apply versions language enhanced suitable commercial product development borland turbo pascal kernighan predicted article extensions fix issues incompatible compiler compiler since early 1990s however varieties seem condensed two categories iso borland-like extended pascal addresses many early criticisms supports variable-length strings variable initialization separate compilation short-circuit boolean operators default codice_6 clauses case statements
[ 7878, 4296, 7516, 1445, 7883, 4302, 6082, 3944, 3620, 3955, 5731, 6428, 6804, 383, 7533, 1840, 27, 6441, 3968, 2214, 737, 35, 1853, 2576, 4705, 405, 6116, 6120, 410, 1114, 7573, 5424, 5079, 4366, 775, 5784, 5786, 5787, 6497, 783, 2619, ...
Test
5,949
4
INCA_Internet:inca internet inca internet corporation also known nprotect corporation sells computer software inca internet founded young heum joo current ceo president inca internet 2000 offers anti-virus anti-spyware game security unified corporate security headquartered seoul republic korea inca internet selected one deloitte technology fast 50 korea 2007 deloitte technology fast 500 asia pacific 2007 inca internet information security company based republic korea develops 'nprotect line computer security products young heum joo founded company january 31 2000 currently ceo president company currently holds 70 market share information security korean financial institutions 90 game portal security public company limited shares young hem joo largest stockholder followed jaic japan meespierson netherlands major investors include jaic japan largest independent venture capital firm kdb korea development bank main business areas inca internet include online pc security services financial institutions internet business corporations online game corporations among others online game security solutions united pc security solution corporate internal security b2c business online anti-virus normal internet users inca internet one first application service provider asp companies online pc security industry products widely used korean japanese financial institutions public institutions worldwide on-line game companies inca internet awarded ir52 jang yeong-sil award regarded highest reputable award korean industrial technology field acquired iso 9000 certificate tuvit certification institution affiliated german rwtuv group inca internet information security company korea included deloitte technology fast500 asia pacific 2007 inca internet currently client companies 23 countries total 200 million users 170 countries inca internet first entered market january 2000 acquired global patent 'nprotect netizen first program provide real-time client pc information security service inca internet developed strong corporation independent technology leading korean japanese security market financial electronic commerce industry inca internet first founded internet usage fast spread ill-intended cyber attack pattern diversification user niche various complicated malware started show limit single one-time purchase security solutions hw-based information security products since inca internet quickly adjusted information security market trend provided end-user based user friendly pc security solution optimized today internet environment since december 2005 inca internet located within guro digital complex largest industrial complex korea played pivotal role economic growth korea referred miracle han contributing 10 national exports 1970s futuristic industrial hub centering research development advanced information technology knowledge industries relocation great synergy effect inca internet many corporations located benefited information sharing partnerships inca internet nprotect products apply saas software service model first company security industry provide internet banking security online since spread saas model pc security web security company currently holds 70 market share information security korean financial institutions 90 game portal security internationally inca internet mainly provides security solutions china japan south-east asia europe companies jcb card ufj tokyo star bank among corporations using inca internet protection online game security system asp based pc security anti-virus solution unified solution web security programs widely used korean internet environment depend activex microsoft windows internet banks korea need programs law users using linux mac os x browsers operating systems besides internet explorer microsoft windows access online banks functions run kernel level os versions windows use uac user account control windows vista windows 7 higher unable run smoothly moreover program crash kernel x64 windows system input devices especially usb keyboard conjunction nprotect caused reason nprotect netizen nprotect personal nprotect keycrypt programs used mostly internet banking korea programmed terminate processes associated banking processes terminated indiscriminately deemed threat thus may compromise system stability programs also inject existing processes startup sometimes collide anti-viruses problematically korean banks update program every time inca releases update
[ 4402, 5401, 1395, 6991, 4759, 5571, 6823, 578, 4017, 3486, 1805, 2085 ]
Test
5,950
0
Symbolic_linguistic_representation:symbolic linguistic representation symbolic linguistic representation representation utterance uses symbols represent linguistic information utterance information phonetics phonology morphology syntax semantics symbolic linguistic representations different non-symbolic representations recordings use symbols represent linguistic information rather measurements typical kind symbolic linguistic representation phonetic transcription symbolic linguistic representations frequently used computational linguistics
[ 1314 ]
Train
5,951
4
Security_event_manager:security event manager security event management sem related sim siem computer security disciplines use data inspection tools centralize storage interpretation logs events generated software running network acronyms sem sim siem sometimes used interchangeably generally refer different primary focus products practice many products area mix functions often overlap – many commercial vendors also promote terminology many systems applications run computer network generate events kept event logs logs essentially lists activities occurred records new events appended end logs occur protocols syslog snmp used transport events occur logging software host events generated better sems provide flexible array supported communication protocols allow broadest range event collection beneficial send events centralized sem system following reasons although centralised logging existed long time sems relatively new idea pioneered 1999 small company called e-security still evolving rapidly key feature security event management tool ability analyse collected logs highlight events behaviors interest example administrator super user logon outside normal business hours may include attaching contextual information host information value owner location etc identity information user info related accounts referenced event like first/last name workforce id manager name etc forth contextual information leveraged provide better correlation reporting capabilities often referred meta-data products may also integrate external remediation ticketing workflow tools assist process incident resolution better sems provide flexible extensible set integration capabilities ensure sem work customer environments sems often sold help satisfy u.s. regulatory requirements sarbanes-oxley pci-dss glba one major problems sem space difficulty consistently analyzing event data every vendor indeed many cases different products one vendor uses different proprietary event data format delivery method even cases standard used part chain like syslog standards n't typically contain enough guidance assist developers generate events administrators gather correctly reliably consumers analyze effectively attempt combat problem couple parallel standardization efforts underway first open group updating circa 1997 xdas standard never made past draft status new effort dubbed xdas v2 attempt formalize event format including data included events expressed xdas v2 standard include event delivery standards standards development dmtf may provide wrapper addition mitre also midst standardization effort called cee somewhat broader scope – attempts define event structure well delivery methods
[ 4382, 7651, 7125, 8123, 2219 ]
Validation
5,952
3
Macintosh_LC_II:macintosh lc ii macintosh lc ii personal computer designed manufactured sold apple computer inc. march 1992 march 1993 lc ii update original macintosh lc replacing motorola 68020 processor 68030 increasing onboard memory 4 mb lc ii priced 1,699 usd fully 800 less original lc introduced september 1992 apple introduced macintosh performa family consumer-oriented computers lc ii repackaged performa 400 lc ii replaced macintosh lc iii early 1993 lc ii discontinued north america two new performa models 405 430 introduced place october performa 400 405 430 discontinued new lc ii-based model called performa 410 introduced became apple new entry-level computer lc ii continued sold markets time lc ii apple highest-selling macintosh product 1992 lc ii retains original lc 16-bit system bus 10 mb ram limit making performance roughly earlier model main benefit 68030 processor lc ii onboard paged memory management unit system 7 uses enable new virtual memory feature apple opted get quick update lc door instead spending additional time required full architectural update happened following year macintosh lc iii lc ii sold time macintosh iisi 800 expensive lc ii 10 mb memory limit 16-bit data bus mono audio output iisi also includes nubus expansion slot lc ii lacks powered via button keyboard unlike lc range power switch back unit case lc ii retains predecessor pizza box form factor design updated lc ii production run auto-inject floppy drive substituted manual-inject unit revised front bezel longer featured horizontal indentation aligning floppy drive defining characteristic snow white design language logic board lc ii retains much original lc logic board design including 16-bit data path 10 mb memory limit limitations limited machine ability take full advantage 68030 cpu storage lc ii shipped one floppy drive standard options 40 80 mb hard drives original lc two internal floppy drive connectors lc ii one 5 lc units sold two floppy drives internal hard disks becoming common 1992 second connector removed video lc ii logic board one video ram slot filled 256 kb simm standard high-end configuration shipped 512 kb simm instead vram simms original lc supported lc ii upgrades apple sold 599 upgrade kit replaced lc ii logic board lc iii introduced march 23 1992 introduced september 4 1992 introduced april 12 1993 introduced october 18 1993
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 8...
Test
5,953
2
Libipq:libipq libipq development library iptables userspace packet queuing libipq provides api communicating ip_queue libipq deprecated favour newer libnetfilter_queue linux kernel-2.6.14 onwards libipq used widely deployed applications interface linux kernel-space iptables packet filter
[ 1989, 2466 ]
Test
5,954
7
Comm100:comm100 comm100 comm100 network corporation provider customer service communication products products available saas software service company serves 200,000 businesses around globe company founded 3 july 2009 vancouver british columbia canada first product comm100 live chat introduced 5 august 2009 company reached 100,000 registered business users milestone april 2011 company products services offered free christmas 2011 may 2013 company joined m3aawg supporter 2013 comm100 silver winner best biz awards international year company provides suite business communication tools customer service marketing two popular products comm100 live chat live support software allows users track chat website visitors real time comm100 email marketing bulk email software helps users send opt-in email newsletters subscribers products developed microsoft technologies asp.net microsoft sql server iis internet information services etc
[ 2570, 7715, 3135 ]
Test
5,955
4
Four_Horsemen_of_the_Infocalypse:four horsemen infocalypse four horsemen infocalypse term internet criminals imagery internet criminals play four horsemen apocalypse refers types criminals use internet facilitate crime consequently jeopardize rights honest internet users appear exact definition horsemen usually described terrorists drug dealers pedophiles organized crime sources use slightly different descriptions generally refer types criminals term coined timothy c. may 1988 referred child pornographers terrorists drug dealers etc discussing reasons limited civilian use cryptography tools among famous cypherpunk faq states term seems used less often discussions online criminal activity often discussions negative chilling effects activity regular users daily experiences online also used frequently describe political tactic think children message mailing list states four supposed threats may used individually depending circumstances aj 2013 director safe internet league voluntary censorship group russia claimed pedophiles perverts drug dealers “ creeps ” using tor anonymity software reason software outlawed list mention terrorists money-launderers directly use catch-all phrase creeps potentially includes 2015 uk conservative party claimed proposed “ new communications data legislation strengthen ability disrupt terrorist plots criminal networks organised child grooming gangs ” echoing child pornographers terrorists drug dealers etc quote timothy c. may later 2015 gamma group released statement claiming surveillance technology used terrorist threats drug cartels major organised crime paedophile rings justification concerns used target opposition politicians media groups uganda money-laundering treated major organised crime quote matches closely list given cypherpunk faq
[ 2262 ]
Validation
5,956
1
PostgreSQL:postgresql postgresql also known postgres free open-source relational database management system rdbms emphasizing extensibility technical standards compliance designed handle range workloads single machines data warehouses web services many concurrent users default database macos server also available linux freebsd openbsd windows postgresql features transactions atomicity consistency isolation durability acid properties automatically updatable views materialized views triggers foreign keys stored procedures postgresql developed postgresql global development group diverse group many companies individual contributors postgresql developers pronounce postgresql abbreviated postgres ubiquitous support sql standard among relational databases originally named postgres name post ingres refers project origins rdbms originated university california berkeley review postgresql core team announced 2007 product would continue use name postgresql postgresql evolved ingres project university california berkeley 1982 leader ingres team michael stonebraker left berkeley make proprietary version ingres returned berkeley 1985 began post-ingres project address problems contemporary database systems become increasingly clear early 1980s turing award 2014 projects techniques pioneered new project postgres aimed add fewest features needed completely support data types features included ability define types fully describe relationships – something used widely maintained entirely user postgres database understood relationships could retrieve information related tables natural way using rules postgres used many ideas ingres code starting 1986 published papers described basis system prototype version shown 1988 acm sigmod conference team released version 1 small number users june 1989 followed version 2 re-written rules system june 1990 version 3 released 1991 re-wrote rules system added support multiple storage managers improved query engine 1993 number users began overwhelm project requests support features releasing version 4.2 june 30 1994 – primarily cleanup – project ended berkeley released postgres mit license variant enabled developers use code use time postgres used ingres-influenced postquel query language interpreter could interactively used console application named monitor 1994 berkeley graduate students andrew yu jolly chen replaced postquel query language interpreter one sql query language creating postgres95 monitor also replaced psql yu chen announced first version 0.01 beta testers may 5 1995 version 1.0 postgres95 announced september 5 1995 liberal license enabled software freely modifiable july 8 1996 marc fournier hub.org networking services provided first non-university development server open-source development effort participation bruce momjian vadim b. mikheev work began stabilize code inherited berkeley 1996 project renamed postgresql reflect support sql online presence website postgresql.org began october 22 1996 first postgresql release formed version 6.0 january 29 1997 since developers volunteers around world maintained software postgresql global development group project continues make releases available free open-source software postgresql license code comes contributions proprietary vendors support companies open-source programmers postgresql manages concurrency multiversion concurrency control mvcc gives transaction snapshot database allowing changes made without affecting transactions largely eliminates need read locks ensures database maintains acid principles postgresql offers three levels transaction isolation read committed repeatable read serializable postgresql immune dirty reads requesting read uncommitted transaction isolation level provides read committed instead postgresql supports full serializability via serializable snapshot isolation ssi method postgresql includes built-in binary replication based shipping changes write-ahead logs wal replica nodes asynchronously ability run read-only queries replicated nodes allows splitting read traffic among multiple nodes efficiently earlier replication software allowed similar read scaling normally relied adding replication triggers master increasing load postgresql includes built-in synchronous replication ensures write transaction master waits least one replica node written data transaction log unlike database systems durability transaction whether asynchronous synchronous specified per-database per-user per-session even per-transaction useful workloads require guarantees may wanted data slow performance due requirement confirmation transaction reaching synchronous standby standby servers synchronous asynchronous synchronous standby servers specified configuration determines servers candidates synchronous replication first list actively streaming used current synchronous server fails system fails next line synchronous multi-master replication included postgresql core postgres-xc based postgresql provides scalable synchronous multi-master replication licensed license postgresql related project called postgres-xl postgres-r yet another fork bidirectional replication bdr asynchronous multi-master replication system postgresql tools repmgr make managing replication clusters easier several asynchronous trigger-based replication packages available remain useful even introduction expanded core abilities situations binary replication full database cluster inappropriate postgresql includes built-in support regular b-tree hash table indexes four index access methods generalized search trees gist generalized inverted indexes gin space-partitioned gist sp-gist block range indexes brin addition user-defined index methods created although quite involved process indexes postgresql also support following features postgresql schema holds objects except roles tablespaces schemas effectively act like namespaces allowing objects name co-exist database default newly created databases schema called public schemas added public schema n't mandatory setting determines order postgresql checks schemas unqualified objects without prefixed schema default set refers currently connected database user default set database role level session parameter freely changed even multiple times client session affecting session non-existent schemas listed search_path silently skipped objects lookup new objects created whichever valid schema one presently exists appears first search_path.schema outline database wide variety native data types supported including addition users create data types usually made fully indexable via postgresql indexing infrastructures – gist gin sp-gist examples include geographic information system gis data types postgis project postgresql also data type called domain data type optional constraints defined creator domain means data entered column using domain conform whichever constraints defined part domain data type represents range data used called range types discrete ranges e.g integer values 1 10 continuous ranges e.g. time 10:00 11:00 built-in range types available include ranges integers big integers decimal numbers time stamps without time zone dates custom range types created make new types ranges available ip address ranges using inet type base float ranges using float data type base range types support inclusive exclusive range boundaries using characters respectively e.g. represents integers starting including 4 including 9 range types also compatible existing operators used check overlap containment right etc new types almost objects inside database created including tables set inherit characteristics parent table data child tables appear exist parent tables unless data selected parent table using keyword i.e adding column parent table cause column appear child table inheritance used implement table partitioning using either triggers rules direct inserts parent table proper child tables feature fully supported yet – particular table constraints currently inheritable check constraints not-null constraints parent table automatically inherited children types constraints unique primary key foreign key constraints inherited inheritance provides way map features generalization hierarchies depicted entity relationship diagrams erds directly postgresql database postgresql link systems retrieve data via foreign data wrappers fdws take form data source file system another relational database management system rdbms web service means regular database queries use data sources like regular tables even join multiple data-sources together postgresql several interfaces available also widely supported among programming language libraries built-in interfaces include libpq postgresql official c application interface ecpg embedded c system external interfaces include procedural languages allow developers extend database custom subroutines functions often called stored procedures functions used build database triggers functions invoked modification certain data custom data types aggregate functions procedural languages also invoked without defining function using command sql level languages divided two groups procedures written safe languages sandboxed safely created used user procedures written unsafe languages created superusers allow bypassing database security restrictions also access sources external database languages like perl provide safe unsafe versions postgresql built-in support three procedural languages addition postgresql allows procedural languages loaded database extensions three language extensions included postgresql support perl python tcl external projects add support many languages including java javascript pl/v8 r ruby others triggers events triggered action sql data manipulation language dml statements example insert statement might activate trigger checks values statement valid triggers activated either insert update statements triggers fully supported attached tables triggers per-column conditional update triggers target specific columns table triggers told execute set conditions specified trigger clause triggers attached views using instead condition multiple triggers fired alphabetical order addition calling functions written native pl/pgsql triggers also invoke functions written languages like pl/python pl/perl postgresql provides asynchronous messaging system accessed notify listen unlisten commands session issue notify command along user-specified channel optional payload mark particular event occurring sessions able detect events issuing listen command listen particular channel functionality used wide variety purposes letting sessions know table updated separate applications detect particular action performed system prevents need continuous polling applications see anything yet changed reducing unnecessary overhead notifications fully transactional messages sent transaction sent committed eliminates problem messages sent action performed rolled back many connectors postgresql provide support notification system including libpq jdbc npgsql psycopg node.js used external applications rules allow query tree incoming query rewritten query re-write rules attached table/class re-write incoming dml select insert update and/or delete one queries either replace original dml statement execute addition query re-write occurs dml statement parsing query planning postgresql server process-based threaded uses one operating system process per database session multiple sessions automatically spread across available cpus operating system starting postgresql 9.6 many types queries also parallelized across multiple background worker processes taking advantage multiple cpus cores client applications use threads create multiple database connections thread postgresql manages internal security per-role basis role generally regarded user role log group role roles members permissions granted revoked object column level also allow/prevent creation new objects database schema table levels postgresql security label feature extension sql standards allows additional security bundled loadable module supports label-based mandatory access control mac based security-enhanced linux selinux security policy postgresql natively supports broad number external authentication mechanisms including gssapi sspi kerberos peer ident certificate methods also use specified map file lists users matched authentication system allowed connect specific database user methods specified cluster host-based authentication configuration file pg_hba.conf determines connections allowed allows control user connect database connect ip address ip address range domain socket authentication system enforced whether connection must use transport layer security tls postgresql claims high complete conformance sql standard one exception handling unquoted identifiers like table column names postgresql folded – internal – lower case characters whereas standard says unquoted identifiers folded upper case thus equivalent according standard many informal performance studies postgresql done performance improvements aimed improving scalability began heavily version 8.1 simple benchmarks version 8.0 version 8.4 showed latter 10 times faster read-only workloads least 7.5 times faster read write workloads first industry-standard peer-validated benchmark completed june 2007 using sun java system application server proprietary version glassfish 9.0 platform edition ultrasparc t1-based sun fire server postgresql 8.2 result 778.14 specjappserver2004 jops standard compares favourably 874 jops standard oracle 10 itanium-based hp-ux system august 2007 sun submitted improved benchmark score 813.73 specjappserver2004 jops standard system test reduced price price/performance improved 84.98/jops 70.57/jops default configuration postgresql uses small amount dedicated memory performance-critical purposes caching database blocks sorting limitation primarily older operating systems required kernel changes allow allocating large blocks shared memory postgresql.org provides advice basic recommended performance practice wiki april 2012 robert haas enterprisedb demonstrated postgresql 9.2 linear cpu scalability using server 64 cores matloob khushi performed benchmarking postgresql 9.0 mysql 5.6.15 ability process genomic data performance analysis found postgresql extracts overlapping genomic regions eight times faster mysql using two datasets 80,000 forming random human dna regions insertion data uploads postgresql also better although general searching ability databases almost equivalent postgresql available following operating systems linux recent distributions windows windows 2000 sp4 later compilable e.g visual studio recent 2017 version freebsd openbsd netbsd macos os x aix hp-ux solaris unixware officially tested dragonfly bsd bsd/os irix openindiana opensolaris openserver tru64 unix unix-like systems could also work modern support postgresql works following instruction set architectures x86 x86-64 windows operating systems supported windows ia-64 itanium external support hp-ux powerpc powerpc 64 s/390 s/390x sparc sparc 64 armv8-a 64-bit older arm 32-bit including older armv6 raspberry pi mips mipsel pa-risc also known work alpha dropped 9.5 m68k m32r ns32k vax beyond possible build postgresql unsupported cpu disabling spinlocks open source front-ends tools administering postgresql include number companies offer proprietary tools postgresql often consist universal core adapted various specific database products tools mostly share administration features open source tools offer improvements data modeling importing exporting reporting notable organizations products use postgresql primary database include notable vendors offer postgresql software service
[ 4288, 2180, 4295, 1073, 1445, 4306, 2554, 3951, 6428, 2199, 1460, 1096, 2571, 6817, 3293, 3975, 4705, 5055, 2226, 6462, 4345, 7920, 3652, 5064, 418, 3998, 7575, 5778, 1132, 4004, 5780, 2249, 5082, 7213, 779, 5787, 784, 4747, 7598, 7231, ...
Test
5,957
3
Millicode:millicode computer architecture millicode higher level microcode used implement instruction set computer millicode runs top microcoded instructions uses instructions implement complex instructions visible user system implementation millicode requires special processor mode called millimode provides set registers possibly special instructions invisible user ibm invented concept term millicode system/390 9672-g4 processor 1997 following cited advantages millicode i370 code capitol chipset used es/9370 models similar millicode written combination system/370 instructions code access special hardware features
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 1867, 2248, 6148, 2266, 4047, 5483, 1556, 5487, 6198, 6922, 7666, 515, 8024, 5521, 3747, 1237, 1252, 1254, 4847, 4479, 8066, 1640, 4864, 216, 5932, 4154, 5939, 5243, ...
Test
5,958
2
Light_Weight_Kernel_Threads:light weight kernel threads light weight kernel threads lwkt computer science term dragonflybsd particular lwkts differ normal kernel threads preempt normal kernel threads according matt dillon dragonflybsd creator
[ 1315, 1133, 5571, 191, 594, 8194, 2266 ]
Test
5,959
7
Big_V_Telecom:big v telecom big v telecom indian cloud telephony company serves direct clients also works partnership network franchises company first incubated tata elxsi 2013 part 140 billion tata group based pune india big v telecom founded keshor daga 2008 flagship product yocc contact centre 2012 part company corporate social responsibility drive big v telecom established call anna virtual contact centre anti-corruption activist anna hazare indian anti-corruption movement 2012 big v telecom partnered western central railways providing 131 railway enquiry number firm also partnered bsnl providing value added services maharashtra august 2015 firm launched product named voter first propagated india first voter engagement issue resolution application custom built politicians interact constituents download android ios stores reports suggest voter first name sub-division big v telecom firm name appear app stores instead politician apps appear respective names picture identity mobile app firm past also partnered tv18 commoditycontrol.com providing on-spot updates commodity rates via phone calls consumers self-funded company recently announced looking venture capital funding expansion within outside india ndtv profit business services excellence award innovative franchise business service sector 2010 aegis graham bell award innovative managed services 2012 tata elxsi takes big v telecom incubator programme tata elxsi incubates big v telecom tata elxsi picks big v telecom first startup new incub te program tata elxsi sets business incubator cloud telephony firm big v telecom looking raise 6.5m funding big v telecom incubated tata elxsi expands footprints delhi/ncr big v telecom incubated tata elxsi expands footprints delhi/ncr big v telecom incubated tata elxsi expands footprints delhi/ncr
[]
Test
5,960
4
Chinese_National_Vulnerability_Database:chinese national vulnerability database chinese national vulnerability database cnnvd people republic china nstional vulnerability database maintained chinese ministry state security
[ 1805, 1722 ]
Test
5,961
4
Mohamed_Elnoby:mohamed elnoby mohamed abdelbasset elnouby famous egyptian programmer information security specialist one famous white hat arabic hackers start point 2013 penetrated discovered vulnerabilitya facebook resulted website gave reward focused name many arabic global media channels paid big attention also discovered many vulnerabilities many famous global websites like google yahoo amazon adobe others honored effort plus adding name add value hall fame list white hat security experts 20 global websites founder member chief technonogy officer google business community upper egypt ex general moderator arabic version foursquare app facebook added name hall fame list white hat security experts 2013 2014 2015 2016 row born 1988 esna qena upper egypt graduated faculty tourism hotels elmenia university started working programming computer networks field since 1999 code name facebook symbiansymoh worked many organizations like s3geeks cooperated volunteering works like arabization famous social media website twitter also worked general moderator arabic version foursquare app working freelance programmer chief technonogy officer google business community upper egypt took first step penetration hacking others computers stealing accounts turned moral hacker call white hat hacker start point discovering vulnerability famous website facebook got financial reward plus adding name honor list white hat security experts continued discovering vulnerabilities till got 5 ones processes vulnerabilities discovery global websites continued till got 22 websites famous hunter vulnerabilities rewards
[]
Train
5,962
2
Memory_protection:memory protection memory protection way control memory access rights computer part modern instruction set architectures operating systems main purpose memory protection prevent process accessing memory allocated prevents bug malware within process affecting processes operating system protection may encompass accesses specified area memory write accesses attempts execute contents area attempt access unowned memory results hardware fault called segmentation fault storage violation exception generally causing abnormal termination offending process memory protection computer security includes additional techniques address space layout randomization executable space protection segmentation refers dividing computer memory segments reference memory location includes value identifies segment offset within segment x86 architecture multiple segmentation features helpful using protected memory architecture x86 architecture global descriptor table local descriptor tables used reference segments computer memory pointers memory segments x86 processors also stored processor segment registers initially x86 processors 4 segment registers cs code segment ss stack segment ds data segment es extra segment later another two segment registers added – fs gs paging memory address space divided equal-sized blocks called pages using virtual memory hardware page reside location computer physical memory flagged protected virtual memory makes possible linear virtual memory address space use access blocks fragmented physical memory address space computer architectures support paging also use pages basis memory protection page table maps virtual memory physical memory page table usually invisible process page tables make easier allocate additional memory new page allocated anywhere physical memory impossible application access page explicitly allocated every memory address either points page allocated application generates interrupt called page fault unallocated pages pages allocated application addresses application point view page fault may necessarily indicate error page faults used memory protection operating system may manage page table way reference page previously swapped disk causes page fault operating system intercepts page fault loads required memory page application continues fault occurred scheme known virtual memory allows in-memory data currently use moved disk storage back way transparent applications increase overall memory capacity systems page fault mechanism also used executable space protection w^x memory protection key mpk mechanism divides physical memory blocks particular size e.g. 4 kib associated numerical value called protection key process also protection key value associated memory access hardware checks current process protection key matches value associated memory block accessed exception occurs mechanism introduced system/360 architecture available today system z mainframes heavily used system z operating systems subsystems system/360 protection keys described associated physical addresses different protection key mechanism used architectures hewlett-packard/intel ia-64 hewlett-packard pa-risc associated virtual addresses allow multiple keys per process itanium pa architectures translations tlb entries keys itanium access ids pa associated running process several protection key registers 16 itanium 4 hp/pa translation selected virtual address key compared protection key registers match plus possible checks access permitted none match fault exception generated software fault handler desired check missing key larger list keys maintained software thus protection key registers inside processor may treated software-managed cache larger list keys associated process pa 15–18 bits key itanium mandates least 18 keys usually associated protection domains libraries modules etc x86 protection keys architecture allows tagging virtual addresses user pages 16 protection keys pages tagged protection key constitute protection domain new register contains permissions associated protection domain load store operations checked page table permissions protection key permissions associated protection domain virtual address allowed permissions allow access protection key permissions set user space allowing applications directly restrict access application data without os intervention since protection keys associated virtual address protection domains per address space processes running different address spaces use 16 domains simulation use monitoring program interpret machine code instructions computer architectures instruction set simulator provide memory protection using segmentation-like scheme validating target address length instruction real time actually executing simulator must calculate target address length compare list valid address ranges holds concerning thread environment dynamic memory blocks acquired since thread inception plus valid shared static memory slots meaning valid may change throughout thread life depending upon context may sometimes allowed alter static block storage sometimes depending upon current mode execution may may depend storage key supervisor state generally advisable use method memory protection adequate facilities exist cpu takes valuable processing power computer however generally used debugging testing purposes provide extra fine level granularity otherwise generic storage violations indicate precisely instruction attempting overwrite particular section storage may storage key unprotected storage capability-based addressing method memory protection unused modern commercial computers method pointers replaced protected objects called capabilities created using privileged instructions may executed kernel process authorized effectively lets kernel control processes may access objects memory need use separate address spaces context switches commercial products used capability based security plessey system 250 ibm system/38 intel iapx 432 architecture keykos capability approaches widely used research systems eros combex darpa browser used conceptually basis virtual machines notably smalltalk java currently darpa-funded cheri project university cambridge working create modern capability machine also supports legacy software dynamic tainting technique protecting programs illegal memory accesses memory allocated runtime technique taints memory corresponding pointer using taint mark taint marks suitably propagated program executes checked every time memory address accessed pointer p taint marks associated p differ execution stopped illegal access reported sparc m7 processors higher implement dynamic tainting hardware oracle markets feature silicon secured memory ssm previously branded application data integrity adi lowrisc cpu design includes dynamic tainting name tagged memory protection level particular implementation may measured closely adheres principle minimum privilege different operating systems use different forms memory protection separation although memory protection common mainframes many minicomputer systems 1960s true memory separation used home computer operating systems os/2 risc os released 1987 prior systems lack protection even used form interprocess communication sending pointer processes possible processes access system memory windows 9x family operating systems operating systems implement memory protection include unix-like systems codice_1 system call used control memory protection
[ 1807, 4297, 2549, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 1103, 3635, 7550, 405, 1855, 6118, 4347, 1117, 7570, 1880, 65, 4733, 5783, 6853, 5088, 6500, 785, 5449, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 336...
Validation
5,963
3
LGA_1150:lga 1150 lga 1150 also known socket h3 microprocessor socket used intel central processing units cpus built haswell microarchitecture socket also used haswell successor broadwell microarchitecture successor lga 1155 succeeded lga 1151 2016 motherboards lga 1150 socket support varying video outputs vga dvi hdmi depending model intel clear video technology intel platform controller hub pch lga 1150 cpus codenamed lynx point intel xeon processors socket lga 1150 use intel c222 c224 c226 chipsets 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable may 12 2014 intel announced release two 9-series chipsets h97 z97 differences new features two chipsets compared h87 z87 counterparts following motherboards based h97 z97 chipsets available purchase day chipsets announced
[ 2541, 4123, 3849, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 6014, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 7484, 8021, 7302, 1052, 866, 3333, 3063, 1237, 7134, 262, 6683, 2977, 5886 ]
Validation
5,964
2
Interactive_Systems_Corporation:interactive systems corporation interactive systems corporation styled interactive systems corporation abbreviated isc us-based software company first vendor unix operating system outside operating santa monica california founded 1977 peter g. weiner rand corporation researcher previously founded yale university computer science department ph d. advisor brian kernighan one unix developers weiner joined heinz lycklama also veteran previously author version 6 unix port lsi-11 computer isc acquired eastman kodak company 1988 sold isc unix operating system assets sun microsystems september 26 1991 kodak sold remaining parts isc shl systemhouse inc 1993 several former isc staff founded segue software partnered lotus development develop unix version lotus 1-2-3 peter norton computing develop unix version norton utilities isc 1977 offering is/1 version 6 unix variant enhanced office automation running pdp-11 is/3 is/5 enhanced versions unix system iii system v pdp-11 vax isc unix ports ibm pc included variant system iii developed contract ibm known pc/ix personal computer interactive executive also abbreviated pc-ix later versions branded 386/ix finally interactive unix system v/386 based system v release 3.2 isc principal publisher system v.4 intel platform isc also involved development vm/ix unix guest os vm/370 enhancements ix/370 tss/370-based unix system ibm originally developed jointly ca.1980 also developed aix 1.0 advanced interactive executive ibm rt pc contract ibm although ibm awarded development contract aix version 2 aix/386 aix/370 competing locus computing corporation although observers early 1980s expected ibm would choose microsoft xenix version corporation unix microcomputer pc/ix first unix implementation ibm pc xt available directly ibm according bob blake pc/ix product manager ibm primary objective make credible unix system ... try 'ibm-ize product pc-ix system iii unix pc/ix however first unix port xt venix/86 preceded pc/ix year although based older version 7 unix main addition pc/ix ined screen editor isc ined offered multiple windows context-sensitive help paragraph justification margin changes although fully fledged word processor pc/ix omitted system iii fortran compiler tar file archiver add bsd tools like vi c shell one reason porting pc/ix individual applications limited single segment 64 kb ram achieve good filesystem performance pc/ix directly addressed xt hard-drive rather bios gave significant speed advantage compared ms-dos lack true memory protection 8088 chips ibm sold single-user licenses pc/ix pc/ix distribution came 19 floppy disks accompanied 1,800-page manual installed pc/ix took approximately 4.5 mb disk space editorial bill machrone pc magazine time pc/ix launch flagged 900 price show stopper given lack compatibility ms-dos applications pc/ix commercial success although byte august 1984 described complete usable single-user implementation done 8088 noting pc/ix pc outperformed venix pdp-11/23 pc/ix succeeded 386/ix 1985 system vr3 derivative later versions termed interactive unix system v/386 based system v 3.2 though elements bsd added svr3.2 kernel meant diminished compatibility unix ports early nineties interactive unix system praised pc magazine reviewer stability acquisition interactive sun microsystems continued maintain interactive unix system offering low-end alternative system v.4-based solaris even latter ported x86-based desktop machines last version system v/386 release 3.2 version 4.1.1 released july 1998 official support ended july 23 2006 five years sun withdrew product sale version isa 3.0.1 interactive unix system supported 16 mb ram next versions supported 256mb ram pci bus eisa versions always supported 256mb ram
[ 1522, 4751, 5216, 6577, 6849, 1052, 2118, 6360, 8117, 6367 ]
Validation
5,965
9
Python_(programming_language):python programming language python interpreted high-level general-purpose programming language created guido van rossum first released 1991 python design philosophy emphasizes code readability notable use significant whitespace language constructs object-oriented approach aim help programmers write clear logical code small large-scale projects python dynamically typed garbage-collected supports multiple programming paradigms including procedural object-oriented functional programming python often described batteries included language due comprehensive standard library python conceived late 1980s successor abc language python 2.0 released 2000 introduced features like list comprehensions garbage collection system capable collecting reference cycles python 3.0 released 2008 major revision language completely backward-compatible much python 2 code run unmodified python 3 due concern amount code written python 2 support python 2.7 last release 2.x series extended 2020 language developer guido van rossum shouldered sole responsibility project july 2018 shares leadership member five-person steering council python interpreters available many operating systems global community programmers develops maintains cpython open source reference implementation non-profit organization python software foundation manages directs resources python cpython development python conceived late 1980s guido van rossum centrum wiskunde informatica cwi netherlands successor abc language inspired setl capable exception handling interfacing amoeba operating system implementation began december 1989 van rossum continued python lead developer july 12 2018 announced permanent vacation responsibilities python benevolent dictator life title python community bestowed upon reflect long-term commitment project chief decision-maker january 2019 active python core developers elected brett cannon nick coghlan barry warsaw carol willing van rossum five-member steering council lead project python 2.0 released 16 october 2000 many major new features including cycle-detecting garbage collector support unicode python 3.0 released 3 december 2008 major revision language completely backward-compatible many major features backported python 2.6.x 2.7.x version series releases python 3 include codice_1 utility automates least partially translation python 2 code python 3 python 2.7 end-of-life date initially set 2015 postponed 2020 concern large body existing code could easily forward-ported python 3 january 2017 google announced work python 2.7 go transcompiler improve performance concurrent workloads python multi-paradigm programming language object-oriented programming structured programming fully supported many features support functional programming aspect-oriented programming including metaprogramming metaobjects magic methods many paradigms supported via extensions including design contract logic programming python uses dynamic typing combination reference counting cycle-detecting garbage collector memory management also features dynamic name resolution late binding binds method variable names program execution python design offers support functional programming lisp tradition codice_2 codice_3 codice_4 functions list comprehensions dictionaries sets generator expressions standard library two modules itertools functools implement functional tools borrowed haskell standard ml language core philosophy summarized document zen python pep 20 includes aphorisms rather functionality built core python designed highly extensible compact modularity made particularly popular means adding programmable interfaces existing applications van rossum vision small core language large standard library easily extensible interpreter stemmed frustrations abc espoused opposite approach python strives simpler less-cluttered syntax grammar giving developers choice coding methodology contrast perl one way motto python embraces one—and preferably one—obvious way design philosophy alex martelli fellow python software foundation python book author writes describe something 'clever considered compliment python culture python developers strive avoid premature optimization reject patches non-critical parts cpython reference implementation would offer marginal increases speed cost clarity speed important python programmer move time-critical functions extension modules written languages c use pypy just-in-time compiler cython also available translates python script c makes direct c-level api calls python interpreter important goal python developers keeping fun use reflected language name—a tribute british comedy group monty python—and occasionally playful approaches tutorials reference materials examples refer spam eggs famous monty python sketch instead standard foo bar common neologism python community pythonic wide range meanings related program style say code pythonic say uses python idioms well natural shows fluency language conforms python minimalist philosophy emphasis readability contrast code difficult understand reads like rough transcription another programming language called unpythonic users admirers python especially considered knowledgeable experienced often referred pythonists pythonistas pythoneers python meant easily readable language formatting visually uncluttered often uses english keywords languages use punctuation unlike many languages use curly brackets delimit blocks semicolons statements optional fewer syntactic exceptions special cases c pascal python uses whitespace indentation rather curly brackets keywords delimit blocks increase indentation comes certain statements decrease indentation signifies end current block thus program visual structure accurately represents program semantic structure feature also sometimes termed off-side rule python statements include among others python support tail call optimization first-class continuations according guido van rossum never however better support coroutine-like functionality provided 2.5 extending python generators 2.5 generators lazy iterators information passed unidirectionally generator python 2.5 possible pass information back generator function python 3.3 information passed multiple stack levels python expressions similar languages c java python distinction expressions statements rigidly enforced contrast languages common lisp scheme ruby leads duplicating functionality example statements part expression list comprehensions lambda expressions expressions contain statements particular case assignment statement codice_78 form part conditional expression conditional statement advantage avoiding classic c error mistaking assignment operator codice_79 equality operator codice_36 conditions codice_81 syntactically valid probably unintended c code codice_82 causes syntax error python methods objects functions attached object class syntax codice_83 normal methods functions syntactic sugar codice_84 python methods explicit codice_85 parameter access instance data contrast implicit codice_85 codice_87 object-oriented programming languages e.g. c++ java objective-c ruby python uses duck typing typed objects untyped variable names type constraints checked compile time rather operations object may fail signifying given object suitable type despite dynamically typed python strongly typed forbidding operations well-defined example adding number string rather silently attempting make sense python allows programmers define types using classes often used object-oriented programming new instances classes constructed calling class example codice_88 codice_89 classes instances metaclass codice_90 instance allowing metaprogramming reflection version 3.0 python two kinds classes old-style new-style syntax styles difference whether class codice_91 inherited directly indirectly new-style classes inherit codice_91 instances codice_90 versions python 2 python 2.2 onwards kinds classes used old-style classes eliminated python 3.0 long term plan support gradual typing python 3.5 syntax language allows specifying static types checked default implementation cpython experimental optional static type checker named mypy supports compile-time type checking python usual c language arithmetic operators codice_50 codice_95 codice_96 codice_33 codice_58 also codice_34 exponentiation e.g codice_100 codice_101 new matrix multiply codice_35 operator included version 3.5 additionally unary operator codice_103 essentially inverts bits one argument integers means codice_104 operators include bitwise shift operators codice_105 shifts codice_106 left codice_107 places codice_108 codice_109 shifts codice_106 right codice_107 places codice_112 behavior division changed significantly time division integers produces accurate floating point results rounding towards negative infinity though different languages adds consistency instance means equation codice_126 always true also means equation codice_127 valid positive negative values codice_128 however maintaining validity equation means result codice_129 expected half-open interval 0 b codice_130 positive integer lie interval b 0 codice_130 negative python provides codice_132 function rounding float nearest integer tie-breaking versions 3 use round-away-from-zero codice_133 1.0 codice_134 −1.0 python 3 uses round even codice_135 2 codice_136 2 python allows boolean expressions multiple equality relations manner consistent general use mathematics example expression codice_137 tests whether codice_128 less codice_130 codice_130 less codice_141 c-derived languages interpret expression differently c expression would first evaluate codice_142 resulting 0 1 result would compared codice_141 python extensive built-in support arbitrary precision arithmetic integers transparently switched machine-supported maximum fixed-precision usually 32 64 bits belonging python type codice_144 arbitrary precision belonging python type codice_145 needed latter l suffix textual representation python 3 distinction codice_144 codice_145 types eliminated behavior entirely contained codice_144 class codice_149 type/class module codice_150 since version 2.4 provides decimal floating point numbers arbitrary precision several rounding modes codice_151 type module codice_152 since version 2.6 provides arbitrary precision rational numbers due python extensive mathematics library third-party library numpy extends native capabilities frequently used scientific scripting language aid problems numerical data processing manipulation python large standard library commonly cited one greatest strengths provides tools suited many tasks internet-facing applications many standard formats protocols mime http supported includes modules creating graphical user interfaces connecting relational databases generating pseudorandom numbers arithmetic arbitrary precision decimals manipulating regular expressions unit testing parts standard library covered specifications example web server gateway interface wsgi implementation codice_153 follows pep 333 modules specified code internal documentation test suites supplied however standard library cross-platform python code modules need altering rewriting variant implementations python implementations including cpython include read–eval–print loop repl permitting function command line interpreter user enters statements sequentially receives results immediately shells including idle ipython add abilities auto-completion session state retention syntax highlighting well standard desktop integrated development environments web browser-based ides sagemath intended developing science math-related python programs pythonanywhere browser-based ide hosting environment canopy ide commercial python ide emphasizing scientific computing cpython reference implementation python written c meeting c89 standard several select c99 features compiles python programs intermediate bytecode executed virtual machine cpython distributed large standard library written mixture c native python available many platforms including windows modern unix-like systems platform portability one earliest priorities pypy fast compliant interpreter python 2.7 3.5 just-in-time compiler brings significant speed improvement cpython stackless python significant fork cpython implements microthreads use c memory stack thus allowing massively concurrent programs pypy also stackless version micropython circuitpython python 3 variants optimised microcontrollers includes lego mindstorms ev3 just-in-time python compilers developed unsupported 2005 nokia released python interpreter series 60 mobile phones named pys60 includes many modules cpython implementations additional modules integrate symbian operating system project kept up-to-date run variants s60 platform several third-party modules available nokia n900 also supports python gtk widget libraries enabling programs written run target device several compilers high-level object languages either unrestricted python restricted subset python language similar python source language performance comparison various python implementations non-numerical combinatorial workload presented euroscipy '13 python development conducted largely python enhancement proposal pep process primary mechanism proposing major new features collecting community input issues documenting python design decisions python coding style covered pep 8 outstanding peps reviewed commented python community steering council enhancement language corresponds development cpython reference implementation mailing list python-dev primary forum language development specific issues discussed roundup bug tracker maintained python.org development originally took place self-hosted source-code repository running mercurial python moved github january 2017 cpython public releases come three types distinguished part version number incremented many alpha beta release-candidates also released previews testing final releases although rough schedule release often delayed code ready python development team monitors state code running large unit test suite development using buildbot continuous integration system community python developers also contributed 86,000 software modules python package index pypi official repository third-party python libraries major academic conference python pycon also special python mentoring programmes pyladies python name derived british comedy group monty python python creator guido van rossum enjoyed developing language monty python references appear frequently python code culture example metasyntactic variables often used python literature spam eggs instead traditional foo bar official python documentation also contains various references monty python routines prefix py- used show something related python examples use prefix names python applications libraries include pygame binding sdl python commonly used create games pyqt pygtk bind qt gtk python respectively pypy python implementation originally written python python api documentation generators include since 2003 python consistently ranked top ten popular programming languages tiobe programming community index third popular language behind java c selected programming language year 2007 2010 2018 empirical study found scripting languages python productive conventional languages c java programming problems involving string manipulation search dictionary determined memory consumption often better java much worse c c++ large organizations use python include wikipedia google yahoo cern nasa facebook amazon instagram spotify smaller entities like ilm ita social news networking site reddit written entirely python python serve scripting language web applications e.g. via mod_wsgi apache web server web server gateway interface standard api evolved facilitate applications web frameworks like django pylons pyramid turbogears web2py tornado flask bottle zope support developers design maintenance complex applications pyjs ironpython used develop client-side ajax-based applications sqlalchemy used data mapper relational database twisted framework program communications computers used example dropbox libraries numpy scipy matplotlib allow effective use python scientific computing specialized libraries biopython astropy providing domain-specific functionality sagemath mathematical software notebook interface programmable python library covers many aspects mathematics including algebra combinatorics numerical mathematics number theory calculus python successfully embedded many software products scripting language including finite element method software abaqus 3d parametric modeler like freecad 3d animation packages 3ds max blender cinema 4d lightwave houdini maya modo motionbuilder softimage visual effects compositor nuke 2d imaging programs like gimp inkscape scribus paint shop pro musical notation programs like scorewriter capella gnu debugger uses python pretty printer show complex structures c++ containers esri promotes python best choice writing scripts arcgis also used several video games adopted first three available programming languages google app engine two java go python commonly used artificial intelligence projects help libraries like tensorflow keras scikit-learn scripting language modular architecture simple syntax rich text processing tools python often used natural language processing many operating systems include python standard component ships linux distributions amigaos 4 freebsd package netbsd openbsd package macos used command line terminal many linux distributions use installers written python ubuntu uses ubiquity installer red hat linux fedora use anaconda installer gentoo linux uses python package management system portage python used extensively information security industry including exploit development sugar software one laptop per child xo developed sugar labs written python raspberry pi single-board computer project adopted python main user-programming language libreoffice includes python intends replace java python python scripting provider core feature since version 4.0 7 february 2013 python design philosophy influenced many programming languages python development practices also emulated languages example practice requiring document describing rationale issues surrounding change language python pep also used tcl erlang python received tiobe programming language year awards 2007 2010 2018 award given language greatest growth popularity year measured tiobe index
[ 4296, 7156, 1445, 4302, 10, 1450, 5726, 5731, 4315, 4316, 4324, 5742, 5746, 1478, 35, 4345, 54, 4354, 7213, 2966, 5782, 5786, 5787, 80, 5800, 1524, 5808, 7246, 103, 109, 3005, 1550, 4415, 5841, 4425, 5846, 7277, 1575, 5855, 3036, 5863, ...
Test
5,966
7
Salesforce_Tower_(Indianapolis):salesforce tower indianapolis opened 1990 near monument circle indianapolis salesforce tower formerly known bank one tower chase tower originally conceived american fletcher tower tallest building u.s. state indiana 58th tallest building united states surpassed aul tower oneamerica tower indianapolis distinction building twin spires pierce indianapolis skyline 49 floors office retail space 2 building equipment floors peak roof regional headquarters salesforce moved tower late-2010 currently occupies large amount space building tower two spires equal height one functional transmission antenna mast merely architectural decoration building designed klingstubbins built indianapolis-based huber hunt nichols tower step pyramidal cap reflects design indiana war memorial three blocks due north war memorial turn reflects descriptions original mausoleum height building roof specifically designed house communications relay equipment order provide additional revenue building owners past several years two large banners occasionally placed outside north south communication bullpen areas roof support two city professional sports franchises go pacers go colts signs highly visible tallest structure city tower official observation deck views city seen floors 21 27 31 32 33 35 39 40 41 43 44 common areas ohio street side tower side complex additionally views monument circle immediate downtown area seen floors 2 7 10 common areas circle side complex 2017 electronic turnstiles implemented tower security measure turn elevators longer accessible public however visitors passes attained security desk circle tower-side lobbies tower seen various spots around greater indianapolis tower originally conceived late 1970s frank e. mckinney jr. chairman american fletcher corporation holding company american fletcher national bank trust company afnb time indiana largest financial institution allow consolidation expansion company headquarters land slowly assembled building several predecessor structures along ohio street pennsylvania street demolished years early 1980s clear way mckinney hoped would soon indiana tallest office tower construction building began american fletcher became first major indianapolis bank holding company sold out-of-state financial institution agreeing spring 1986 merge ohio rapidly growing banc one corporation upon consummation merger mr. mckinney became chairman bank one indiana operations tower planning picked momentum ground broken construction began 1988 newly designated bank one center tower integrated afnb existing headquarters complex monument circle adjacent market street done mainly secure prestigious monument circle address new tower rises ohio street wabash street east-west alley market ohio thus ohio street entrance tower complex back door concourse-style passageway second level running scioto street north-south alley pennsylvania meridian connect skyscraper attached parking garage along pennsylvania street main entrance original 1960 american national bank building 111 monument circle separate skywalk across scioto connected circle building adjacent fletcher trust building 10 e. market street later removed bank moved operations formerly located structure new tower fletcher trust building subsequently sold since renovated hilton garden inn hotel banc one corporation later renamed bank one corporation went several additional major acquisitions bought j.p. morgan chase early 2000s upon consummation merger indianapolis structure renamed become known chase tower chase allowed attach name logo top building 2013 building changed owners may 6 2016 salesforce announced plans lease hundreds thousands square feet building start moving employees early 2017 building rebranded salesforce tower indianapolis
[ 7037, 5966 ]
Test
5,967
9
MAPPER:mapper sperry univac 'mapper 4gl originated 1970s based work 1960s kept current renamed also given extension named ice internet commerce enabler originally available sperry univac 1108 implementations also exist windows nt sun solaris linux gui windows advanced mapper maintain prepare p'roduce executive reports since officially renamed bis business information server called mapper fans began internal product first customer santa fe railway started punched card era input 80 columns data printed reports 120 132 columns attempted go beyond modeling filing cabinet typical era written assember language initially limited string manipulation since corrected macro capability also subsequently added bis product still use still job postings
[ 2866, 1743, 6256, 578, 336, 4425 ]
Test
5,968
9
Erik_Naggum:erik naggum erik naggum june 13 1965 – june 17 2009 norwegian computer programmer recognized work fields sgml emacs lisp since early 1990s also provocative participant various usenet discussion groups naggum made significant contributions rfc 1123 defines discusses requirements internet host software rfc 2049 defines electronic information transfer various binary formats e-mail 1999 newspaper article dagbladet interviewed aggressive confrontational participation usenet discussion groups erik later stated motto people little herd animals flocking together whenever world becomes uncomfortable … one people motto would probably herd thither hither premature death age 44 june 17 2009 caused massive bleeding ulcer related ulcerative colitis diagnosed 15 years death naggum chairman sgml sighyper sgml special interest group hypertext multimedia see hytime technical commentary iso 8879:1986 archives comp.text.sgml terms high quality sheer mass especially appreciated long painful history time article naggum describes concept universal time time zones handled well lisp code erik contributed enormous number postings usenet 14,300 record many cases erik used x-no-archive header posting parameter requesting services like google groups archive message 1995 erik started journalism watch-group project web campaigning get journalist sacked aftenposten following publication sensationalist story internet relay chat channels used trade child pornography erik naggum contributed free software project emacs text editor almost decade working group member posix.1-2008 ieee std 1003.1-2008 open group technical standard base specifications issue 7 erik listed major contributor rfc 1123 contributed requirement internet mail include four-digit representation years thus avoid y2k issues erik naggum highly controversial passionate something many subjects eagerly often harshly argued point view example rant xml misdesigned especially misused one example would diatribe martin bryan posted 1992 erik naggum hated perl passion considered perl problem problem solver disliked c++ though much hated perl generally thought c++ difficult understand degree 5 people planet truly understood hence little value humanity erik naggum several times stated stupidity rather lacking willingness individuals acquire knowledge subject argument read people arguments open mind less criminal offense known polemic aggression towards considered ignorant individuals much wrote full sarcasm irony could difficult understand truly believed general exaggerations made make point
[ 3326, 4543, 5983, 144, 2379 ]
Test
5,969
4
Cyber_sovereignty:cyber sovereignty cyber sovereignty phrase used field internet governance describe governments desire exercise control internet within borders including political economic cultural technological activities 2015 book data goliath american security expert bruce schneier says cyber sovereignty movement countries russia china france saudi arabia given enormous boost 2013 revelations widespread international nsa surveillance countries pointed justification activities evidence u.s. hypocrisy internet freedom issues
[ 907, 5509 ]
Test
5,970
3
Sound_Blaster:sound blaster sound blaster family sound cards de facto standard consumer audio ibm pc compatible system platform widespread transition microsoft windows 95 standardized programming interface application level eliminating importance backward compatibility sound blaster evolution pc design led onboard audio electronics commoditized pc audio functionality 1995 sound blaster cards sold 15 million units worldwide accounted seven ten sound card sales creator sound blaster singapore-based firm creative technology limited also known name united states subsidiary creative labs history creative sound cards started release creative music system c/ms ct-1300 board august 1987 contained two philips saa1099 circuits together provided 12 channels square-wave bee-in-a-box stereo sound 4 channels used noise circuits featured earlier various popular electronics magazines around world many years creative tended use off-the-shelf components manufacturers reference designs early products various integrated circuits white black paper stickers fully covering top thus hiding identity c/ms board particular philips chips white pieces paper fantasy cms-301 inscription real creative parts usually consistent ct number references surprisingly board also contained large 40-pin dip integrated circuit bearing ct 1302a ctpl 8708 creative technology programmable logic serigraphed inscription looking exactly like dsp later sound blaster chip allows software automatically detect card certain register reads writes year later 1988 creative marketed c/ms via radio shack name game blaster card identical every way precursor c/ms hardware whereas c/ms package came five floppy disks full utilities song files creative supplied single floppy basic utilities game patches allow sierra online games using sierra creative interpreter engine play music card also included later revision game silpheed added c/ms support 2017 hobbyists developed clone ct1300 pcb sound blaster 1.0 code named killer kard ct1320a released 1989 addition game blaster features 11-voice fm synthesizer using yamaha ym3812 chip also known opl2 provided perfect compatibility market leader adlib sound card gained support pc games preceding year creative used dsp acronym designate digital audio part sound blaster actually stood digital sound processor rather common digital signal processor really simple micro-controller intel mcs-51 family supplied intel matra mhs among others could play back 8-bit monaural sampled sound 23 khz sampling frequency record 8-bit 12 khz sole dsp-like features circuit adpcm decompression primitive non-mpu-401 compatible midi interface adpcm decompression schemes supported 2 1 3 1 4 1 ct1320b variety sound blaster 1.0 typically c/ms chips installed sockets rather soldered pcb though units exist c/ms chips soldered sources note original sound blaster 1.0 produced ct1310 number however topic ongoing debate creative refers ct1310 sound blaster 1.0 website spite limitations less year sound blaster became top-selling expansion card pc achieved providing fully adlib-compatible product additional features often lower price inclusion game port importance early success often forgotten overlooked pcs era include game port game port cards costly around 50 used one expansion slots pcs time given choice adlib card fully compatible sound blaster card came game port saved slot included dsp much price many consumers opted sound blaster in-game support digital portion card happen sound blaster gained dominance microsoft announced multimedia pc mpc november 1990 suggested developers use sound blaster sound card came close complying mpc standard press speculated microsoft based mpc standard sound blaster specifications 1993 computer gaming world wondered would gamer buy competing adlib card sound blaster-compatible creative advertised sound blaster 16 16-bit sound standard slogan get real emphasizing real 100 sound blaster compatibility rhetorically asking manufacturers spend much time comparing sound blaster compute 1989 stated sound blaster ibm-compatible computers taken lead sound music personal computers naming compute choice magazine described quality opening music space quest iii card extraordinary praising quality compared roland mt-32 ad lib versions compute approved card dma creative dissemination technical information concluded more-expensive mt-32 superior sound blaster audio quality better ad lib game blaster released 1990 sound blaster 1.5 ct1320c dropped c/ms chips longer popular game developers instead board two empty sockets could user upgraded purchasing c/ms chips directly creative phillips saa-1099s another source otherwise card functions identically sound blaster 1.0 ct1320u variety layout ct1320c final revision original sound blaster sound blaster 2.0 released october 1991 ct1350 added support auto-init dma assisted producing continuous loop double-buffered sound output similar version 1.0 1.5 used 1-channel 8-bit dac however maximum sampling rate increased 44 khz playback 15 khz record dsp midi uart upgraded full-duplex offered time stamping features yet compatible mpu-401 interface used professional midi equipment sound blaster 2.0 pcb-layout used highly integrated components shrinking board size reducing manufacturing cost owners previous revision sound blaster boards could upgrade board purchasing v2.00 dsp chip creative labs swapping older dsp v1.0x newer replacement upgraded board gained auto-init dma new midi capabilities sound blaster 2.0 expanded sampling rates upgrade necessary full compatibility windows 3.0 multimedia extensions upgrade sound blaster mcv ct5320 version created ibm ps/2 model 50 higher isa-incompatible micro channel architecture bus mcv soundblaster issues outputting audio running ps/2s cpus running faster 16 mhz however joystick interface still inoperable ps/2s designed due slow-speed schottky chips installed none timing issues affect yamaha ym3812 mcv soundblasters released faster schottkys eradicated problems model ct1330 announced may 1991 first significant redesign card core features complied microsoft mpc standard.. sound blaster pro supported faster digital input output sampling rates 22.05 khz stereo 44.1 khz mono added mixer provide crude master volume control independent volume sound sources feeding mixer crude high pass low pass filter sound blaster pro used pair ym3812 chips provide stereo music-synthesis one channel sound blaster pro fully backward compatible original sound blaster line extension adlib sound card sound blaster pro first creative sound card built-in cd-rom interface sound blaster pro cards featured proprietary interface panasonic matsushita mke drive sound blaster pro cards basically 8-bit isa cards use lower 8 data bits isa bus first glance appears 16-bit isa card 'fingers data transfer higher portion bus connector uses 16-bit extension isa bus provide user additional choice irq 10 dma 0 channel found 16-bit portion edge connector short lived joint developed project creative tandy resulted creative/tandy multimedia sound adapter 849-3030 sound blaster pro derived card factory installed tandy multimedia pcs combined ct1330 tandy joystick midi ports mpu-401 compatible revised version sound blaster pro 2 ct1600 replaced ym3812s advanced yamaha ymf262 opl3 otherwise functionally identical original sound blaster pro shortly release sound blaster pro 2 version creative discontinued original sound blaster pro sound blaster pro 2 also sold following on-board cd-rom controllers packaged sound blaster cards initially marketed sold retail-channel creative domination pc audiocard business soon selling sound blaster pro 2 oem ct1680 customers integration pre-assembled pcs creative also sold multimedia upgrade kits containing sound blaster pro kit bundled sound card matsushita cd-rom drive model 531 single-speed 562/3 later double-speed 2x drives several cd-roms multimedia software titles cd-rom technology new kit included cd-rom software representing good value customers one kit named omnicd included 2x matsushita drive along isa controller card software including software toolworks encyclopedia aldus photostyler se compliant mpc level 2 standard sound blaster pro 2 mcv ct5330 version created ibm ps/2 model 50 higher microchannel bus next model sound blaster 16 announced june 1992 introduced sound blaster 16 retained yamaha opl-3 fm synthesis backward compatible programming interface software titles written older sound blasters sound blaster pros would run without modification eventually design proved popular creative made pci version card creative audio revenue grew us 40 million per year nearly us 1 billion following launch sound blaster 16 related products rich sorkin general manager global business time responsible product planning product management marketing oem sales moving card isa bus already approaching obsolescence meant line host-controlled isa dma available pci slot offers line instead card used pci bus mastering transfer data main memory d/a converters since existing dos programs expected able initiate host-controlled isa dma producing sound backward compatibility older sound blaster cards dos programs required software driver work-around since work-around necessarily depended virtual 8086 mode pc cpu order catch reroute accesses isa dma controller card failed number dos games either fully compatible cpu mode needed much free conventional memory could loaded driver occupying part memory microsoft windows problem creative windows driver software could handle isa pci cards correctly sound blaster vibra16 inexpensive single-chip implementation sound blaster 16 oem market creative labs also used chip sound blaster 32 phone blaster phone blaster 28.8 vibra modem ct3120 ct3220 many value-edition cards external yamaha opl3 fm music synthesis retained earlier boards built around vibra16 vibra16s controllers whilst later common vibra16 boards used cqm creative quadratic modulation developed e-mu systems series included vibra16 ct2501 vibra16s ct2502 ct2504 vibra16c ct2505 pnp vibra16xv ct2511 chips primary advantage vibra16 inclusion 14.4 kbit/s telephony modem also functioned telephone released march 1994 sound blaster awe32 advanced waveffects introduced new midi synthesizer section based emu8000 awe32 consisted two distinct audio sections creative digital audio section audio codec optional csp/asp chip socket yamaha opl3 e-mu midi synthesizer section synthesizer section consisted emu8000 sampler effects processor emu8011 1 mb sample rom 512 kb sample ram expandable 28 mb fit new hardware awe32 full-length isa card measuring derivative awe32 design sound blaster 32 sb32 value-oriented offering creative announced june 6 1995 sb32 became new entry-level card awe32 product-line previously held awe32 value sb32 retained awe32 emu8000/emu8011 midi-synthesis engine built-in instrument rom dropped onboard ram wave blaster header csp port sb32 used vibra chip reduce component count meant bass/treble/gain control limited compared awe32 loss onboard ram offset inclusion 30-pin simm ram sockets allow 28 mb ram installed used emu engine awe32 successor sound blaster awe64 november 1996 significantly smaller half-length isa card term misleading — see pictures size comparison offered similar features awe32 also notable improvements including support greater polyphony although product 32 extra software-emulated channels 30-pin simm slots awe32/sb32 replaced proprietary memory format could expensively purchased creative main improvements better compatibility older sb models improved signal-to-noise ratio awe64 came two versions standard version later rebranded value 512kb ram gold version 4 mb ram separate s/pdif output 1998 creative acquired ensoniq corporation manufacturer audiopci card popular oems time full-featured solution wavetable midi sample-based synthesizer 4-speaker directsound3d surround sound a3d emulation dos legacy support via tsr program cheap due lack hardware acceleration full-duplex least ms windows play back several sources creative released many cards using original audiopci chip ensoniq es1370 several boards using revised versions chip es1371 es1373 creative-labeled audiopci chips boards using audiopci tech usually easily identifiable board design chip size look quite similar boards include sound blaster pci64 april 1998 pci128 july 1998 creative ensoniq audiopci vibra pci sound blaster 16 pci es137x chip contains 3 stereo sample rate converters buffers pci busmaster interface analogue interfacing done codec chip runs fixed sampling frequency 44 ensoniq audio pci 48 khz creative versions isa soundcards resampled switched different time bases es137x support soundfonts filter-less midi engine wavetable sample table sets 2 4 8mb size sound blaster live introduced august 1998 use programmable digital signal processor pc-audio unprecedented ibm already done cheap mwave sound- modem-cards turtle beach professional hurricane soundcards live built around creative new emu10k1 chip contained 2.44 million transistors advertised processing flashy 1,000 mips emu10k1 successors use on-card ram/rom storage instrument samples instead used pci busmaster interface access sample-data stored host-pc system memory a/d- d/a- converters well analogue mixing done ac'97 chip running 48 khz sampling rate members sb live family least four-channel analog audio outputs 15-pin midi/joystick multiport game titles eax 1.0 later 2.0 environmental audio extensions briefly competed defunct a3d 2.0 added hardware-accelerated acoustic effects emu10k1 provided high-quality 64-voice sample-based synthesizer a.k.a wavetable self-produced third-party customized patches soundfonts ability resample audio output input apply range real-time dsp effects set audio subchannels present device first model flagship sb/live family sb live gold featuring gold tracings major analog traces external sockets emi-suppressing printed circuit board substrate lacquer gold came standard daughterboard implemented separate 4-channel alternative mini-din digital output creative-branded internal-dac speaker sets s/p-dif digital audio input output separate software mappings fully decoded midi interface separate input output along mini-din converter gold highlighted many features aimed music composition ease-of-use plug-and-play musicians realtime loopback-recording midi-synthesizer full freedom soundfonts environmental effects reverb etc bundled midi-software mainstream model sound blaster live like gold live featured multi-speaker analog output four channels identical music/sound generation capabilities without bundled midi software interfacing-equipment later versions live usually called live 5.1 offered 5.1-channel support adds center channel speaker lfe subwoofer output useful movie watching live 5.1 could also use one 3.5 mm jack ports spdif allowed connection external decoder creative also released soundblaster live player 1024 edition identical regular soundblaster live addition extra software sound blaster pci 512 ct4790 emu10k1-based sound card designed fill lower cost segment live value capable live value features aside limited 512 midi voice polyphony software-based limitation lacking digital i/o removal expansion headers stereo quadraphonic output support card circuit layout somewhat simpler live series sound blaster audigy august 2001 featured audigy processor emu10k2 improved version emu10k1 processor shipped sound blaster live audigy could process four eax environments simultaneously upgraded on-chip dsp native eax 3.0 advanced hd support supported 5.1-channel output audigy controversially advertised 24-bit sound card emu10k2 audio transport dma engine fixed 16-bit sample precision 48 khz like emu10k1 original live audio resampled 48 khz order accepted dsp recording rendering output sound blaster audigy 2 september 2002 featured updated emu10k2 processor sometimes referred emu10k2.5 improved dma engine capable 24-bit precision 192 khz supported stereo playback/record 6.1 capped 96 khz addition audigy 2 supported 6.1 later 7.1 speakers improved signal-to-noise ratio snr audigy 106 vs. 100 decibels also featured built-in dolby digital ex 6.1 7.1 decoding improved dvd play-back audigy 2 line first sound cards receive thx certification sound blaster audigy 2 zs september 2003 essentially audigy 2 updated dac op-amps audigy 2 zs uses cirrus logic cs4382 dac together op-amps produce output snr 108 db slight printed circuit board modifications 7.1 audio support added sound blaster audigy 4 pro november 2004 audigy 2 zs updated dacs adcs new dac cirrus logic cs4398 boosting output snr 113 db breakout box distinguishable difference audigy 2 zs dsp identical audigy 2 zs creative put audigy 4 sticker cover chip making appear new chip audigy 4 pro confused audigy 4 value contains lower quality dacs golden plated jacks audigy 4 value line audigy 2 value series audigy 4 shorter life span predecessors due short window next-generation sound blaster x-fi sound blaster audigy rx september 2013 similar audigy 4 pro dedicated 600-ohm headphone amplifier pcie 1x interface sound blaster audigy fx september 2013 also features 600-ohm amplifier pcie interface lacks emu10k dsp x-fi extreme fidelity released august 2005 came xtremegamer titanium titanium fatal1ty professional titanium fatal1ty champion elite pro configurations 130 nm emu20k1 emu20k2 titanium series models audio chip operates 400 mhz 51 million transistors computational power processor i.e performance estimated 10,000 mips 24 times higher estimated performance predecessor audigy processor beginning 2008 titanium models newer x-fi cards switched pci pci express x1 connectors x-fi active modal architecture ama user choose one three optimization modes gaming entertainment creation enabling combination features chipset x-fi uses eax 5.0 supports 128 3d-positioned voices four effects applied release also included 24-bit crystallizer intended pronounce percussion elements placing emphasis low high pitched parts sound x-fi release offered powerful mixing capabilities available making powerful entry-level card home musicians big improvement x-fi previous audigy designs complete overhaul resampling engine card previous audigy cards dsps locked 48/16 meaning content match resampled card hardware done poorly resulted lot intermodulation distortion many hardcore users worked around means resampling content using high quality software decoders usually form plugin media player creative completely re-wrote resampling method used x-fi dedicated half power dsp process resulting clean resample recon3d series announced september 2011 includes recon3d pcie recon3d fatal1ty professional recon3d fatal1ty champion cards use new integrated sound core3d chip features quartet dsp x-fi series well integrated dac adc i/o interface 56-pin package asia-only recon3d professional audio basically recon3d pcie extra accessories cables recon3d series sound cards support asio recon3d comes bundled software called sbx pro studio sbx pro studio allows users adjust amount virtual surround crystallizer bass smart volume dialog plus recon3d sound cards recon3d also got crystal voice feature reduces pickup background noises like hairdryer vacuum cleaner beamforming microphone used reviews generally positive pricing small model differences raised questions especially low mid priced models recon3d pcie recon3d fatal1ty professional cosmetic differences considerable price difference fatal1ty professional adds beamforming microphone red led lights metal shroud board real hardware improvements sound blaster z-series announced august 2012 includes pci express x1 cards z zx zxr use sound core3d chip previous sound blaster recon3d series z-series improved sound quality recon3d series including dedicated audio hardware op-amps dacs adcs sound blasterx ae-5 announced june 2017 first discrete sound card made creative five years since introduction z-series card first sound blaster series use 32-bit/384 khz sabre 32 ultra dac es9016k2m along custom-designed discrete headphone amplifier 1w output power low output impedance 1 ohm provide high damping factor virtually dynamic headphone card additional rgb lighting courtesy molex power connection accompanying rgb led strip late 2017 white colored model sound card called sound blasterx ae-5 pure edition released 4 rgb led strips instead one standard black model sound blaster ae-7 released july 2019 alongside sound blaster ae-9.it equipped ess sabre 9018 dac features acm audio control module connects sound card via two audio ports available card n't feature rgb lighting contrary ae-5 n't require external power either sound blaster ae-9 announced december 2018 targeting audiophile audience soundcard equipped ess sabre 9038 dac features external audio control module connects sound card mini-hdmi cable containing xlr port microphone toggleable 48 volt phantom power rail sound card features replaceable operational amplifiers sound card external dac consumes 75w thus first sound card creative requires auxiliary power using 6-pin pci-e connector supply power external dac card officially released july 10 2019 celebrate 30 years since introduction original sound blaster sound blasterx series announced gamescom 2015 sound blasterx brand consists usb audio devices gaming headsets gaming mousepads gaming speakers discrete sound card gaming mouse gaming keyboard sound blasterx h3 h5 p5 come blasterx acoustic engine lite software blasterx acoustic engine lite software comes preset audio profiles different game types settings profiles adjustable unlike blasterx acoustic engine pro blasterx acoustic engine lite software available windows pc blasterx acoustic engine pro allows users adjust amount effects save also scout mode voice fx users bind key combinations enable/disable blasterx acoustic engine scout mode voice fx also equalizer tab software users load profiles create profiles equalizer blasterx acoustic engine pro software available windows pc sound blasterx h3 sound blasterx h5 headsets 3.5mm audio jacks sound blasterx p5 earphone inline microphone come audio/mic splitter cable sound blasterx h3 h5 p5 come software called blasterx acoustic engine lite sound blasterx h7 gaming headset usb 3.5mm jack connectivity maximum playback bitrate sample rate 24-bit 96 khz supports 7.1 virtual surround sound blasterx h7 comes blasterx acoustic engine pro software unlike sound blaster e5 built-in microphones rechargeable battery bluetooth connectivity blasterx acoustic engine profiles saved onto device windows used mac computer mac os x software well android ios apps sound blasterx g5 sound blasterx g1 uses blasterx acoustic engine pro software like sound blasterx g5 got 4-pole headphones microphone audio port maximum playback bitrate sample rate 24-bit 96 khz supports 7.1 virtual surround headphones amplifier supports headphones impedances 16 ohms 300 ohms sound blasterx g1 sb-axx1 audio chip able save profiles blasterx acoustic engine device able save profiles x-plus configurator running x-plus mode x-plus configurator software available windows pc profiles x-plus configurator apply equalizer settings tuned certain games sound blasterx g1 support u hear sound blaster cards since 1999 conform microsoft pc 99 standard color-coding external connectors follows awe line 1994 creative cards short text inscriptions backplane card indicating port i.e mic spk aux aux later cards text inscriptions changed icons latest cards creative cards changed use numbers ports flexi-jacks different functions assigned run-time i.e changed speaker output mic color overlay sticker included retail units help consumers identify commonly used functions ports default modes lot audio/data pin connectors jumpers-setting present internal body sound blaster different card card along years productions common pin connector common pin jumper setting especially plug-and-play features drivers audigy 2 zs soft-modded enthusiasts installed creative older cards including sound blaster live audigy audigy 2 claimed offer improved sound quality hardware acceleration higher eax versions games 64-channel mixing audigy 1 overall improvement card performance several forum posts across web reported favorable results technique excepting live users drivers add ability use newer software applications i.e newer mixer applet comments forums developers software mod said live hardware capable eax3 64-channels hardware sound mixing later 2004 creative released updated drivers top-to-bottom audigy audigy 4 line put cards basically feature parity software level 2006 entire audigy lineup uses driver package dsp decoding driver level cards audigy 2 zs 4 still supported official drivers works soft-modded drivers cards hardware dsp like audigy 2 6.1 windows vista released single beta driver creative audigy series usable operating system minimal functionality frequent instability reported users creative forum activist named daniel k. modified drivers x-fi applied audigy live series restoring features came original xp setup cd vista x-fi drivers noticeably better sound quality vista bug fixes newer build last modified version 2.15.0004eq april managed enable x-fi crystallizer work audigy series cards software however patents involved forced remove modified drivers dll patch creative released newer official audigy vista driver 2.18.0000 28 july 2008 due public consumer pressure however form agreement creative daniel k achieved returned creative forums posting updated versions modified drivers released final version modded driver package january 12 2012 recent linux distributions support sound blaster cards via kernel drivers case non-plug-and-play isa cards configuration file /etc/modules must reconfigured writing example sound blaster 16 card installed snd-sb16 isapnp=0 x-fi series cards basic support linux however advanced features like signal routing relay control external i/o consoles supported support newer sound blaster cards z ae series added kernel 4.19-4.20 release timeframe
[ 3760, 4293, 4759, 5637, 3516, 3689, 3274, 2023, 6634, 4879, 1659, 6830, 3319, 7026, 4551, 4277, 6237, 7228, 3755 ]
Test
5,971
0
Johanna_Moore:johanna moore johanna doris moore computational linguist cognitive scientist research publications include contributions natural language generation spoken dialogue systems computational models discourse intelligent tutoring training systems human-computer interaction user modeling knowledge representation received b.s mathematics computer science summa cum laude 1980 m.s computer science 1982 ph.d advisors william swartout gerald estrin 1989 ucla moore held posts ucla 1976–1986 usc information sciences institute 1983–1989 university pittsburgh 1990–1998 since 1998 held chair artificial intelligence within school informatics university edinburgh served director human communication research centre co-director institute language cognition computation 2014-2018 head school informatics succeeded role professor jane hillston moore elected ucla chapter phi beta kappa 1980 held office naval research fellowship 1982 1985 ibm fellow 1985 1987 held national science foundation national young investigator award 1994 1999 chair cognitive science society president association computational linguistics 2004 fellow british computer society 2003 elected fellow royal society edinburgh moore carrying research project june 2015 may 2016 connected digital economy
[ 1314, 1718, 5388, 1243 ]
Validation
5,972
4
Japan_Vulnerability_Notes:japan vulnerability notes japan vulnerability notes jvn japan national vulnerability database maintained japan computer emergency response team coordination center japanese government information-technology promotion agency
[ 1805, 1722 ]
Train
5,973
4
Special_Communications_Service_of_Russia:special communications service russia special communications information service federal protective service russian federation spetssvyaz spetssviaz cryptologic intelligence agency federal protective service russia responsible collection analysis foreign communications foreign signals intelligence well protecting russian government communications information systems involves information security cryptanalysis/cryptography service established march 11 2003 successor fapsi created 8th main directorate government communications 16th directorate electronic intelligence kgb september 25 1991 following august coup soviet president mikhail gorbachev dismantled kgb several independent departments one became committee government communications president soviet union december 24 1991 disbanding soviet union organization became federal agency government communications information president russian federation march 11 2003 agency reorganized service special communications information spetssviaz federal security service fsb august 7 2004 spetssviaz incorporated structural sub unit federal protective service fso service created result reform march 11 2003 basis federal agency government communications information fapsi initially special communication service fso according direction regulations service special communications information federal service russian federation service special communication information special communication russia federal special communication information exercising powers within organization provision service security development improving governmental systems kinds special links information gathering federal government agencies public authorities russian federation state bodies august 7 2004 vladimir putin signed decree federal service russian federation according decree service become part fso 16th centre “ military unit 71330 ” inherited fapsi fsb ’ main structural unit signals intelligence consists central unit housed unmarked administrative buildings many different locations across moscow secluded forest enclosures satellite dishes several metres diameter facing different directions located mainly along russia ’ borders signals intelligence facilities also referred information reception centres direct reference main function 16th centre ’ signals intelligence facilities closest estonia krasnoye selo lenin-grad oblast verbnoye kaliningrad oblast neyolovo pskov oblast last one 25 kilometres estonian border 2003 2010 spetssviaz director yuri korneev director special communications service deputy director russian federal protective service
[ 803, 7754, 3241, 1353, 5509, 7646 ]
Validation
5,974
0
Coh-Metrix:coh-metrix coh-metrix computational tool produces indices linguistic discourse representations text developed arthur c. graesser danielle mcnamara coh-metrix calculates coherence texts many different measures coh-metrix used many different ways investigate cohesion explicit text coherence mental representation text definition cohesion consists characteristics explicit text play role helping reader mentally connect ideas text graesser mcnamara louwerse 2003 definition coherence subject much debate theoretically coherence text defined interaction linguistic representations knowledge representations coherence defined characteristics text i.e. aspects cohesion likely contribute coherence mental representation coh-metrix measurements provide indices cohesion characteristics according empirical study coh-metrix l2 reading index performs significantly better traditional readability formulas
[ 1314 ]
Test
5,975
4
Cyveillance:cyveillance 2015 cyveillance acquired lookingglass cyber solutions following information date december 2015 cyveillance company involved cyber intelligence industry cyveillance uses proprietary technology platform human analysts identify risks early prevention mitigation cyveillance founded 1997 based reston virginia united states company ’ subscription-based product cyveillance intelligence center hosted solution companies hire cyveillance monitor internet risks information leaks phishing malware attacks online fraud schemes sale stolen credit debit card numbers threats executives events counterfeiting trademark brand abuse united states secret service contracts cyveillance search available information related secret service missions information obtained cyveillance incorporated protective research information management system prism surveillance program existing secret service system cyveillance bought may 2009 uk firm qinetiq initial cash consideration 40 million current management also entitled additional 40 million anniversary closing dependent hitting certain performance numbers cyveillance clients include firms financial services energy technology retail pharmaceutical industries cyveillance provides open source internet intelligence 400 clients including half fortune 100 cyveillance founded 1997 brandy thomas christopher young mark bildner jason thomas originally called online monitoring services renamed 1998 cyveillance 1997 2009 cyveillance privately held qinetiq north america provider information technology engineering solutions u.s. government acquired cyveillance may 2009 2013 qinetiq north america expanded cyveillance management team appointment technical marketing executives qinetiq senior management cyveillance management team numerous websites complained cyveillance traffic following reasons 2 july 2014 cyveillance sent dmca takedown notice github behalf qualcomm caused 116 files repositories blocked github blocked repositories owned cyanogenmod sony mobile even one qualcomms repositories leading speculation notices automatically generated poorly checked 5 july 2014 qualcomm retracted takedown notices apologized reviewing files
[ 6874, 4759, 80, 7848 ]
Validation
5,976
7
Melomics109:melomics109 melomics109 computer cluster three cabinets customized front panels located universidad de málaga part spanish supercomputing network designed increase computational power provided iamus powered melomics technology composing module melomics109 able create synthesize music variety musical styles music made freely accessible everyone 0music first album composed interpreted melomics109 launched july 21 name melomics aims freely distributing melomics109 production formats album first one released audio mp3 editable format midi cc0 public domain licensing rest melomics109 production browsed listened downloaded free melomics
[ 5571, 2580, 578 ]
Test
5,977
7
Kaavo:kaavo kaavo cloud computing management company kaavo founded november 2007 u.s. kaavo pioneered top-down application-centric management cloud infrastructure across public private hybrid clouds traditional infrastructure associated management intrinsically ties applications servers servers ip addresses ip addresses switches routers tightly coupled model according experts leaves little room address dynamic nature virtual infrastructure often seen cloud computing models subject matter experts supporting kaavo approach claims cloud applications decoupled servers deployed network infrastructure supports delivers effectively managed unless recognized individual components infrastructure-as-a-service iaas delivers on-demand infrastructure resources however users still need deploy configure applications workloads iaas layer kaavo provides framework automate deployment run-time management production support applications workloads multiple clouds infrastructure-as-a-service layer kaavo claims bottom-up approach traditional data center management tools makes harder manage infrastructure especially dealing scale distributed nature cloud kaavo takes top-down application-centric approach deploying managing applications cloud application-centric cloud management approach systems specific applications managed rather managing servers routers required resources given application managed unified system information deploying managing runtime services levels resources required given application captured top-down single system definition contrast infrastructure-centric bottom-up approach resources servers storage network resources managed individually one key innovations kaavo ability capture deployment run-time management behavior complex application workload single xml document kaavo system definition kaavo published xsd system definition file kaavo imod product uses patented technology based kaavo top-down application-centric management philosophy kaavo uses technology deliver two cloud management products delivered web based product hosted amazon ec2 integrated following public cloud providers amazon ec2 ibm smartcloud logicworks infinicloud rackspace cloud terremark cloud integrated following private cloud platforms cloud.com cloudstack eucalyptus ibm smartcloud openstack vmware vcloud director imod supports multiple cloud providers platforms across application workload service deployments well within single deployment imod also include on-premises physical resources within deployments onsite deployment available enterprise customers within private clouds supports imod saas capabilities api configuring managing applications supported cloud providers platforms kaavo web services use document/literal wrapped style soap compared server-level api provided iaas cloud providers platforms provides higher level abstraction managing systems configuring software web services api allows users deploy applications/workloads across public private hybrid clouds single web services call also provides interface trigger complex workflows response deployment-specific events following registered trademarks kaavo
[ 4295, 2961, 7613 ]
Validation
5,978
4
Tom_Cross_(computer_security):tom cross computer security tom cross also known decius american computer security expert hacker cross born 1976 toronto ontario canada grew tennessee father worked telecommunications policy mother registered nurse assistant attended brentwood high school brentwood tennessee attending georgia tech atlanta receiving bachelor degree computer engineering co-founded efga electronic frontiers georgia 1995 1996 co-founded computer sentry software known award-winning cyberangel software laptop anti-theft program 1999-2000 chief engineer dataway computer security firm san francisco 2000-2001 worked iasiaworks director global security engineering 2001 founded industrial memetics developed popular collaborative blogging community memestreams cross speaker several technology conferences including phreaknic summercon first international hackers conference seoul korea is2k internetworld singapore apricot asia-pacific regional internet conference operational technologies also among attendees first ever def con known extensive rant essays speeches technology policy also co-host episodes binary revolution cryptography expert
[ 8099, 3890, 3486, 1805 ]
Validation
5,979
2
Nokia_N82:nokia n82 nokia n82 high-end smartphone produced nokia announced 14 november 2007 part company nseries line n82 runs symbian os v9.2 s60 3rd edition fp1 n82 inherits much nokia n95 features specifications including gps wi-fi hsdpa major addition xenon flash time n82 called many best camera phone market result sometimes called n95 successor people like n95 nokia n82 critically acclaimed often considered one best symbian devices although sell much available worldwide n82 also perhaps nokia last high-end device candybar form successors opted sliders later touchscreen devices nokia n82 model leaked may 2007 along nokia n81 made official six months later november introduced month nokia n95 8gb latest firmware nokia n82 v35.0.002 released december 2009 n86 8mp 2009 slider considered n82 spiritual successor due high-end camera technology despite lack xenon flash however similar top-of-the-line device candybar form never appeared nokia n82 nokia 6220 classic 2008 second nokia xenon flash n82 includes built-in accelerometer video stabilisation photo orientation keep landscape portrait shots oriented taken automatic 270 degree screen rotation compatible n-gage gaming platform 2.4-inch tft display features 332 mhz processor found n95 n82 almost identical specifications n95 leading called n95 candybar form apart xenon camera flash addition minor technologic differences models 128 mb ram 64 mb n95 8gb variant also 128 mb cif resolution 352x288 front camera qvga 320x240 microusb port rather miniusb removal infrared port first nokia phone xenon flash n82 5-megapixel camera carl zeiss optics considered best camera phone market arrival samsung gt-i8510 discussions head head comparisons two models demonstrate n86 8mp 2009 equipped dual led flash consistently capable outperforming n82 variable lighting primary advantage using led light source video recording whereas xenon flash stronger burst light used recording videos due technical composition mainland china market version n82 different hardware platform wi-fi umts radio removed 3g support different product code rm-314 opposed rm-313 firmware incompatible regular model version readily identified lack wlan scanning display idle screen
[ 1066, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 6440, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6378, 6465, 5062, 3039, 3653, 1582, 4894, 506...
Test
5,980
3
IBM_ThinkPad_380:ibm thinkpad 380 ibm thinkpad 380 notebook computer manufactured 1997 ibm part thinkpad laptop series notable incorporating cd-rom floppy drive considered mid-range laptop ibm time sold well 380 shipped windows 95 capable running windows 3.11 windows nt os/2 warp windows 98 windows red hat linux well various linux distributions originally two models base thinkpad 380 thinkpad 380d equipped cd-rom drive 380 came intel pentium processor running 150 mhz without optional mmx feature 16 mb base ram included base hard drive 1.08 gb size windows 3.11 better operating system choice base model however 32 mb installed could run windows 95 properly models—apart base 380—could run versions windows including windows xp windows xp run smoothly however would need configured least 64 mb ram 2.0 gb hard drive larger
[ 768, 2342, 2472, 5571, 6256, 5669 ]
Test
5,981
3
Xenon_(video_game):xenon video game xenon 1988 vertical scrolling shooter video game first developed bitmap brothers published melbourne house owned mastertronic featured play-by-phone game saturday-morning kids show get fresh xenon followed 1989 according game instruction manual player assumes role darrian future space pilot federation currently war mysterious violent alien species called xenites lasted decade response mayday transmission captain xod following attack trading fleet darrian forced travel xenite occupied territory order support unlike vertically scrolling shooters player craft two modes flying plane ground tank transition crafts initiated almost time play except mid- end-of-level boss sections well certain levels certain mode forced mode chosen depends nature threat player faces destroying enemies released power-ups player could catch enhance ship originally released atari st xenon quickly ported platforms amiga amstrad cpc commodore 64 dos msx zx spectrum arcade machine version game also released mastertronic arcadia division ran commodore amiga hardware xenon almost universally well received launch reviewers magazines covering range platforms scoring game highly german magazine power play bucked trend awarding score 4.5 10
[]
Test
5,982
4
Indicator_of_compromise:indicator compromise indicator compromise ioc computer forensics artifact observed network operating system high confidence indicates computer intrusion typical iocs virus signatures ip addresses md5 hashes malware files urls domain names botnet command control servers iocs identified via process incident response computer forensics used early detection future attack attempts using intrusion detection systems antivirus software initiatives standardize format iocs efficient automated processing known indicators usually exchanged within industry traffic light protocol used
[ 2086, 6488, 5274, 7359, 7585, 5571, 1311, 7836, 3680, 1805 ]
Validation
5,983
9
Perl:perl perl family two high-level general-purpose interpreted dynamic programming languages perl usually refers perl 5 may also refer redesigned sister language perl 6 though perl officially acronym various backronyms use including practical extraction reporting language perl originally developed larry wall 1987 general-purpose unix scripting language make report processing easier since undergone many changes revisions perl 6 began redesign perl 5 2000 eventually evolved separate language languages continue developed independently different development teams liberally borrow ideas one another perl languages borrow features programming languages including c shell script sh awk sed wall also alludes basic lisp introduction learning perl schwartz christiansen provide text processing facilities without arbitrary data-length limits many contemporary unix commandline tools facilitating manipulation text files perl 5 gained widespread popularity late 1990s cgi scripting language part due unsurpassed regular expression string parsing abilities addition cgi perl 5 used system administration network programming finance bioinformatics applications guis nicknamed swiss army chainsaw scripting languages flexibility power also ugliness 1998 also referred duct tape holds internet together reference ubiquitous use glue language perceived inelegance larry wall began work perl 1987 working programmer unisys released version 1.0 comp.sources.misc newsgroup december 18 1987 language expanded rapidly next years perl 2 released 1988 featured better regular expression engine perl 3 released 1989 added support binary data streams originally documentation perl single lengthy man page 1991 programming perl known many perl programmers camel book cover published became de facto reference language time perl version number bumped 4 mark major change language identify version well documented book perl 4 went series maintenance releases culminating perl 4.036 1993 whereupon wall abandoned perl 4 begin work perl 5 initial design perl 5 continued 1994 perl5-porters mailing list established may 1994 coordinate work porting perl 5 different platforms remains primary forum development maintenance porting perl 5 perl 5.000 released october 17 1994 nearly complete rewrite interpreter added many new features language including objects references lexical variables modules importantly modules provided mechanism extending language without modifying interpreter allowed core interpreter stabilize even enabled ordinary perl programmers add new language features perl 5 active development since perl 5.001 released march 13 1995 perl 5.002 released february 29 1996 new prototypes feature allowed module authors make subroutines behaved like perl builtins perl 5.003 released june 25 1996 security release one important events perl 5 history took place outside language proper consequence module support october 26 1995 comprehensive perl archive network cpan established repository perl language perl modules may 2017 carries 185,178 modules 35,190 distributions written 13,071 authors mirrored worldwide 245 locations perl 5.004 released may 15 1997 included among things universal package giving perl base object classes automatically derived ability require versions modules another significant development inclusion cgi.pm module contributed perl popularity cgi scripting language perl 5.004 also added support microsoft windows several operating systems perl 5.005 released july 22 1998 release included several enhancements regex engine new hooks backend codice_1 modules codice_2 regex quote operator large selection new core modules added support several operating systems including beos perl 5.6 released march 22 2000 major changes included 64-bit support unicode string representation support files 2 gib keyword developing perl 5.6 decision made switch versioning scheme one similar open source projects 5.005_63 next version became 5.5.640 plans development versions odd numbers stable versions even numbers 2000 wall put forth call suggestions new version perl community process resulted 361 rfc request comments documents used guiding development perl 6 2001 work began apocalypses perl 6 series documents meant summarize change requests present design next generation perl presented digest rfcs rather formal document point perl 6 existed description language perl 5.8 first released july 18 2002 nearly yearly updates since perl 5.8 improved unicode support added new i/o implementation added new thread implementation improved numeric accuracy added several new modules 2013 version still remains popular version perl used red hat 5 suse 10 solaris 10 hp-ux 11.31 aix 5 2004 work began synopses documents originally summarized apocalypses became specification perl 6 language february 2005 audrey tang began work pugs perl 6 interpreter written haskell first concerted effort towards making perl 6 reality effort stalled 2006 december 18 2007 20th anniversary perl 1.0 perl 5.10.0 released perl 5.10.0 included notable new features brought closer perl 6 included switch statement called given regular expressions updates smart match operator ~~ around time development began earnest another implementation perl 6 known rakudo perl developed tandem parrot virtual machine november 2009 rakudo perl regular monthly releases complete implementation perl 6 major change development process perl 5 occurred perl 5.11 development community switched monthly release cycle development releases yearly schedule stable releases plan bugfix point releases follow stable releases every three months april 12 2010 perl 5.12.0 released notable core enhancements include new codice_3 syntax yada yada operator intended mark placeholder code yet implemented implicit strictures full y2038 compliance regex conversion overloading dtrace support unicode 5.2 january 21 2011 perl 5.12.3 released contains updated modules documentation changes version 5.12.4 released june 20 2011 latest version branch 5.12.5 released november 10 2012 may 14 2011 perl 5.14 released json support built-in 5.14.0 latest version branch 5.14.4 released march 10 2013 may 20 2012 perl 5.16 released notable new features include ability specify given version perl one wishes emulate allowing users upgrade version perl still run old scripts would normally incompatible perl 5.16 also updates core support unicode 6.1 may 18 2013 perl 5.18 released notable new features include new dtrace hooks lexical subs core subs overhaul hash security reasons support unicode 6.2 may 27 2014 perl 5.20 released notable new features include subroutine signatures hash slices/new slice syntax postfix dereferencing experimental unicode 6.3 rand using consistent random number generator observers credit release perl 5.10 start modern perl movement particular phrase describes style development embraces use cpan takes advantage recent developments language rigorous creating high quality code book modern perl may visible standard-bearer idea groups enlightened perl organization taken cause late 2012 2013 several projects alternative implementations perl 5 started perl5 perl6 rakudo perl team moe stevan little friends p2 perl11 team reini urban gperl goccy rperl kickstarter project led braswell affiliated perll11 project ponie acronym perl new internal engine ponie project existed 2003 2006 bridge perl 5 perl 6 effort rewrite perl 5 interpreter run parrot perl 6 virtual machine goal ensure future millions lines perl 5 code thousands companies around world ponie project ended 2006 longer actively developed improvements made perl 5 interpreter part ponie folded project perl originally named pearl wall wanted give language short name positive connotations claims considered every three- four-letter word dictionary also considered naming wife gloria wall discovered existing pearl programming language perl official release changed spelling name referring language name normally capitalized perl proper noun referring interpreter program name often uncapitalized perl unix-like file systems case-sensitive release first edition programming perl common refer language perl randal l. schwartz however capitalized language name book make stand better typeset case distinction subsequently documented canonical name occasionally expanded practical extraction report language backronym expansions suggested equally canonical including wall pathologically eclectic rubbish lister manual page perl indeed wall claims name intended inspire many different expansions programming perl published o'reilly media features picture dromedary camel cover commonly called camel book image camel become unofficial symbol perl well general hacker emblem appearing t-shirts clothing items o'reilly owns image trademark licenses non-commercial use requiring acknowledgement link www.perl.com licensing commercial use decided case case basis o'reilly also provides programming republic perl logos non-commercial sites powered perl buttons site uses perl perl foundation owns alternative symbol onion licenses subsidiaries perl mongers perlmonks perl.org others symbol visual pun pearl onion sebastian riedel creator mojolicious created logo depicting raptor dinosaur available cc-sa license version 4.0 logo remixed used different places symbolising perl 5 analogue raptor comes series talks given matt trout beginning 2010 talks aimed perl 5 community-centric period perl 6 hot topic according wall perl two slogans first one way commonly known tmtowtdi second slogan easy things easy hard things possible overall structure perl derives broadly c. perl procedural nature variables expressions assignment statements brace-delimited blocks control structures subroutines perl also takes features shell programming variables marked leading sigils allow variables interpolated directly strings however unlike shell perl uses sigils accesses variables unlike programming languages use sigils sigil n't denote type variable type expression example access list values hash sigil array used sigil hash perl also many built-in functions provide tools often used shell programming although many tools implemented programs external shell sorting calling operating system facilities perl takes lists lisp hashes associative arrays awk regular expressions sed simplify facilitate many parsing text-handling data-management tasks also shared lisp implicit return last value block fact statements value thus also expressions used larger expressions perl 5 added features support complex data structures first-class functions closures values object-oriented programming model include references packages class-based method dispatch lexically scoped variables along compiler directives example codice_4 pragma major additional feature introduced perl 5 ability package code reusable modules wall later stated whole intent perl 5 module system encourage growth perl culture rather perl core versions perl automatic data-typing automatic memory management interpreter knows type storage requirements every data object program allocates frees storage necessary using reference counting deallocate circular data structures without manual intervention legal type conversions — example conversions number string — done automatically run time illegal type conversions fatal errors design perl understood response three broad trends computer industry falling hardware costs rising labor costs improvements compiler technology many earlier computer languages fortran c aimed make efficient use expensive computer hardware contrast perl designed computer programmers could write programs quickly easily perl many features ease task programmer expense greater cpu memory requirements include automatic memory management dynamic typing strings lists hashes regular expressions introspection codice_5 function perl follows theory built-in limits idea similar zero one infinity rule wall trained linguist design perl much informed linguistic principles examples include huffman coding common constructions short good end-weighting important information come first large collection language primitives perl favors language constructs concise natural humans write even complicate perl interpreter perl syntax reflects idea things different look different example scalars arrays hashes different leading sigils array indices hash keys use different kinds braces strings regular expressions different standard delimiters approach contrasted language lisp basic syntax composed simple universal symbolic expressions used purposes perl enforce particular programming paradigm procedural object-oriented functional others even require programmer choose among broad practical bent perl language community culture surround preface programming perl begins perl language getting job done one consequence perl tidy language includes many features tolerates exceptions rules employs heuristics resolve syntactical ambiguities forgiving nature compiler bugs sometimes hard find perl function documentation remarks variant behavior built-in functions list scalar contexts saying general want unless want consistency written specification standard perl language exists perl versions perl 5 plans create one current version perl one implementation interpreter language evolved along interpreter together functional tests stands de facto specification language perl 6 however started specification several projects aim implement specification perl many varied applications compounded availability many standard third-party modules perl chiefly used write cgi scripts large projects written perl include cpanel slash bugzilla rt twiki movable type high-traffic websites use perl extensively include priceline.com craigslist imdb livejournal duckduckgo slashdot ticketmaster also optional component popular lamp technology stack web development lieu php python perl used extensively system programming language debian gnu/linux distribution perl often used glue language tying together systems interfaces specifically designed interoperate data munging converting processing large amounts data tasks creating reports fact strengths intimately linked combination makes perl popular all-purpose language system administrators particularly short programs often called one-liner programs entered run single command line perl code made portable across windows unix code often used suppliers software cots bespoke simplify packaging maintenance software build- deployment-scripts graphical user interfaces guis may developed using perl example perl/tk wxperl commonly used enable user interaction perl scripts interaction may synchronous asynchronous using callbacks update gui perl implemented core interpreter written c together large collection modules written perl c. interpreter 150,000 lines c code compiles 1 mb executable typical machine architectures alternatively interpreter compiled link library embedded programs nearly 500 modules distribution comprising 200,000 lines perl additional 350,000 lines c code much c code modules consists character encoding tables interpreter object-oriented architecture elements perl language—scalars arrays hashes coderefs file handles—are represented interpreter c structs operations structs defined large collection macros typedefs functions constitute perl c api perl api bewildering uninitiated entry points follow consistent naming scheme provides guidance use life perl interpreter divides broadly compile phase run phase perl phases major stages interpreter life-cycle interpreter goes phase phases follow fixed sequence happens perl compile phase compilation happens perl run phase execution significant exceptions perl makes important use capability execute perl code compile phase perl also delay compilation run phase terms indicate kind processing actually occurring moment compile time run time perl compile time points compile phase compile time may also entered run phase compile time code string argument passed codice_6 built-in occurs run phase perl often run time compile phase spends run phase run time code codice_7 blocks executes run time compile phase compile time interpreter parses perl code syntax tree run time executes program walking tree text parsed syntax tree subject optimization executed execution relatively efficient compile-time optimizations syntax tree include constant folding context propagation peephole optimization also performed perl turing-complete grammar parsing affected run-time code executed compile phase therefore perl parsed straight lex/yacc lexer/parser combination instead interpreter implements lexer coordinates modified gnu bison parser resolve ambiguities language often said perl parse perl meaning perl interpreter codice_8 parse perl language perl even general true perl interpreter simulate turing machine compile phase would need decide halting problem order complete parsing every case long-standing result halting problem undecidable therefore even perl always parse perl perl makes unusual choice giving user access full programming power compile phase cost terms theoretical purity high practical inconvenience seems rare programs undertake parse perl source-code analyzers auto-indenters contend ambiguous syntactic constructs also undecidability perl parsing general case adam kennedy ppi project focused parsing perl code document retaining integrity document instead parsing perl executable code even perl always kennedy first conjectured parsing perl suffers 'halting problem later proved perl distributed 250,000 functional tests core perl language 250,000 functional tests core modules run part normal build process extensively exercise interpreter core modules perl developers rely functional tests ensure changes interpreter introduce software bugs additionally perl users see interpreter passes functional tests system high degree confidence working properly perl dual licensed artistic license 1.0 gnu general public license distributions available operating systems particularly prevalent unix unix-like systems ported modern many obsolete platforms six reported exceptions perl compiled source code posix-compliant otherwise-unix-compatible platforms unusual changes required classic mac os environment special port called macperl shipped independently comprehensive perl archive network carries complete list supported platforms links distributions available cpan also source publicly available perl modules part core perl distribution users microsoft windows typically install one native binary distributions perl win32 commonly strawberry perl activeperl compiling perl source code windows possible installations lack requisite c compiler build tools also makes difficult install modules cpan particularly partially written c. activeperl closed source distribution activestate regular releases track core perl releases distribution also includes perl package manager ppm popular tool installing removing upgrading managing use common perl modules included also perlscript windows script host wsh engine implementing perl language visual perl activestate tool adds perl visual studio .net development suite vbscript perl converter well perl compiler windows converters awk sed perl also produced company included activestate cd windows includes distributions plus komodo ide first unix/linux/posix variant thereof 2002 subsequently strawberry perl open source distribution windows regular quarterly releases since january 2008 including new modules feedback requests come strawberry perl aims able install modules like standard perl distributions platforms including compiling xs modules cygwin emulation layer another way running perl windows cygwin provides unix-like environment windows perl cpan available standard pre-compiled packages cygwin setup program since cygwin also includes gcc compiling perl source also possible perl executable included several windows resource kits directory scripting tools implementations perl come mks toolkit interix base earlier implementations windows services unix uwin perl text-handling capabilities used generating sql queries arrays hashes automatic memory management make easy collect process returned data example tim bunce perl dbi application programming interface api arguments api text sql queries thus possible program multiple languages time e.g. generating web page using html javascript sql document use perl variable interpolation programmatically customize sql queries specification perl arrays hashes structures programmatically hold resulting data sets sql query allows high-level mechanism handling large amounts data post-processing perl subprogram early versions perl database interfaces created relinking interpreter client-side database library sufficiently difficult done most-important widely used databases restricted resulting codice_8 executable using one database interface time perl 5 database interfaces implemented perl dbi modules dbi database interface module presents single database-independent interface perl applications dbd database driver modules handle details accessing 50 different databases dbd drivers ansi sql databases dbi provides caching database handles queries greatly improve performance long-lived execution environments mod perl helping high-volume systems avert load spikes slashdot effect modern perl applications especially written using web frameworks catalyst dbi module often used indirectly via object-relational mappers generate sql queries handle data transparently application author computer language benchmarks game compares performance implementations typical programming problems several programming languages submitted perl implementations typically perform toward high end memory-usage spectrum give varied speed results perl performance benchmarks game typical interpreted languages large perl programs start slowly similar programs compiled languages perl compile source every time runs talk yapc :europe 2005 conference subsequent article timely start jean-louis leroy found perl programs took much longer run expected perl interpreter spent significant time finding modules within over-large include path unlike java python ruby perl experimental support pre-compiling therefore perl programs pay overhead penalty every execution run phase typical programs long enough amortized startup time substantial benchmarks measure short execution times likely skewed due overhead number tools introduced improve situation first tool apache mod perl sought address one most-common reasons small perl programs invoked rapidly cgi web development activeperl via microsoft isapi provides similar performance improvements perl code compiled additional overhead execution phase typically n't present programs written compiled languages c c++ examples overhead include bytecode interpretation reference-counting memory management dynamic type-checking perl interpreted language give problems efficiency critical situations critical routines written languages c connected perl via simple inline modules complex flexible xs mechanism perl 5 language usually referred perl continues actively developed perl 5.12.0 released april 2010 new features influenced design perl 6 followed perl 5.14.1 released june 17 2011 perl 5.16.1 released august 9 2012 perl 5.18.0 released may 18 2013 perl 5 development versions released monthly basis major releases coming per year relative proportion internet searches perl programming compared similar searches programming languages steadily declined 10 2005 2 2011 1 2019 2000 perl conference jon orwant made case major new language-initiative led decision begin work redesign language called perl 6 proposals new language features solicited perl community large submitted 300 rfcs wall spent next years digesting rfcs synthesizing coherent framework perl 6 presented design perl 6 series documents called apocalypses numbered correspond chapters programming perl developing specification perl 6 encapsulated design documents called synopsesnumbered correspond apocalypses thesis work bradley m. kuhn overseen wall considered possible use java virtual machine runtime perl kuhn thesis showed approach problematic 2001 decided perl 6 would run cross-language virtual machine called parrot mean languages targeting parrot gain native access cpan allowing level cross-language development 2005 audrey tang created pugs project implementation perl 6 haskell acted continues act test platform perl 6 language separate development actual implementation allowing language designers explore pugs project spawned active perl/haskell cross-language community centered around freenode perl6 irc channel many functional programming influences absorbed perl 6 design team 2012 perl 6 development centered primarily around two compilers 2013 moarvm “ metamodel runtime ” c language-based virtual machine designed primarily rakudo announced rakudo perl implementation moarvm support virtual machines java virtual machine javascript active development perl culture community developed alongside language usenet first public venue perl introduced course evolution perl community shaped growth broadening internet-based services including introduction world wide web community surrounds perl fact topic wall first state onion talk state onion name wall yearly keynote-style summaries progress perl community characterized hallmark humor employing references perl culture wider hacker culture wall linguistic background sometimes family life occasionally even christian background talk first given various perl conferences eventually also published online number irc channels offer support language modules also many examples code written purely entertainment cpan codice_10 example allows writing programs latin upon execution program module translates source code regular perl runs perl community set aside acme namespace modules fun nature scope widened include exploratory experimental code module meant ever used production acme modules deliberately implemented amusing ways includes codice_11 one first modules codice_12 namespace allows program source code whitened i.e. characters replaced whitespace yet still work older versions perl one would write hello world program complex perl program counts seconds given threshold perl interpreter also used one-off scripts command line following example invoked sh-compatible shell bash translates string bob files ending .txt current directory robert perl referred line noise programmers claim syntax makes write-only language earliest mention first edition book learning perl perl 4 tutorial book written randal l. schwartz first chapter states yes sometimes perl looks like line noise uninitiated seasoned perl programmer looks like checksummed line noise mission life also stated accusation perl write-only language could avoided coding proper care perl overview document perlintro states names built-in magic scalar variables look like punctuation line noise however english module provides long short english alternatives perlstyle document states line noise regular expressions could mitigated using codice_13 modifier add whitespace according perl 6 faq perl 6 designed mitigate usual suspects elicit line noise claim perl 5 critics including removal majority punctuation variables sanitization regex syntax perl 6 faq also states sometimes referred perl line noise actual syntax language gerunds prepositions part english language december 2012 blog posting despite claiming rakudo perl 6 failed continue fail unless gets adult supervision chromatic stated design perl 6 well-defined grammar well improved type system unified object system intelligent metamodel metaoperators clearer system context provides niceties pervasive laziness also stated perl 6 coherence consistency perl 5 lacks
[ 4288, 1445, 4302, 5726, 7166, 5731, 4315, 5742, 7182, 35, 7193, 5760, 4345, 54, 7213, 5782, 5786, 5787, 84, 1524, 7246, 103, 109, 5817, 3005, 1550, 4425, 5846, 7277, 3031, 1582, 4441, 160, 163, 1598, 7308, 5890, 1616, 7333, 7334, 5910, ...
Test
5,984
5
Opera_(web_browser):opera web browser opera web browser microsoft windows android ios macos linux operating systems developed opera software opera software norwegian software company publicly listed nasdaq stock exchange majority ownership control belonging chinese businessman zhou yahui founder beijing kunlun tech specialises mobile games chinese cybersecurity company qihoo 360 opera chromium-based browser using blink layout engine differentiates distinct user interface features opera conceived telenor research project 1994 bought opera software 1995 commercial software first ten years proprietary presto layout engine presto versions opera received many awards presto development ended milestone transition chromium 2013 also three mobile versions called opera mobile opera touch opera mini gaming browser called opera gx launched 11 june 2019 opera began 1994 research project telenor largest norwegian telecommunications company 1995 branched separate company named opera software opera first publicly released 1996 version 2.10 ran microsoft windows attempt capitalize emerging market internet-connected handheld devices project port opera mobile device platforms started 1998 opera 4.0 released 2000 included new cross-platform core facilitated creation editions opera multiple operating systems platforms point opera trialware purchased trial period ended version 5.0 released 2000 saw end requirement instead opera became ad-sponsored displaying advertisements users paid later versions opera gave user choice seeing banner ads targeted text advertisements google version 8.5 released 2005 advertisements completely removed primary financial support browser came revenue google contract opera default search engine among new features introduced version 9.1 released 2006 fraud protection using technology geotrust digital certificate provider phishtank organization tracks known phishing web sites feature improved expanded version 9.5 geotrust replaced netcraft malware protection haute secure added 2006 opera software asa released well internet channel nintendo ds browser nintendo ds wii gaming systems new javascript engine called carakan javanese alphabet introduced version 10.50 according opera software carakan made opera 10.50 seven times faster sunspider opera 10.10 16th december 2010 opera 11 released featuring extensions tab stacking dragging one tab another allows create group tabs visual mouse gestures changes address bar opera 12 released 14 june 2012 12 february 2013 opera software announced would drop presto layout engine favour webkit implemented google chrome browser using code chromium project opera software planned well contribute code webkit 3 april 2013 google announced would fork components webkit form new layout engine known blink day opera software confirmed would follow google implementing blink layout engine 28 may 2013 beta release opera 15 made available first version based chromium project many distinctive opera features previous versions dropped opera mail separated standalone application derived opera 12 november 2016 original norwegian owner opera sold stake business chinese consortium name golden brick capital private equity fund limited partnership 600 million earlier deal approved regulators january 2017 source code opera 12.15 one last versions still based presto layout engine leaked demonstrate radically different browser could look opera neon dubbed concept browser released january 2017 pc world compared demo models automakers hardware vendors release show visions future instead speed dial also explained following chapter features displays frequently accessed websites resemblance desktop computer icons scattered artistic formation opera originated features later adopted web browsers including speed dial pop-up blocking re-opening recently closed pages private browsing tabbed browsing opera includes bookmarks bar download manager opera also speed dial allows user add unlimited number pages shown thumbnail form page displayed new tab opened speed dial allows user easily navigate selected web pages possible control aspects browser using keyboard shortcuts page zooming allows text images content adobe flash player java platform scalable vector graphics increased decreased size help impaired vision opera software claims opera turbo mode enabled compression servers compress requested web pages except https pages 50 depending upon content sending users process reduces amount data transferred particularly useful crowded slow network connections making web pages load faster costs dependent total amount data usage technique also used opera mini mobile devices smartwatches one security feature option delete private data http cookies browsing history items cache passwords click button lets users erase personal data browsing shared computer visiting site opera displays security badge address bar shows details website including security certificates opera fraud malware protection warns suspicious web pages enabled default checks requested page several databases known phishing malware websites called blacklists january 2007 asa dotzler competing mozilla corporation accused opera software downplaying information security vulnerabilities opera fixed december 2006 dotzler claimed users clearly informed security vulnerabilities present previous version opera thus would realize needed upgrade latest version else risk exploited hackers opera software responded accusations next day 2016 free virtual private network vpn service implemented browser opera said would allow encrypted access websites otherwise blocked provide security public wifi networks either vpn turbo enabled july 2018 opera listed nasdaq stock exchange new york city initial offering 12 per share 2018 built-in cryptocurrency wallet opera web browser released announcing would first browser built-in crypto wallet 13 december 2018 released video showing many decentralized applications like cryptokitties running android version opera web browser opera one first browsers support cascading style sheets css opera software uses release cycle consisting three streams correspond phases development downloaded installed independently developer beta stable new features first introduced developer build depending user feedback may progress beta version eventually released developer stream allows early testing new features mainly targeting developers extension creators early adopters opera developer intended everyday browsing unstable prone failure crashing enables advanced users try new features still development without affecting normal installation browser new versions browser released frequently generally times week beta stream formerly known opera next feature complete package allowing stability quality mature final release new version released every couple weeks streams installed alongside official release without interference different icon help user distinguish variants 2005 adobe systems opted integrate opera rendering engine presto adobe creative suite applications opera technology employed adobe golive adobe photoshop adobe dreamweaver components adobe creative suite opera layout engine also found virtual mechanics sitespinner pro internet channel version opera 9 web browser use nintendo wii created opera software nintendo opera software also implemented nintendo ds browser nintendo handheld systems versions presto layout engine positively reviewed although criticized website compatibility issues issue opera 8.01 higher included workarounds help certain popular problematic web sites display properly versions blink layout engine criticized users missing features ui customization abandoning opera software presto layout engine despite versions blink layout engine praised fast stable handling latest web standards better website compatibility modern-style user interface years opera personal computers received several awards awards include related web browsers web browsers essential features
[ 4655, 6802, 5378, 7537, 6808, 6809, 728, 393, 2570, 1847, 3291, 2574, 5399, 6818, 2577, 6452, 6458, 2587, 1864, 6833, 7567, 7925, 3655, 4352, 1496, 3999, 4357, 4725, 768, 1136, 6858, 782, 4014, 84, 1513, 445, 1152, 1525, 4759, 6172, 797...
Validation