node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,085
2
Comparison_of_BSD_operating_systems:comparison bsd operating systems number unix-like operating systems based descended berkeley software distribution bsd series unix variant options three notable descendants current use freebsd openbsd netbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked netbsd 1995 notable derivatives include dragonfly bsd forked freebsd 4.8 apple inc. ios macos darwin base including large amount code derived freebsd current bsd operating systems open source available download free charge bsd license notable exceptions macos ios also generally use monolithic kernel architecture apart macos ios dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp became discontinued tru64 unix parts next software became foundation macos together ios among commercially successful bsd variants general market dragonfly bsd aims inherently easy understand develop multi-processor infrastructures main goal project forked freebsd 4.8 radically change kernel architecture introducing microkernel-like message passing enhance scaling reliability symmetric multiprocessing smp platforms also applicable numa clustered systems long-term goal provide transparent single system image clustered environments dragonfly bsd originally supported ia-32 x86-64 platforms however support ia-32 dropped version 4.0 matthew dillon founder dragonfly bsd believes supporting fewer platforms makes easier project proper ground-up smp implementation freebsd aims make operating system usable purpose intended run wide variety applications easy use contain cutting edge features highly scalable high load network servers freebsd free software project prefers freebsd license however sometimes accept non-disclosure agreements ndas include limited number nonfree hardware abstraction layer hal modules specific device drivers source tree support hardware companies provide purely libre drivers hals program software-defined radios vendors share nonfree algorithms maintain high level quality provide good support production quality commercial off-the-shelf cots workstation server high-end embedded systems freebsd focuses narrow set architectures significant focus development since 2000 fine-grained locking smp scalability 2007 kernel fine-locked scaling improvements started seen recent work includes common criteria security functionality mandatory access control security event audit support derivatives netbsd aims provide freely redistributable operating system professionals hobbyists researchers use manner wish main focus portability use clear distinctions machine-dependent machine-independent code runs wide variety 32-bit 64-bit processor architectures hardware platforms intended interoperate well operating systems netbsd places emphasis correct design well-written code stability efficiency practical close compliance open api protocol standards also aimed june 2008 netbsd foundation moved two-clause bsd license citing changes ucb industry applicability npf project spawned netbsd openbsd security-focused bsd known developers insistence extensive ongoing code auditing security correct functionality secure default philosophy good documentation adherence strictly open source licensing system incorporates numerous security features absent optional versions bsd openbsd policy openness extends hardware documentation drivers since without trust correct operation kernel security vendor software bugs would hard resolve openbsd emphasizes high standards areas security policies include disabling non-essential services sane initial settings integrated cryptography originally made easier due relaxed canadian export laws relative united states full public disclosure security flaws discovered thoroughly auditing code bugs security issues various security features including w^x page protection technology heavy use randomization mitigate attacks coding approaches include emphasis searching similar issues throughout code base code issue identified concerning software freedom openbsd prefers bsd isc license gpl acceptable existing software impractical replace gnu compiler collection ndas never considered acceptable common parent netbsd openbsd strives run wide variety hardware licenses conflict openbsd philosophy openbsd team re-implemented major pieces software scratch often become standard used within versions bsd examples include pf packet filter new privilege separation techniques used safeguard tools tcpdump tmux much openssh codebase replacing gpl licensed tools diff grep pkg-config isc bsd licensed equivalents openbsd prominently notes success security approach website home page two vulnerabilities ever found default install openssh vulnerability found 2002 remote network vulnerability found 2007 period almost 22 years according openbsd expert michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms openbsd spawned numerous child projects openssh openntpd openbgpd opensmtpd pf carp libressl many designed replace restricted alternatives derivatives september 2005 bsd certification group advertising number mailing lists surveyed 4,330 bsd users 3,958 took survey english assess relative popularity various bsd operating systems 77 respondents used freebsd 33 used openbsd 16 used netbsd 2.6 used dragonfly 6.6 used potentially non-bsd systems languages offered brazilian european portuguese german italian polish note control group pre-screening survey takers checked asked specify operating system survey takers permitted select one answer percentages shown graph number survey participants add greater 100 survey taker filled one choice still counted one vote chart another attempt profile worldwide bsd usage *bsdstats project whose primary goal demonstrate hardware vendors penetration bsd viability hardware drivers operating system project collects data monthly bsd system administrators willing participate currently records bsd market share participating freebsd openbsd netbsd dragonflybsd debian gnu/kfreebsd trueos mirbsd systems distrowatch well known linux community often used rough guide free operating system popularity publishes page hits linux distributions operating systems covers 4 september 2016 using data span last six months placed freebsd 21st place 479 hits per day trueos 46th place 244 hits per day ghostbsd 47th place 242 hits openbsd 75th place 163 hits per day midnightbsd 118th place 89 hits per day netbsd 142nd place 66 hits per day names freebsd openbsd references software freedom cost open source netbsd name tribute internet brought original developers together first bsd mascot bsd daemon named common type unix software program daemon freebsd still uses image red cartoon daemon named beastie wielding pitchfork mascot today 2005 competition stylized version beastie head designed drawn anton gural chosen freebsd logo freebsd slogan power serve netbsd flag designed 2004 grant bisset inspired original netbsd logo designed 1994 shawn mueller portraying number bsd daemons raising flag top mound computer equipment based world war ii photograph raising flag iwo jima board directors netbsd foundation believed complicated hard reproduce negative cultural ramifications thus suitable image netbsd corporate world new simpler flag design replaced netbsd slogan course runs netbsd referring operating system portability originally openbsd used bsd daemon mascot sometimes added halo distinguishing mark openbsd later replaced bsd daemon puffy although puffy usually referred pufferfish spikes cartoon images give closer likeness porcupinefish logo reference fish defensive capabilities blowfish cryptography algorithm used openssh openbsd also number slogans including secure default used first openbsd song e-railed free functional secure openbsd released least one original song every release since 3.0 dragonfly bsd logo designed joe angrisano dragonfly named fred number unofficial logos various authors also show dragonfly stylized versions dragonfly bsd considers logical continuation freebsd 4.x series fireflybsd similar logo firefly showing close relationship dragonfly bsd fact fireflybsd website states proceeds sales go development dragonfly bsd suggesting two may fact closely related picobsd slogan little bsd us logo includes version freebsd beastie child showing close connection freebsd minimal amount code needed run live cd number bsd oses use stylized version respective names logos includes macos trueos ghostbsd desktopbsd closedbsd microbsd trueos slogan personal computing served bsd style ghostbsd simple secure bsd served desktop desktopbsd step towards bsd desktop microbsd slogan small secure unix like os miros site collects variety bsd mascots tux linux mascot together illustrating project aim supporting bsd linux kernels miros slogan wonderful operating system world peace
[ 7514, 6794, 2549, 5021, 2912, 738, 3636, 405, 5055, 2583, 2226, 5065, 6477, 424, 7581, 6489, 7588, 5787, 83, 443, 5447, 5450, 788, 4751, 5814, 2294, 481, 2300, 1193, 1572, 6918, 6208, 4441, 4447, 6583, 3764, 2001, 4478, 900, 6984, 908, ...
Test
6,086
3
GnuLinEx:gnulinex gnulinex linex debian-based operating system uses gnome desktop initiative regional government extremadura spain gnulinex intended used schools extremadura well official institutions actively promoted business home use well gnulinex compatible computers based i386 architecture aim project promotion technologically literate information-based society order improve citizens quality life extremadura changed names many programs installed default distribution caused confusion amongst users see virtue helping remember favorite applications spanish instead english names 2004 version includes possibility choosing original icons names applications included gnulinex school linex gnulinex variant oriented toward teachers consists three user profiles profile personalised particular student content software pupil
[ 5200, 1629, 3444, 7251, 2916, 5912, 7528, 642, 474, 7075, 5571, 1941, 578, 314, 2758, 7463, 1663, 2864, 4165, 6209, 7954, 6761, 2063, 343, 4824, 5523, 5259, 1893, 5530, 5704, 6317, 4910, 7587, 2170, 6244 ]
Test
6,087
9
Arc_(programming_language):arc programming language arc programming language dialect language lisp developed paul graham robert morris free open-source software released artistic license 2.0 2001 paul graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects graham startup business incubator named combinator written arc notably hacker news web forum news aggregator program arc written racket essay popular graham describes goals language many goals general arc hackable good libraries give specifics example believes important language terse also stated better language implement small number axioms even means language may features large organizations want object-orientation oo graham thinks oo useful methods patterns good design views language features used implement oo partly mistaken arc introduction 2008 graham stated one benefits brevity controversy among lisp programmers whether much s-expressions language complemented forms syntax graham thinks added syntax used situations pure s-expressions would overly verbose saying n't think religiously opposed introducing syntax lisp graham also thinks efficiency problems solved giving programmer good profiler released 2008 arc generated mixed reactions calling simply extension lisp scheme programming language right others applauded arc stripping lisp bare essentials shortly release arc ported javascript supported schemescript integrated development environment ide based eclipse hello world arc illustrate arc terseness graham uses brief program produces form one field url /said form submitted leads page link says click leads page value original input field first publicly released version arc made available 29 january 2008 implemented racket named plt-scheme release comes form .tar archive containing racket source code arc tutorial discussion forum also available forum uses program hacker news written arc due lack updates official arc branch members arc community started repositories unofficial modifications extensions libraries one version anarki permitted anyone submit changes project community managed wiki rainbow implementation arc java arcadia implementation arc c
[ 7878, 1445, 5019, 1820, 6796, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 6507, 795, 6876, 6888, 1557, 4789, 5494, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 6949, 5883, 1989, 6955, 4837, ...
Test
6,088
6
Del_(command):del command computing codice_1 codice_2 command command-line interpreters shells codice_3 codice_4 4dos ndos 4os2 4nt windows powershell used delete one files directories file system command available various operating systems including dos microware os-9 ibm os/2 microsoft windows reactos analogous unix codice_5 command stratus openvos codice_6 codice_7commands dec rt-11 rsx-11 os/8 openvms also provide codice_8 command contracted codice_1 amigados tsc flex provide codice_8 command well ms-dos command available versions 1 later also available open-source ms-dos emulator dosbox dr-dos supports codice_1 codice_2 well also supports shorthand form codice_13 derived cp/m addition dr-dos command processor also supports codice_14/codice_15 shorthand forms codice_1/codice_13/codice_2 command assumed codice_19 parameter 'query given well theos/oasis flexos provide codice_2 command powershell codice_1 codice_2 predefined command aliases codice_23 cmdlet basically serves purpose
[ 1710, 2811, 3431, 1812, 1254, 4387, 6076, 4759, 190, 2999, 5116, 2834, 5480, 6722, 5571, 4955, 5833, 126, 6907, 6997, 1382, 4423, 3797, 5138, 5234, 7272, 7378, 5942, 6206, 1213, 1866, 6380, 7396, 3664, 861, 7494, 4547, 5784, 1140, 6773, ...
Validation
6,089
3
BTX_(form_factor):btx form factor btx balanced technology extended form factor motherboards originally intended replacement aging atx motherboard form factor late 2004 early 2005 designed alleviate issues arose using newer technologies often demand power create heat motherboards compliant circa 1996 atx specification atx btx standards proposed intel however future development btx retail products intel canceled september 2006 following intel decision refocus low-power cpus suffering scaling thermal issues pentium 4 first company implement btx gateway inc followed dell mpc first generation apple mac pro used elements btx design system well btx-compliant instead using proprietary form factor pico btx motherboard form factor meant miniaturize btx standard pico btx motherboards measure smaller many current micro -sized motherboards hence name pico motherboards share common top half sizes btx line support one two expansion slots designed half-height riser card applications smaller btx sizes include micro btx nano btx heat sink attached cpu called thermal module throughout official specification longer attached solely motherboard casing inertial load mass mechanical shock event longer damage motherboard structural interface heat sink chassis defined 4 mounting holes distances 4.4 × 2.275 55.79 × 111.76 mm one another since attachment means also required certain stiffness called support retention module srm specification first months production atx btx motherboards similar moving btx motherboard atx case possible vice versa possible first btx motherboards atx motherboards turned upside except component location really btx positioning later btx form factor big change turning mirror image atx standard since new motherboard design standards incompatible basically btx motherboards 'leftside-right compared atx upside-down i.e mounted opposite side case computer cases cooler master series stackers released support varying range motherboard standards atx btx mini-atx forth ease motherboard upgrade without buying new case however connector slot standards identical including pci e cards processors ram hard drives etc btx power supply units exchanged newer atx12v units older atx power supplies n't extra 4-pin 12v connector introduced atx12v standard btx form factor widely adopted despite improvements atx related standards result availability variety btx-compatible components limited one reason failure btx gain traction key markets rise energy-efficient components cpus chipsets gpus require less power produce less waste heat eliminating two primary intended benefits btx another reason lack oem adopters initially gateway dell offered computers new format later hp fujitsu-siemens fujitsu also offered btx-based computers manufacturers stayed atx standard even handful manufacturers adopt btx products continued produce bulk machines atx form factor
[ 7212, 1759, 4974, 3015, 7041, 7484, 972, 6478, 2147 ]
Train
6,090
4
Client_Puzzle_Protocol:client puzzle protocol client puzzle protocol cpp computer algorithm use internet communication whose goal make abuse server resources infeasible implementation proof-of-work system pow idea cpp require clients connecting server correctly solve mathematical puzzle establishing connection server attack solving puzzle client would return solution server server would quickly verify reject drop connection puzzle made simple easily solvable requires least minimal amount computation client side legitimate users would experience negligible computational cost abuse would deterred clients try simultaneously establish large number connections would unable computational cost time delay method holds promise fighting types spam well attacks like denial-of-service
[ 3172, 1805 ]
Validation
6,091
9
Hewlett-Packard_Raster_Transfer_Language:hewlett-packard raster transfer language hewlett-packard raster transfer language hp rtl subset printer command language pcl language used embed true raster images bitmaps plotter files modern plotters like hp designjets raster devices need raster-based language backward compatibility also support hp-gl/2 formerly hp-gl vector language hp rtl language designed mixing hp-gl/2 language
[ 3764, 6826, 4780 ]
Test
6,092
8
Yahoo!:yahoo yahoo american web services provider headquartered sunnyvale california owned verizon media original yahoo company founded jerry yang david filo january 1994 incorporated march 2 1995 yahoo one pioneers early internet era 1990s provides provided web portal search engine yahoo search related services including yahoo directory yahoo mail yahoo news yahoo finance yahoo groups yahoo answers advertising online mapping video sharing fantasy sports social media website height one popular sites united states according third-party web analytics providers alexa similarweb yahoo widely read news media website – 7 billion views per month – ranking sixth-most-visited website globally 2016 one largest internet companies yahoo slowly declined starting late 2000s 2017 verizon communications acquired yahoo internet business 4.48 billion ref name= yahoo -inc-jun-2017-sc-to-i/a /ref excluding stakes alibaba group yahoo japan transferred yahoo successor company altaba despite decline prominence yahoo domain websites still one popular ranking 8th world according alexa rankings january 2019 january 1994 yang filo electrical engineering graduate students stanford university created website named jerry david guide world wide web site directory websites organized hierarchy opposed searchable index pages march 1994 jerry david guide world wide web renamed yahoo human-edited yahoo directory provided users surf internet became first product company original purpose yahoo.com domain created january 18 1995 word yahoo backronym yet another hierarchically organized oracle yet another hierarchical officious oracle term hierarchical described yahoo database arranged layers subcategories term oracle intended mean source truth wisdom term officious rather related word normal meaning described many office workers would use yahoo database surfing work however filo yang insist mainly selected name liked slang definition yahoo used college students david filo native louisiana late 1980s early 1990s refer unsophisticated rural southerner rude unsophisticated uncouth meaning derives yahoo race fictional beings gulliver travels yahoo grew rapidly throughout 1990s yahoo went public april 1996 stock price rose 600 percent within two years like many search engines web directories yahoo added web portal putting competition services like excite lycos america online 1998 yahoo popular starting point web users human-edited yahoo directory popular search engine receiving 95 million page views per day triple number compared rival excite also made many high-profile acquisitions yahoo began offering free e-mail october 1997 acquisition rocketmail renamed yahoo mail 1998 yahoo decided replace altavista crawler-based search engine underlying directory inktomi yahoo two biggest acquisitions made 1999 – geocities 3.6 billion broadcast.com 5.7 billion stock price skyrocketed dot-com bubble yahoo stocks closing all-time high 118.75 share january 3 2000 however dot-com bubble burst reached post-bubble low 8.11 september 26 2001 yahoo began using google search 2000 next four years developed search technologies began using 2004 partly using technology 280 million acquisition inktomi 2002 response google gmail yahoo began offer unlimited email storage 2007 company struggled 2008 several large layoffs february 2008 microsoft corporation made unsolicited bid acquire yahoo 44.6 billion yahoo formally rejected bid claiming substantially undervalues company interest shareholders three years later yahoo market capitalization 22.24 billion carol bartz replaced yang ceo january 2009 september 2011 removed position yahoo company chairman roy bostock cfo tim morse named interim ceo company early 2012 appointment scott thompson ceo rumors began spread looming layoffs several key executives left including chief product officer blake irving. ref name= yahoo -inc-apr-2012-10-k/a /ref april 4 2012 yahoo announced cut 2,000 jobs 14 percent 14,100 workers cut expected save around 375 million annually layoffs completed end 2012 email sent employees april 2012 thompson reiterated view customers come first yahoo also completely reorganized company may 13 2012 yahoo issued press release stating thompson longer company would immediately replaced interim basis ross levinsohn recently appointed head yahoo new media group thompson total compensation 130-day tenure yahoo least 7.3 million july 15 2012 marissa mayer appointed president ceo yahoo effective july 17 2012 may 19 2013 yahoo board approved 1.1 billion purchase blogging site tumblr tumblr ceo founder david karp would remain large shareholder announcement reportedly signified changing trend technology industry large corporations like yahoo facebook google acquired start-up internet companies generated low amounts revenue way connect sizeable fast-growing online communities wall street journal stated purchase tumblr would satisfy yahoo need thriving social-networking communications hub may 20 company announced acquisition tumblr officially transaction completed one month company also announced plans open san francisco office july 2013 august 2 2013 yahoo acquired rockmelt staff retained existing products terminated data collated comscore july 2013 revealed people u.s. visited yahoo websites month google occasion first time yahoo outperformed google since 2011 data count mobile usage tumblr december 12 2014 yahoo completed acquisition video advertising provider brightroll 583 million november 21 2014 announced yahoo acquired cooliris fourth quarter 2013 company share price doubled since marissa mayer took president july 2012 however share price peaked 35 november 2013 go 36.04 mid-afternoon december 2 2015 perhaps news board directors meeting decide future mayer whether sell struggling internet business whether continue spinoff stake china alibaba e-commerce site gone well mayer tenure including 1.1 billion acquisition tumblr yet prove beneficial forays original video content led 42 million write-down sydney finkelstein professor dartmouth college tuck school business told washington post sometimes single best thing ... sell company closing price yahoo inc. december 7 2015 34.68 wall street journal douglas macmillan reported february 2 2016 yahoo ceo marissa mayer expected cut 15 workforce july 25 2016 verizon communications announced agreed purchase yahoo core internet business 4.83 billion following conclusion purchase assets merged aol form new entity known oath inc. june 13 2017 yahoo aol huffington post continue operate names oath inc. umbrella deal excludes yahoo 15 stake alibaba group 35.5 stake yahoo japan following completion acquisition assets retained name altaba new executive team september 22 2016 yahoo disclosed data breach occurred late 2014 information associated least 500 million user accounts one largest breaches reported date united states indicted four men including two employees russia federal security service fsb involvement hack december 14 2016 company revealed another separate data breach occurred 2014 hackers obtaining sensitive account information including security questions least one billion accounts company stated hackers utilized stolen internal software forge http cookies response breaches bloomberg news reported verizon attempting re-negotiate deal reduce purchase price 250 million causing 2 increase yahoo stock prices february 21 2017 verizon agreed lower purchase price yahoo 350 million share liabilities regarding investigation data breaches june 8 2017 yahoo shareholders approved company sale internet assets verizon 4.48 billion deal officially closed june 13 2017 press release october 3 2017 oath inc. subsidiary verizon stated yahoo user accounts 3 billion affected august 2013 theft june 16 2017 parts original yahoo inc purchased verizon communications renamed altaba inc. united states securities exchange commission website listed new company non-diversified closed-end management investment company former yahoo inc. ticker symbol yhoo retired favor aaba took place monday june 19 2017 yahoo operated portal provides latest news entertainment sports information portal also gave users access yahoo services like yahoo search yahoo mail yahoo maps yahoo finance yahoo groups yahoo messenger yahoo provided internet communication services yahoo messenger yahoo mail may 2007 e-mail service would offer unlimited storage yahoo provided social networking services user-generated content including products web yahoo personals yahoo 360° delicious flickr yahoo buzz yahoo closed yahoo buzz mybloglog numerous products april 21 2011 yahoo photos closed september 20 2007 favor flickr october 16 2007 yahoo announced would discontinue yahoo 360° including bug repairs company explained 2008 would instead establish universal profile similar yahoo mash experimental system yahoo partners numerous content providers products yahoo sports yahoo finance yahoo music yahoo movies yahoo weather yahoo news yahoo answers yahoo games provide news related content yahoo provides personalization service yahoo enables users combine favorite yahoo features content feeds information onto single page march 31 2008 yahoo launched shine site tailored women seeking online information advice ages 25 54 yahoo developed partnerships broadband providers inc. via prodigy bellsouth sbc verizon communications rogers communications british telecom offering range free premium yahoo content services subscribers yahoo mobile offers services email instant messaging mobile blogging well information services searches alerts services camera phone include entertainment ring tones yahoo introduced internet search system called onesearch mobile phones march 20 2007 results include news headlines images flickr business listings local weather links sites instead showing example popular movies critical reviews onesearch lists local theaters moment playing movie along user ratings news headlines regarding movie zip code city name required onesearch start delivering local search results results web search listed single page prioritized categories 2012 yahoo used novarra mobile content transcoding service onesearch october 8 2010 yahoo announced plans bring video chat mobile phones via yahoo messenger yahoo offers shopping services yahoo shopping yahoo autos yahoo real estate yahoo travel enables users gather relevant information make commercial transactions purchases online yahoo auctions discontinued 2007 except asia yahoo shopping price comparison service uses kelkoo price comparison service acquired april 2004 yahoo search marketing provides services sponsored search local advertising product/travel/directory submit let different businesses advertise products services yahoo network following closure beta version april 30 2010 yahoo publisher network relaunched advertising tool allows online publishers monetize websites use site-relevant advertisements yahoo launched new internet advertisement sales system fourth quarter 2006 called panama allows advertisers bid search terms trigger ads search results pages system considers bids ad quality clickthrough rates factors ranking ads panama yahoo aims provide relevant search results users better overall experience increase monetization april 7 2008 yahoo announced apt yahoo originally called amp yahoo online advertising management platform platform simplifies advertising sales unifying buyer seller markets service launched september 2008 july 2009 yahoo agrees use microsoft exclusive technology provider search services microsoft provide contextual advertising yahoo non-exclusive basis yahoo exclusive worldwide relationship sales force yahoo microsoft premium search advertisers september 2011 yahoo formed ad selling strategic partnership 2 top competitors aol microsoft 2013 found underperforming market share revenue microsoft simply skimmed four percent search market yahoo without growing combined share yahoo next incubation ground future yahoo technologies currently undergoing testing contained forums yahoo users give feedback assist development future yahoo technologies yahoo search boss service allows developers build search applications based yahoo search technology early partners program include hakia me.dium delver daylife yebol early 2011 program switched paid model using cost-per-query model 0.40 0.75 cpm cost per 1000 boss queries price yahoo explained depends whether query web image news information became defunct 2016 replaced yahoo partner ads yahoo meme beta social service similar popular social networking sites twitter jaiku connect enables individuals leave comments online publication boards using yahoo id instead register individual publications wall street journal reported yahoo plans mimic strategy used rival facebook inc. help drive traffic site yahoo invested resources increase improve access internet disabled community yahoo accessibility lab yahoo axis desktop web browser extension mobile browser ios devices created developed yahoo extension made public debut may 23 2012 retired june 28 2013 copy private key used sign official yahoo browser extensions google chrome accidentally leaked first public release chrome extension yahoo searchmonkey often misspelled search monkey yahoo service allowed developers site owners use structured data make yahoo search results useful visually appealing drive relevant traffic sites service shut october 2010 along yahoo services part microsoft yahoo search deal name searchmonkey homage greasemonkey officially product name space two capital letters yahoo searchmonkey selected one top 10 semantic web products 2008 geocities popular web hosting service founded 1995 one first services offer web pages public one point third-most-browsed site world wide web yahoo purchased geocities 1999 ten years later web host closed deleting seven million web pages great deal information lost many sites pages mirrored internet archive oocities.com databases yahoo go java-based phone application access yahoo services closed january 12 2010 yahoo 360° blogging/social networking beta service launched march 2005 yahoo closed july 13 2009 yahoo mash beta another social service closed one year operation prior leaving beta status yahoo photos shut september 20 2007 favor integration flickr yahoo tech website provided product information setup advice users yahoo launched website may 2006 march 11 2010 yahoo closed service redirected users yahoo technology news section discontinued services include farechase web audio search pets live kickstart briefcase yahoo teachers hotjobs acquired merged monster.com yahoo koprol indonesian geo-tagging website allowed users share information locations without use gps device koprol acquired yahoo year following inception 2011 1.5 million people utilizing website users also based singapore philippines vietnam however eighty percent users indonesian yahoo officially discontinued koprol august 28 2012 meaningfully drive revenue engagement yahoo mail classic announced shut april 2013 yahoo made notice starting june 2013 mail classic old versions yahoo mail shut users mail classic expected switch new yahoo mail use imap switch another email service addition april 2013 brought closure upcoming yahoo deals yahoo sms alerts yahoo kids yahoo mail messenger feature phone j2me early july 2013 yahoo announced scheduled closure task management service astrid yahoo acquired company may 2013 discontinue service august 5 2013 team astrid supplied customers data export tool recommended former competitors wunderlist sandglaz december 15 2010 one day yahoo announced layoffs 4 workers across portfolio mybloglog founder eric marcoullier posted slide yahoo employee twitter slide visible employee-only strategy webcast indicating changes yahoo offerings following services column sunset yahoo picks altavista mym alltheweb yahoo bookmarks yahoo buzz del.icio.us mybloglog merge column upcoming foxytunes yahoo events yahoo people search sideline fireeagle 11 properties listed yahoo interested developing feature sites within portal take place sunset merge vacancies including prior feature services new yahoo mail launched yahoo address book calendar notepad despite notepad listed feature service instead sunset merge 2010 yahoo since taken steps de-emphasize notepad example january 2013 notepad longer linked within new yahoo mail service although continued linked older classic version also starting mid- late january 2013 notepad longer searchable blog del.icio.us website released post chris yeh slide leaked yeh stated sunset n't necessarily mean yahoo closing site yeh explained possibilities—including del.icio.us leaving yahoo sale spinoff —were still considered imagine upsetting news coverage past 24 hours many speaking team disappointed way appeared press april 27 2011 yahoo sale del.icio.us avos announced yahoo buzz closed april 21 2011 without official announcement yahoo mybloglog discontinued yahoo may 24 2011 september 2013 yahoo transparency report said company received 29 thousand requests information users governments first six months 2013 12 thousand requests came united states october 2013 washington post reported u.s. national security agency intercepted communications yahoo data centers part program named muscular late january 2014 yahoo announced company blog detected coordinated effort hack possibly millions yahoo mail accounts company prompted users reset passwords elaborate scope possible breach citing ongoing federal investigation august 2015 researchers malwarebytes notified yahoo users getting hacked vulnerabilities flash according vulnerability could allow attackers install ransomware users computers lock files till customers pay criminals working comscore new york times found yahoo able collect far data users competitors web sites advertising network one measure average yahoo potential december 2007 build profile 2,500 records per month visitors yahoo retains search requests period 13 months however response european regulators yahoo obfuscates ip address users three months deleting last eight bits march 29 2012 yahoo announced would introduce track feature summer allowing users opt web-visit tracking customized advertisements however april 30 2014 yahoo announced would longer support track browser setting according 2008 article computerworld yahoo 2-petabyte specially built data warehouse uses analyze behavior half-billion web visitors per month processing 24 billion daily events contrast united states internal revenue service irs database united states taxpayers 150 terabytes september 2016 reported data least 500 million yahoo accounts stolen 2014 october 2016 reuters reported 2015 yahoo created software search customers e-mail request nsa fbi 2000 yahoo taken court france parties seeking prevent french citizens purchasing memorabilia relating nazi party march 2004 yahoo launched paid inclusion program whereby commercial websites guaranteed listings yahoo search engine yahoo discontinued program end 2009 yahoo criticized providing ads via yahoo ad network companies display spyware adware yahoo well search engines cooperated chinese government censoring search results april 2005 dissident shi tao sentenced 10 years prison providing state secrets foreign entities result identified ip address yahoo human rights organizations company general counsel disputed extent yahoo foreknowledge shi fate human rights groups also accuse yahoo aiding authorities arrest dissidents li zhi jiang lijun april 2017 yahoo sued failing uphold settlement agreements case yahoo pledged give support families arrested create relief fund persecuted expressing views online yahoo human rights trust 17.3 million allotted fund 13 million used townhouse washington dc purchases september 2003 dissident wang xiaoning convicted charges incitement subvert state power sentenced ten years prison yahoo hong kong connected wang group specific yahoo e-mail address xiaoning wife world organization human rights sued yahoo human rights laws behalf wang shi result media scrutiny relating internet child predators lack significant ad revenues yahoo user created chatrooms closed june 2005 may 25 2006 yahoo image search criticized bringing sexually explicit images even safesearch active august 2015 yahoo purchased 40 23 september 2013 owner alibaba group subject controversy allowing sale shark-derived products company banned sale shark fin products e-commerce platforms effective january 1 2009 november 30 2009 yahoo criticized electronic frontier foundation sending dmca notice whistle-blower website cryptome publicly posting details prices procedures obtaining private information pertaining yahoo subscribers concerns censorship private emails regarding website affiliated occupy wall street protests raised yahoo responded apology explained accident following media reports prism nsa massive electronic surveillance program june 2013 several technology companies identified participants including yahoo yahoo listed paradise papers set confidential electronic documents relating offshore investment leaked german newspaper süddeutsche zeitung scott ard prominent editorial director fired yahoo 2015 filed lawsuit accusing mayer leading sexist campaign purge male employees ard male employee stated mayer encouraged fostered use employee performance-rating system accommodate management subjective biases personal opinions detriment yahoo male employees suit ard claimed prior firing received fully satisfactory performance reviews since starting company 2011 head editorial programming yahoo home page however relieved role given woman recently hired megan lieberman editor-in-chief yahoo news lawsuit states liberman stated terminating ard received requested breakdown duties ard already provided information requested however reminded liberman done liberman excuse terminating ard pretext second sexual discrimination lawsuit filed separately gregory anderson fired 2014 alleging company performance management system arbitrary unfair making second sexism lawsuit yahoo mayer faced 2016 former chief operating officer henrique de castro departed company january 2014 mayer initially hired appointment ceo dismissed de castro previously worked google mckinsey company employed revive yahoo advertising business yahoo offers multi-lingual interface site available 20 languages official directory yahoo international sites world.yahoo.com company international sites wholly owned yahoo exception japan china sites yahoo holds 34.75 minority stake yahoo japan softbank holds 35.45 yahoo xtra new zealand yahoo 7 51 49 belongs telecom new zealand yahoo 7 australia 50–50 agreement yahoo seven network historically yahoo entered joint venture agreements softbank major european sites uk france germany well south korea japan november 2005 yahoo purchased minority interests softbank owned europe korea yahoo used hold 40 stake 35 voting power alibaba manages web portal china using yahoo brand name yahoo china yahoo usa direct control alibaba operates completely independent company september 18 2012 following years negotiations yahoo agreed sell 20 stake back alibaba 7.6 billion march 8 2011 yahoo launched romania local service years delay due financial crisis yahoo officially entered mena region acquired maktoob pan-regional arabic-language hosting social services online portal august 25 2009 since service pan-regional yahoo officially became yahoo maktoob region december 31 2012 yahoo korea shut services left country previous domain saying korean starting december 31 2012 yahoo korea ended go original yahoo yahoo information sooner message also disappear leaving abandoned empty search bar powered bing september 2 2013 yahoo china shut redirected taobao.com redirected yahoo singapore search page yahoo got first logo establishment 1994—it consists yahoo wordmark coloured black using times new roman font later changed march 1995 company changed name yahoo introduced another logo briefly changed elaborate text includes exclamation point end short-lived 5 months later august 1995 year yahoo changed logo became stylized yellow jumping figurine blue circle yahoo wordmark written logo also short-lived 4 months december 1995 january 1 1996 yahoo introduced much tweaking refining new logo quickly simplified text exclamation mark slight shadow behind text although gets coloured red also containing three icons side well becomes simple wordmark without graphics therefore create familiar logo existence since eventually logo used yahoo home page formerly consists red color black outline shadow june 2002 later becoming slightly changed new black shadows text replaces older gray color except gets introduced yahoo japan within following year gets still used today slight moderation 2013 see may 2009 yahoo overhauled theme redesign makes logo become recoloured purple without outline shadow purple logo first appeared headquarters yahoo messenger 1995 although get full effect november 12 2009 site received revamp entirely remove old red color 1996 change would apply several international yahoo home pages countries notably yahoo 7 australia still using red logo 2014 time purple logo comes new slogan ou used time occasion would time abbreviated august 7 2013 around midnight edt yahoo announced final version new logo would revealed september 5 2013 4:00 a.m. utc period leading unveiling new logo 30 days change campaign introduced whereby variation logo published every day 30 days following announcement new logo eventually launched accompanying video showed digital construction mayer published personalized description design process tumblr page mayer explains one weekend summer rolled sleeves dove trenches logo design team ... spent majority saturday sunday designing logo start finish ton fun weighing every minute detail knew wanted logo reflected yahoo – whimsical yet sophisticated modern fresh nod history human touch personal proud september 19 2013 yahoo launched new version yahoo personalized homepage redesign allows users tailor homepage widgets access features email accounts calendars flickr yahoo content internet content users also select theme packs represent artists polly apfelbaum alec monopoly bands empire sun mayer explained conference late september 2013 logo change result feedback external parties employees
[ 6788, 1072, 1445, 3263, 7164, 6092, 4692, 5401, 5757, 5408, 1123, 4357, 2604, 2247, 3671, 80, 2973, 84, 4377, 6506, 803, 5119, 5131, 4783, 3379, 1566, 3719, 501, 2327, 518, 1227, 6227, 3060, 168, 3068, 4102, 7699, 2366, 4851, 6259, 1264...
Test
6,093
7
Insteon:insteon insteon home automation domotics technology enables light switches lights thermostats leak sensors remote controls motion sensors electrically powered devices interoperate power lines radio frequency rf communications employs dual-mesh networking topology devices peers device independently transmits receives repeats messages like home automation systems associated internet things insteon-based products launched 2005 smartlabs company holds trademark insteon smartlabs subsidiary also named insteon created market technology according press release june 13 2017 smartlabs insteon technology acquired richmond capital partners rob lilleness universal electronics assuming role chairman ceo every message received insteon compatible device undergoes error detection correction retransmitted improve reliability devices retransmit message simultaneously message transmissions synchronous powerline frequency thus preserving integrity message strengthening signal powerline erasing rf dead zones insteon powerline messaging uses phase-shift keying insteon rf messaging uses frequency-shift keying message contains two-bit hops field initialized 3 originating node decremented time node network repeats message individual insteon messages also carry 14 bytes arbitrary user data custom applications insteon integrated dual-mesh formerly referred dual-band network combines wireless radio frequency rf building existing electrical wiring electrical wiring becomes backup transmission medium event rf/wireless interference conversely rf/wireless becomes backup transmission medium event powerline interference peer-to-peer network devices require network supervision thus allowing optional operation without central controllers routing tables insteon devices function without central controller additionally may managed central controller implement functions control via smartphones tablets control scheduling event handling problem reporting via email text messaging computer used central controller connecting insteon usb/serial powerlinc modem serves communication bridge computer insteon device network insteon network security maintained via linking control ensure users create links would allow control neighbors ’ insteon devices via encryption within extended insteon messages applications door locks security applications applications choose implement encryption insteon enforces linking control requiring users physical possession devices knowledge unique insteon ids order create links firmware insteon devices prohibits identifying devices unless user either physically presses button device installation process explicitly addresses device via central controller linking device sending insteon messages e.g. central controller requires knowledge address target insteon device addresses unique device assigned factory displayed printed label attached device users must physical access device read device address label manually enter prompted installation security insteon rf devices criticized def con presentation 2015 insteon devices configured applying sequence taps button presses pushbutton device establish direct device-to-device links alternatively central controller may used configure devices insteon device unique identifier code similar mac address technology allows directly linked devices manage identifiers older insteon chip sets manufactured smartlabs transmit receive respond repeat x10 power line messages thus enabling x10 networks interoperate insteon 2014 insteon released home automation system compatible touch-enabled metro interface devices appearing live tiles later added voice control via microsoft cortana 2015 voice control added via compatibility amazon echo year logitech announced harmony hub-based remote would support insteon devices deployed insteon hub also 2015 insteon announced initiative integrate google-owned nest learning thermostat insteon hub insteon one two launch partners apple homekit platform homekit-enabled insteon hub pro 2015 insteon announced support apple watch allowing watch owners control home insteon hub insteon second generation i2/rf replaces first generation i1/rf wireless insteon communications i1/rf i2/rf uses different frequencies operate independently currently one legacy product implements i1/rf signalinc rf signal enhances introduced may 2005 specifications i2/rf
[ 6025, 7876, 6987, 4214, 6580, 2300, 5181, 7119 ]
Test
6,094
2
Mainframe_sort_merge:mainframe sort merge sort/merge utility mainframe program sort records file specified order merge pre-sorted files sorted file copy selected records internally utilities use one standard sorting algorithms often proprietary fine-tuned code mainframes originally supplied limited main memory today standards amount data sorted frequently large unlike recent sort programs early sort/merge programs placed great emphasis efficient techniques sorting data secondary storage typically tape disk 1968 os/360 sort/merge program provided five different sequence distribution techniques could used depending number type devices available 1990 ibm introduced new merge algorithm called blockset dfsort successor os/360 sort/merge historical note blockset algorithm invented ibm systems engineer 1963 discovered ibm archives implemented 1990 sort/merge frequently used often commonly used application program mainframe shop generally consuming twenty percent processing power shop modern sort/merge programs also copy files select omit certain records summarize records remove duplicates reformat records append new data produce reports indeed sort/merge applications use wide range additional processing capabilities rather purely sorting merging records sort/merge product fast way performing input output functions quite number user exits supported may load modules i.e. member library object decks i.e. output assembler sort/merge application loading load modules linking object decks termed dynamic link editing dfsort exit specified required working storage datasets i.e. sortwk01 ... sortwknn may disk tape although blockset algorithm restricted disk working storage working storage datasets generally improves performance sort/merge important enough multiple companies selling sort/merge package ibm mainframes z/os z/vm z/vse operating systems major sort/merge packages companies also sell versions platforms unix linux windows historically alias sort used refer ibm sort/merge third party sort/merge programs i.e. syncsort casort also adopted sort alias product dfsort often referred program name iceman component ice original os/360 sort/merge program name ierrco00 component ier also alias sort
[ 1254, 4759, 5396, 578, 6957, 1994 ]
Validation
6,095
9
Model-Glue:model-glue model-glue oo web framework based mvc design pattern goal simplify development oo coldfusion applications released apache software license 2.0 asl2.0 model-glue
[ 2451, 5983, 2456, 1445, 6701, 1819, 6704, 103, 6428, 7347, 3186, 2740, 3368, 5575, 486, 6191, 5490, 2752, 3543, 6362, 6029, 933, 417, 54, 2870, 4535, 5965, 6061, 2619 ]
Validation
6,096
2
Calendar_(Windows):calendar windows calendar personal calendar application made microsoft microsoft windows offers synchronization calendars using microsoft exchange server outlook.com apple icloud calendar service google calendar supports popular icalendar format microsoft first included calendar application shortened app windows 1.0 included windows 3.1 replaced schedule+ windows workgroups windows nt 3.1 schedule+ later moved windows microsoft office suite windows include another calendar application windows calendar windows vista calendar created beta 2 windows vista version supports sharing subscribing publishing calendars webdav-enabled web servers network shares always supported .ics files subscription feature enables syncing google calendar interface matches windows vista mail two apps connected operating system default calendar renamed new version calendar text-heavy added windows 8 one many apps written run full-screen snapped part microsoft metro design language philosophy one three apps windows originate microsoft outlook two mail people apps structurally three apps one installed uninstalled user interface calendar windows 8 originally supported outlook.com exchange google calendar facebook calendars api changes facebook google calendars longer directly synced windows 8 like many microsoft apps introduced windows 8 many features hidden charms menu bottom screen triggered right clicking different calendars labeled different colors user microsoft account adds calendar account one computer windows 8 calendar account automatically added windows 8 computers user logged .ics files supported version mail preset server configurations outlook.com exchange google calendar icloud calendar users set use system theme choose custom accent color background image light/dark preference windows 10 calendar multi-window support viewing editing events different calendars labeled different colors events rearranged dragging dropping default interface month view users also use day week year views print views windows 10 app also uses flyout settings panel mini ribbon interface viewing pane day year calendar events show live tile like vista version important controls readily visible use icons match system accounts grouped relabeled folders edited within app .ics support added version time windows 10 anniversary update
[ 7879, 3937, 3263, 7887, 378, 2198, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 6136, 2245, 5781, 435, 5442, 4377, 5090, 3340, 447, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, ...
Test
6,097
5
High_Frequency_Internet_Protocol:high frequency internet protocol high frequency internet protocol hfip hf-ip usually associated automatic link establishment hf radio data communications hfip provides protocol layers enabling internet file transfer chat web email hfip commonly uses ionospheric propagation radio waves form wide area network span thousands kilometers hf transceivers hfip service typically run 20 150 watts portable mobile units approximately 2000 watts transmitter output high power base stations hfip servers stanag 5066 common hfip standard amateur radio hfip network called hflink uses automatic link establishment initiating data communications arq 8fsk frequency-shift keying psk phase-shift keying signals
[ 1952, 84 ]
Validation
6,098
1
Database_activity_monitoring:database activity monitoring database activity monitoring dam a.k.a enterprise database auditing real-time protection database security technology monitoring analyzing database activity operates independently database management system dbms rely form native dbms-resident auditing native logs trace transaction logs dam typically performed continuously real-time database activity monitoring prevention damp extension dam goes beyond monitoring alerting also block unauthorized activities dam helps businesses address regulatory compliance mandates like payment card industry data security standard pci dss health insurance portability accountability act hipaa sarbanes-oxley act sox u.s. government regulations nist 800-53 eu regulations dam also important technology protecting sensitive databases external attacks cybercriminals according 2009 verizon business ’ data breach investigations report—based data analyzed verizon business ’ caseload 90 confirmed breaches involving 285 million compromised records 2008—75 percent breached records came compromised database servers according gartner “ dam provides privileged user application access monitoring independent native database logging audit functions function compensating control privileged user separation-of-duties issues monitoring administrator activity technology also improves database security detecting unusual database read update activity application layer database event aggregation correlation reporting provide database audit capability without need enable native database audit functions become resource-intensive level auditing increased ” according survey independent oracle user group ioug “ organizations mechanisms place prevent database administrators privileged database users reading tampering sensitive information financial hr business applications still unable even detect breaches incidents. ” forrester refers category “ database auditing real-time protection ” privileged user monitoring monitoring privileged users superusers database administrators dbas systems administrators sysadmins developers help desk outsourced personnel – typically unfettered access corporate databases – essential protecting external internal threats privileged user monitoring includes auditing activities transactions identifying anomalous activities viewing sensitive data creating new accounts superuser privileges reconciling observed activities adding deleting tables authorized change requests since organizations already protected perimeter level indeed major concern lies need monitor protect privileged users high correlation therefore database security need protect insider threat complex task privileged users capable using sophisticated techniques attack database stored procedures triggers views obfuscated traffic attacks may difficult detect using traditional methods addition since targeted attacks frequently result attackers gaining privileged user credentials monitoring privileged activities also effective way identify compromised systems result auditors demanding monitoring privileged users security best practices well wide range regulations privileged user monitoring helps ensure • data privacy authorized applications users viewing sensitive data • data governance critical database structures values changed outside corporate change control procedures application activity monitoring primary purpose application activity monitoring provide greater level end-user accountability detect fraud abuses legitimate access occurs via enterprise applications rather via direct access database multi-tier enterprise applications oracle ebs peoplesoft jd edwards sap siebel systems business intelligence custom applications built standard middle-tier servers ibm websphere oracle weblogic server mask identity end-users database transaction level done optimization mechanism known “ connection pooling. ” using pooled connections application aggregates user traffic within database connections identified generic service account name application activity monitoring allows organizations associate specific database transactions particular application end-users order identify unauthorized suspicious activities end-user accountability often required data governance requirements sarbanes–oxley act new auditor guidance public company accounting oversight board sox compliance also increased emphasis anti-fraud controls cyberattack protection sql injection type attack used exploit bad coding practices applications use relational databases attacker uses application send sql statement composed application statement concatenated additional statement attacker introduces many application developers compose sql statements concatenating strings use prepared statement case application susceptible sql injection attack technique transforms application sql statement innocent sql call malicious call cause unauthorized access deletion data theft information one way dam prevent sql injection monitoring application activity generating baseline “ normal behavior ” identifying attack based divergence normal sql structures normal sequences alternative approaches monitor memory database database execution plan context sql statements visible based policy provide granular protection object level defined gartner “ dam tools use several data collection mechanisms server-based agent software in-line out-of-band network collectors aggregate data central location analysis report based behaviors violate security policies and/or signatures indicate behavioral anomalies dam demand driven primarily need privileged user monitoring address compliance-related audit findings threat-management requirements monitor database access enterprise dam requirements beginning broaden extending beyond basic functions capability detect malicious activity inappropriate unapproved database administrator dba access. ” advanced dam functions include enterprises also seeking functions including interception-based modern dam systems collect database able “ see ” communications database client database server dam systems find places view communication stream get requests responses without requiring participation database interception done multiple points database memory e.g sga network using network tap span port communication encrypted operating system level level database libraries unencrypted network traffic packet sniffing used advantage processing done host however main disadvantage local traffic sophisticated intra-database attacks detected capture local access network based vendors deploy probe runs host probe intercepts local access also intercept networked access case want use network gear case database communications encrypted however since agent processing — instead relays data dam appliance processing occurs — may impact network performance local traffic real-time session termination may slow interrupt unauthorized queries memory-based dam systems lightweight sensor attaches protected databases continuously polls system global area sga collect sql statements performed similar architecture previously used performance optimization products also used sga shared data structures latest versions technology lightweight sensor runs host attaches process os level inspect private data structures advantages approach significant log-based dam systems analyze extract information transaction logs e.g. redo logs systems use fact much data stored within redo logs scrape logs unfortunately information required redo logs example select statements systems augment data gather redo logs data collect native audit trails shown figure 3 systems hybrid true dam system fully independent dbms siem relies data generated database architectures usually imply overhead database server
[ 1905, 623, 6604, 7330, 7341, 5908, 6345, 5561, 906, 5217, 5571, 4054, 6636, 2663, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 2054, 6932, 6386, 684, 6390, 7937, 7303, 6144, 4457, 6320, 1902, 6594 ]
Test
6,099
1
Disclosure_and_Barring_Service:disclosure barring service disclosure barring service dbs non-departmental public body home office united kingdom dbs enables organisations public private voluntary sectors make safer recruitment decisions identifying candidates may unsuitable certain work especially involving children vulnerable adults provides wider access criminal record information disclosure service england wales dbs formed 2012 merging functions criminal records bureau crb independent safeguarding authority isa protection freedoms act 2012 dbs started operating 1 december 2012 operates liverpool royal wootton bassett equivalent agencies disclosure scotland scotland access northern ireland northern ireland legal requirement uk regulated activity employers notify dbs person leaves changes job relation harmed someone offence person barred dbs work apply work group children adults barred also offence employer knowingly employ barred person regulated activity group barred organisation entitled ask exempted questions rehabilitation offenders act 1974 must register dbs registered dbs umbrella body request dbs check applicant applicant applies dbs application countersigned dbs registered organisation umbrella body applicant criminal record accessed police national computer pnc well checked appropriate lists people considered unsuitable work children vulnerable people maintained dbs formerly maintained independent safeguarding authority copy completed certificate sent applicant home address individual organisation safeguarding concerns regarding member staff make safeguarding referral dbs work multiple agencies assess whether individual barred working regulated activity children and/or vulnerable groups criminal records bureau established part v police act 1997 launched march 2002 following public concern safety children young people vulnerable adults found british police forces adequate capability resources routinely process fulfil large number criminal record checks requested timely fashion dedicated agency set administer function employers temporary staff agencies bemoaned time takes worker cleared dbs effort cut waiting times government allowed establishment adult first may 2002 department education began maintaining list individuals suitable work children list originally named list 99 later named isa children barred list maintained independent safeguarding authority finally dbs children barred list maintained disclosure barring service care standards act 2000 department health introduced adult version list 99 named 'pova first 26 july 2004 later renamed 'isa adult first finally 'dbs adult first adult first list 99 services allow registered bodies eligible check whether applicant appears dbs adults children barred list online checking system takes around two working days turn around check clean organisation may provisionally employ applicant subject increased level supervision return post full disclosure 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings 1 february 2018 national audit office published investigation report highly critical dbs 2009 home office launched programme increase efficiency safeguarding services key aims programme reduce cost running disclosure service customers using new cheaper update service rather continuing use existing types disclosure certificates home office expected 2.8 million paying users using new update service 2017–18 market tested actual number users around one million according national audit office investigation modernisation programme running three half years late expected costs increased £229 million dbs currently negotiating contractor tata consultancy services delays modernisation programme update service expected increase ease frequency people checked thereby improving safeguarding home office dbs know many people prevented working children vulnerable adults use information process dbs provides criminal record data called dbs certificate dbs check previously crb check four levels dbs checks basic standard enhanced enhanced barred list checks basic disclosures see disclosure scotland dbs checks obtained members public directly available organisations professions offices employments work occupations listed exceptions order 1975 rehabilitation offenders act 1974 amended protection freedoms act 2012 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings fee £13 year applicants may use certificate within sector disclosure level workforce details barring list checks volunteer status employer consent run dbs update check check existing certificate date check applicant identity certificate authenticity january 2018 basic dbs checks introduced disclose details cautions convictions deemend unspent rehabilitation offenders act 1974 basic dbs check disclose cautions reprimands warnings convictions deemed unspent according rehabilitation offenders act 1974 service provided dbs england wales disclosure scotland applicants scotland applications also done online employer reference dbs check could taken requirement standard enhanced check meant disclosure cautions convictions even spent however introduction basic check employers specify check required advertising job aim service reduce need unnecessary ineligible standard enhanced checks apply one responsible organisations list organisations websites apply check standard dbs check primarily positions high responsibility example accountancy security standard certificates reveal details convictions cautions reprimands warnings applicant received qualify filtering standard check may applied applicant job role specified police act 1997 amended protection freedoms act 2012 enhanced dbs checks positions involving certain activities teaching children treating adults also obtained certain professions example judicial appointments rspca officers enhanced check may applied applicant job role specified rehabilitation offenders act 1974 exception order 1975 police act 1997 addition information provided standard certificate enhanced certificate involves additional check police check information held file may relevant instance information led criminal conviction may indicate danger vulnerable groups police decide additional information added certificate using quality assurance framework involvement local police forces mean enhanced check may take significantly longer standard check completed includes enhanced certificate plus check appropriate dbs barred list two dbs barred lists one adults one children lists contain information whether applicant barred working either two groups individual may checked one barred lists job role classified regulated activity children and/or adults safeguarding vulnerable groups act 2006 roles might barred include work within outside people homes areas postal work would access personal documents dbs began filter certain criminal information dbs certificate met guidelines laid rehabilitation offenders act 1974 exceptions order 1975 amendment england wales order 2013 dbs work number standards criminal record checking service barring case accuracy performance service standards also agreed dbs police disclosure units crb due partner isa administering newly created vetting barring scheme 2009 suspended 2010 pending review following 2010 general election review published february 2011 making recommendations merger criminal records bureau independent safeguarding authority one new non-departmental public body disclosure barring service responsible barring individuals completing criminal record checks protection freedoms act 2012 dbs require registration details retained database procedures crb tightened following soham murders trial ian huntley former caretaker found guilty murdering two girls cambridgeshire primary school 2002 huntley suspected string offences including rape indecent assault burglary conviction murders riding uninsured unlicensed motorcycle burglary charge remained file january 2006 following controversies resulting cases staff hired schools full crb check carried department education skills stated employers obtain crb enhanced disclosure respect teachers recruit person placed school huntley hired november 2001 crb came force sociologist frank furedi stated crb checks provide cast-iron guarantee children safe particular adult use created atmosphere suspicion poisoning relationships generations many ordinary parents finding regarded potential child abusers restrictions imposed crb check process contributed shortage adult volunteers organizations girlguiding uk 2009 crb enhanced disclosure criticised including details minor contact individual police even formal action taken
[ 3909 ]
Test
6,100
4
Egress_Software:egress software egress software technologies ltd uk-based software company provides range data security services designed protect shared information throughout lifecycle offering on-demand security organisations individuals sharing confidential information electronically egress develops security software including email encryption secure online collaboration document email classification email file archiving egress founded 2007 tony pepper neil larkins john goodyear major use egress switch software secure transfer emails documents non-secure email addresses october 2013 egress switch certified cesg desktop gateway email encryption security characteristics part commercial product assurance program makes switch suitable sharing il2 low-threat il3 data guidelines official official sensitive 2014 uk government security classifications policy certification lies national cyber security centre ncsc currently extended 20 december 2019 may 2014 egress switch encryption services became available procure via g-cloud 5 framework uk government program committed adoption cloud services across public sector g-cloud framework public sector organizations able procure following egress switch services switch secure email switch secure file transfer switch secure web form via number egress value added resellers also may 2014 egress switch secure email listed nato information assurance product catalogue provides 28 nato nations well civil military bodies directory information assurance products protection profiles packages use available procurement meet operational requirements
[ 5568, 2961, 3241, 7725 ]
Test
6,101
4
Key-recovery_attack:key-recovery attack key-recovery attack adversary attempt recover cryptographic key encryption scheme historically cryptanalysis block ciphers focused key-recovery security sorts attacks weak guarantee since may necessary recover key obtain partial information message decrypt message entirely modern cryptography uses robust notions security recently indistinguishability adaptive chosen-ciphertext attack ind-cca2 security become golden standard security obvious key-recovery attack exhaustive key-search attack modern ciphers often key space size formula_1 greater making attacks infeasible current technology
[]
Test
6,102
4
Naive_Bayes_spam_filtering:naive bayes spam filtering naive bayes classifiers popular statistical technique e-mail filtering typically use bag words features identify spam e-mail approach commonly used text classification naive bayes classifiers work correlating use tokens typically words sometimes things spam non-spam e-mails using bayes theorem calculate probability email spam naive bayes spam filtering baseline technique dealing spam tailor email needs individual users give low false positive spam detection rates generally acceptable users one oldest ways spam filtering roots 1990s bayesian algorithms used sort filter email 1996 although naive bayesian filters become popular later multiple programs released 1998 address growing problem unwanted email first scholarly publication bayesian spam filtering sahami et al 1998 work soon thereafter deployed commercial spam filters however 2002 paul graham greatly decreased false positive rate could used single spam filter variants basic technique implemented number research works commercial software products many modern mail clients implement bayesian spam filtering users also install separate email filtering programs server-side email filters dspam spamassassin spambayes bogofilter assp make use bayesian spam filtering techniques functionality sometimes embedded within mail server software crm114 oft cited bayesian filter intended use bayes filter production includes ″unigram″ feature reference particular words particular probabilities occurring spam email legitimate email instance email users frequently encounter word viagra spam email seldom see email filter n't know probabilities advance must first trained build train filter user must manually indicate whether new email spam words training email filter adjust probabilities word appear spam legitimate email database instance bayesian spam filters typically learned high spam probability words viagra refinance low spam probability words seen legitimate email names friends family members training word probabilities also known likelihood functions used compute probability email particular set words belongs either category word email contributes email spam probability interesting words contribution called posterior probability computed using bayes theorem email spam probability computed words email total exceeds certain threshold say 95 filter mark email spam spam filtering technique email marked spam automatically moved junk email folder even deleted outright software implement quarantine mechanisms define time frame user allowed review software decision initial training usually refined wrong judgements software identified false positives false negatives allows software dynamically adapt ever-evolving nature spam spam filters combine results bayesian spam filtering heuristics pre-defined rules contents looking message envelope etc resulting even higher filtering accuracy sometimes cost adaptiveness bayesian email filters utilize bayes theorem bayes theorem used several times context spam let suppose suspected message contains word replica people used receiving e-mail know message likely spam precisely proposal sell counterfeit copies well-known brands watches spam detection software however know facts compute probabilities formula used software determine derived bayes theorem statistics show current probability message spam 80 least however bayesian spam detection software makes assumption priori reason incoming message spam rather ham considers cases equal probabilities 50 filters use hypothesis said biased meaning prejudice regarding incoming email assumption permits simplifying general formula functionally equivalent asking percentage occurrences word replica appear spam messages quantity called spamicity spaminess word replica computed number formula_4 used formula approximated frequency messages containing replica messages identified spam learning phase similarly formula_6 approximated frequency messages containing replica messages identified ham learning phase approximations make sense set learned messages needs big representative enough also advisable learned set messages conforms 50 hypothesis repartition spam ham i.e datasets spam ham size course determining whether message spam ham based presence word replica error-prone bayesian spam software tries consider several words combine spamicities determine message overall probability spam bayesian spam filtering algorithms based formulas strictly valid probabilistic standpoint words present message independent events condition generally satisfied example natural languages like english probability finding adjective affected probability noun useful idealization especially since statistical correlations individual words usually known basis one derive following formula bayes theorem formula referenced paul graham 2002 article early commentators stated graham pulled formulas thin air graham actually referenced source included detailed explanation formula idealizations based spam filtering software based formula sometimes referred naive bayes classifier naive refers strong independence assumptions features result p typically compared given threshold decide whether message spam p lower threshold message considered likely ham otherwise considered likely spam usually p directly computed using formula due floating-point underflow instead p computed log domain rewriting original equation follows taking logs sides let formula_22 therefore hence alternate formula computing combined probability case word never met learning phase numerator denominator equal zero general formula spamicity formula software decide discard words information available generally words encountered times learning phase cause problem would error trust blindly information provide simple solution simply avoid taking unreliable words account well applying bayes theorem assuming classification spam ham emails containing given word replica random variable beta distribution programs decide use corrected probability corrected probability used instead spamicity combining formula formula_3 taken equal 0.5 avoid suspicious incoming email 3 good value meaning learned corpus must contain 3 messages word put confidence spamicity value default value formula extended case n equal zero spamicity defined evaluates case formula_32 neutral words like english equivalents languages ignored generally bayesian filtering filters simply ignore words spamicity next 0.5 contribute little good decision words taken consideration whose spamicity next 0.0 distinctive signs legitimate messages next 1.0 distinctive signs spam method example keep ten words examined message greatest absolute value |0.5 − pi software products take account fact given word appears several times examined message others n't software products use patterns sequences words instead isolated natural languages words example context window four words compute spamicity viagra good instead computing spamicities viagra good method gives sensitivity context eliminates bayesian noise better expense bigger database ways combining individual probabilities different words using naive approach methods differ assumptions make statistical properties input data different hypotheses result radically different formulas combining individual probabilities example assuming individual probabilities follow chi-squared distribution 2 n degrees freedom one could use formula c inverse chi-squared function individual probabilities combined techniques markovian discrimination one main advantages bayesian spam filtering trained per-user basis spam user receives often related online user activities example user may subscribed online newsletter user considers spam online newsletter likely contain words common newsletters name newsletter originating email address bayesian spam filter eventually assign higher probability based user specific patterns legitimate e-mails user receives tend different example corporate environment company name names clients customers mentioned often filter assign lower spam probability emails containing names word probabilities unique user evolve time corrective training whenever filter incorrectly classifies email result bayesian spam filtering accuracy training often superior pre-defined rules perform particularly well avoiding false positives legitimate email incorrectly classified spam example email contains word nigeria frequently used advance fee fraud spam pre-defined rules filter might reject outright bayesian filter would mark word nigeria probable spam word would take account important words usually indicate legitimate e-mail example name spouse may strongly indicate e-mail spam could overcome use word nigeria depending implementation bayesian spam filtering may susceptible bayesian poisoning technique used spammers attempt degrade effectiveness spam filters rely bayesian filtering spammer practicing bayesian poisoning send emails large amounts legitimate text gathered legitimate news literary sources spammer tactics include insertion random innocuous words normally associated spam thereby decreasing email spam score making likely slip past bayesian spam filter however example paul graham scheme significant probabilities used padding text non-spam-related words affect detection probability significantly words normally appear large quantities spam may also transformed spammers example « viagra » would replaced « viaagra » « v agra » spam message recipient message still read changed words words met rarely bayesian filter hinders learning process general rule spamming technique work well derived words end recognized filter like normal ones another technique used try defeat bayesian spam filters replace text pictures either directly included linked whole text message part replaced picture text drawn spam filter usually unable analyze picture would contain sensitive words like « viagra » however since many mail clients disable display linked pictures security reasons spammer sending links distant pictures might reach fewer targets also picture size bytes bigger equivalent text size spammer needs bandwidth send messages directly including pictures filters inclined decide message spam mostly graphical contents solution used google gmail email system perform ocr optical character recognition every mid large size image analyzing text inside bayesian filtering used widely identify spam email technique classify cluster almost sort data uses science medicine engineering one example general purpose classification program called autoclass originally used classify stars according spectral characteristics otherwise subtle notice
[ 2366, 2905, 3172, 5722, 5547, 7164, 7975, 293, 5733, 7174, 3017, 1475, 6824, 3031, 5416, 1036, 4089, 3056, 4734, 1233, 1321, 1145 ]
Test
6,103
0
ROUGE_(metric):rouge metric rouge recall-oriented understudy gisting evaluation set metrics software package used evaluating automatic summarization machine translation software natural language processing metrics compare automatically produced summary translation reference set references human-produced summary translation following five evaluation metrics available
[ 5429, 5008, 3651 ]
Test
6,104
9
Novius_OS:novius os novius os content management system cms open source affero general public license v3 designed multi-channel internet create publish everywhere published novius company since 2011 novius os project launched company novius december 2011 publishing company since 2004 proprietary cms publi-nova decided embark open-source create new cms designed multi-channel internet novius os distributed gnu agpl v3 license uses latest web technologies based framework fuelphp side interface uses html5 jquery ui wijmo tinymce plugins like android versions named dessert major novius os versions listed alphabetical order named city first stable version os novius launched september 2012 version 0.1 renamed amsterdam posteriori version included expected standard elements cms publishing pages blog entries creating users managing permissions first notable features novius os specific business applications library multi-language system tabbed browsing makes multitasking cms version 0.2 launched february 2013 also known posteriori berlin version brings new cms applications forms management slide application create app allows developers easily quickly create novius os application database ui etc.. also notes emergence multi-context managing multiple sites multiple languages – single back office chiba version launched april 2013 tribute work done japanese community fully reflects novius os japanese version advanced rights system implemented planning publications cache cms also improved novius os contest bar camp exhibiting www2012 international gathering around future challenges web originally created robert cailliau co-founder tim berners-lee web week novius os presented several personalities giving first echo project novius os also present cms day 2012 2013 european rally around open source cms novius os available github runs lamp stack written php 5.3 mvc architecture uses framework fuelphp interfaces using html5 jquery ui wijmo library novius os built application system image object-oriented programming application may extended others customized extended additional features application different components launchers enhancers templates data catchers allow flow data applications also outside addition native applications provided novius os e.g collections web pages possible create specific business applications using wizard create app wizard allows quickly easily generate basis new application models fields group fields app desk launchers enhancers url etc..
[ 6029 ]
Test
6,105
7
Middleware_(distributed_applications):middleware distributed applications middleware context distributed applications software provides services beyond provided operating system enable various components distributed system communicate manage data middleware supports simplifies complex distributed applications includes web servers application servers messaging similar tools support application development delivery middleware especially integral modern information technology based xml soap web services service-oriented architecture middleware often enables interoperability applications run different operating systems supplying services application exchange data standards-based way middleware sits middle application software may working different operating systems similar middle layer three-tier single system architecture except stretched across multiple systems applications examples include eai software telecommunications software transaction monitors messaging-and-queueing software distinction operating system middleware functionality extent arbitrary core kernel functionality provided operating system functionality previously provided separately sold middleware integrated operating systems typical example tcp/ip stack telecommunications nowadays included virtually every operating system software provides link separate software applications middleware sometimes called plumbing connects two applications passes data middleware allows data contained one database accessed another definition would fit enterprise application integration data integration software objectweb defines middleware software layer lies operating system applications side distributed computing system network middleware relatively new addition computing landscape gained popularity 1980s solution problem link newer applications older legacy systems although term use since 1968 also facilitated distributed processing connection multiple applications create larger application usually network middleware services provide functional set application programming interfaces allow application compared operating system network services middleware offers unique technological advantages business industry example traditional database systems usually deployed closed environments users access system via restricted network intranet e.g. enterprise ’ internal network phenomenal growth world wide web users access virtually database proper access rights anywhere world middleware addresses problem varying levels interoperability among different database structures middleware facilitates transparent access legacy database management systems dbmss applications via web server without regard database-specific characteristics businesses frequently use middleware applications link information departmental databases payroll sales accounting databases housed multiple geographic locations highly competitive healthcare community laboratories make extensive use middleware applications data mining laboratory information system lis backup combine systems hospital mergers middleware helps bridge gap separate liss newly formed healthcare network following hospital buyout middleware help software developers avoid write application programming interfaces api every control program serving independent programming interface applications future internet network operation traffic monitoring multi-domain scenarios using mediator tools middleware powerful help since allow operators searchers service providers supervise quality service analyse eventual failures telecommunication services finally e-commerce uses middleware assist handling rapid secure transactions many different types computer environments short middleware become critical element across broad range industries thanks ability bring together resources across dissimilar networks computing platforms 2004 members european broadcasting union ebu carried study middleware respect system integration broadcast environments involved system design engineering experts 10 major european broadcasters working 12-month period understand effect predominantly software-based products media production broadcasting system design techniques resulting reports tech 3300 tech 3300s published freely available ebu web site message-oriented middleware mom middleware transactions event notifications delivered disparate systems components way messages often via enterprise messaging system mom messages sent client collected stored acted upon client continues processing intelligent middleware imw provides real-time intelligence event management intelligent agents imw manages real-time processing high volume sensor signals turns signals intelligent actionable business information actionable information delivered end-user power dashboards individual users pushed systems within outside enterprise able support various heterogeneous types hardware software provides api interfacing external systems highly scalable distributed architecture embeds intelligence throughout network transform raw data systematically actionable relevant knowledge also packaged tools view manage operations build advanced network applications effectively content-centric middleware offers simple provider-consumer abstraction applications issue requests uniquely identified content without worrying obtained juno one example allows applications generate content requests associated high-level delivery requirements middleware adapts underlying delivery access content sources best suited matching requirements therefore similar publish/subscribe middleware well content-centric networking paradigm sources include additional classifications ibm red hat oracle corporation microsoft vendors provide middleware software vendors axway sap tibco informatica objective interface systems pervasive scaleout software webmethods specifically founded provide niche middleware solutions groups apache software foundation opensaf objectweb consortium ow2 oasis amqp encourage development open source middleware microsoft .net framework architecture essentially middleware typical middleware functions distributed various products inter-computer interaction industry standards open apis rand software licence solace provides middleware purpose-built hardware implementations may experience scale stormmq provides message oriented middleware service
[ 2087, 5014, 2720, 6415, 8173, 4946, 5650, 6986, 5571, 5666, 7921, 8111, 2054, 6586, 4831, 7315, 84 ]
Test
6,106
4
National_Cyber_Security_Alliance:national cyber security alliance national cyber security alliance ncsa 501c 3 non-profit founded 2001 public private partnership working department homeland security dhs private sector sponsors founding sponsors included symantec cisco systems microsoft saic emc mcafee nonprofit collaborators promote cyber security awareness home users small medium size businesses primary secondary education national cyber security awareness month project ncsa us government stop think connect campaign broader public cyber security awareness anti-phishing working group department homeland security also involved facebook became member ncsa 2011 cisco systems joined ncsa board directors 2016 cisco represented anthony grieco leads company trust strategy office
[ 496, 4953, 4783 ]
Test
6,107
4
Personal_firewall:personal firewall personal firewall application controls network traffic computer permitting denying communications based security policy typically works application layer firewall personal firewall differs conventional firewall terms scale personal firewall usually protect computer installed compared conventional firewall normally installed designated interface two networks router proxy server hence personal firewalls allow security policy defined individual computers whereas conventional firewall controls policy networks connects per-computer scope personal firewalls useful protect machines moved across different networks example laptop computer may used trusted intranet workplace minimal protection needed conventional firewall already place services require open ports file printer sharing useful laptop could used public wi-fi hotspots time decide level trust set individual security policies network unlike network firewalls many personal firewalls able control network traffic allowed programs secured computer application attempts outbound connection firewall may block blacklisted ask user whether blacklist yet known protects malware implemented executable program personal firewalls may also provide level intrusion detection allowing software terminate block connectivity suspects intrusion attempted common personal firewall features firewalls help protecting internal network hackers however firewall limitations mid 1990s part information security architecture project fortune 100 corporation united states anheuser-busch corporation one members three-man architectural development team came concept regards improving overall security operating system used computers within networked system network system referred budnet improving overall security operating system commonly referred os hardening member team charged ssgt donald r. woeltje jr. concept came installation special software firewall software every budnet server workstation perimeter security device indeed every single windows system budnet network concept commonly referred personal firewall software ssgt woeltje invent personal firewall software invent idea personal firewall evidence fact exists anheuser-busch security model proposal document made ssgt woeltje time ssgt woeltje brought leading firewall vendors meetings concerning products considered use perimeter security budnet network ssgt woeltje brought concept personal firewall vendors asked firewall product could used way exception representatives cyberguard corporation every vendor said firewall software could used way also said idea crazy unworkable today know wrong use personal firewall software become de facto computer security standard companies ssgt woeltje discussed personal firewall software among others cisco checkpoint axent technologies milkyway networks cyberguard network one trusted information systems secure computing corporation
[ 1249, 3165, 1809, 798, 4759, 5552, 806, 6084, 994, 3185, 4492, 4591, 7351, 4138, 385, 7536, 651, 2296, 2746, 578, 3637, 8100, 6456, 3551, 1291, 7275, 1571, 7744, 3394, 6560, 4977, 7289, 7478, 3223, 3484, 3486, 6575, 4091, 2790, 7683, 62...
Validation
6,108
4
Von_Duprin:von duprin von duprin brand security products producer first panic bar style door mechanism allows door public building locked outside still easy exit inside 1903 iroquois theatre fire chicago claimed lives almost 600 people carl prinzler supposed attend show theatre fateful day however business dealings called elsewhere era common theatres like lock interior exterior doors prevent non-paying persons entering also inhibited persons inside exiting case iroquois theatre fire doors locked and/or bolted prevented patrons exiting causing burned alive succumb smoke inhalation prinzler astounded enormous senseless loss life night sought way doors public facilities locked outside allow egress inside minimal effort emergency prinzler tapped architectural engineering abilities henry h. dupont develop product 1908 first model panic bar style egress device released vonnegut hardware company utilized market owing joint effort develop sell product sold name von duprin combination names vonnegut dupont prinzler popular 88 series crossbar exit devices still manufactured von duprin look similar original design although significant engineering changes made von duprin continues manufacture security related products brand allegion plc
[]
Test
6,109
7
HP_Business_Service_Automation:hp business service automation hp business service automation collection software products data center automation hp software division hewlett-packard company products could help information technology departments create common enterprise-wide view business service enable automation change compliance across devices make business service connect processes coordinate teams via common workflows integrate monitoring ticketing tools form complete integrated business service management solution hp provides many capabilities part hp business service management software solutions longer competes past practices cost structures competes costs structures cloud computing software service saas providers hosts remain competitive determine retain outsource needs make systems applications perform better efficiently also needs automate applications systems keep complexity costs line visibility automation management essential regardless underlying infrastructure also allow function best broker services regardless servers may reside efficiencies type integration automation management led rise converged infrastructure environments type data center environment allows enterprises get applications running faster easier manageability less maintenance enables rapidly adjust resources servers storage networking meet fluctuating unpredictable business demand hp business service automation consisted several software products encompassed data center automation client automation runtime visibility control data center hp server automation software automates server lifecycle physical virtual servers automates deployment applications hp application deployment manager adm software automated release process bridge gap among development quality assurance operations teams hp network automation software delivers network change configuration management real-time visibility automation control network compliance security cost savings hp operations orchestration software process automation platform provides single view automating processes hybrid infrastructures including cloud computing environments hp radia client automation software persistent systems automates key processes across pc lifecycle hp storage essentials software standards-based storage resource management software provides visibility applications drilling host storage infrastructure hp database middleware automation software acquisition stratavia automates provisioning patching compliance configuration management heterogeneous databases application servers hp service automation visualizer software presented global interactive picture environment including servers software network devices storage configurations interdependencies hp business service automation bsa essentials provides content infrastructure services users includes portal security updates compliance policy checks content application management profiles bsa essentials reporting reporting engine ad hoc cross-domain analysis compliance reports
[ 3764, 2961, 330 ]
Test
6,110
7
Microsoft_Egypt:microsoft egypt microsoft egypt division microsoft markets microsoft products egypt microsoft established branch egypt 1995 office representative becoming limited liability company 1997 microsoft launched cairo microsoft innovation center september 2007 located smart village near cairo mission work concept-level research problems relatively short market headed tarek el-abbadi long time program manager microsoft redmond office
[ 183, 3076, 8054, 4293, 4759, 7619, 2550, 7715, 2283, 8076, 5475, 5213, 644, 3958, 2739, 5563, 8085, 4500, 7734, 5141, 3028, 134, 2492, 6294, 4524, 7660, 3395, 6839, 7848, 8118, 3135, 522, 2066, 6580, 432, 6054, 6678, 5442, 4377 ]
Test
6,111
3
Motorola_56000:motorola 56000 motorola dsp56000 also known 56k family digital signal processor dsp chips produced motorola semiconductor later known freescale semiconductor acquired nxp starting 1986 still produced advanced models 2010s 56k series quite popular time number computers including next atari falcon030 sgi indigo workstations using 56001 upgraded 56k versions still used audio equipment radars communications devices like mobile phones various embedded dsp applications 56000 also used basis updated 96000 commercially successful dsp56000 uses fixed-point arithmetic 24-bit program words 24-bit data words includes two 24-bit registers also referred single 48-bit register also includes two 56-bit accumulators 8-bit extension aka headroom otherwise accumulators similar 24/48-bit registers modified harvard architecture processor 56k three memory spaces+buses on-chip memory banks models program memory space/bus two data memory space/bus 24 bits selected basic word length gave system reasonable number range precision processing audio sound 56000 main concern 24 bits correspond large dynamic range sufficient 1980s analog-to-digital converters adcs digital-to-analog converters dacs rarely exceeded 20 bits one example adsl applications filters typically require 20 bits accuracy leftmost four bits considered ample headroom calculations processor capable carrying 16.5 million instructions per second mips maximum specified clock speed hardware support block-floating point fft uses ttl levels consumes approximately designs 56000 dedicated one single task digital signal processing using special hardware mostly real-time allow interruption somewhat mildly demanding tasks time-critical simple if-then type designers normally use separate cpu mcu 56000 execute 1024-point complex fast fourier transform fft takes rate 555 operations per second allowing realtime decoding encoding of/to reasonably advanced audio codecs mp3 direct-to-disc recording purposes addition simd instructions desktop computer cpus meant dedicated dsp chips like 56000 partly retreated application fields continue used widely communications professional uses end 56800 series added complete mcu created single-chip dspcontroller solution opposite occurred 68456—a 68000 56000 still quite prevalent model 56000 third generation 563xx family developed 2000s features several models special applications hard- firmware built-in like pci interface logic crc processors audio companders core clock frequencies ranged
[ 5097, 708, 5100, 7327, 1075, 1454, 5652, 3708, 7905, 7990, 4702, 1386, 7654, 2133, 234, 2501, 2781, 336, 5622, 2785, 5079, 1237, 2257, 5614, 7133, 2353, 1060 ]
Test
6,112
4
Open_security:open security open security use open source philosophies methodologies approach computer security information security challenges traditional application security based premise application service whether malware desirable relies security obscurity open source approaches created technology linux extent android operating system additionally open source approaches applied documents inspired wikis largest example wikipedia open security suggests security breaches vulnerabilities better prevented ameliorated users facing problems collaborate using open source philosophies approach requires users legally allowed collaborate relevant software would need released license widely accepted open source examples include massachusetts institute technology mit license apache 2.0 license gnu lesser general public license lgpl gnu general public license gpl relevant documents would need generally accepted open content license include creative commons attribution cc-by attribution share alike cc-by-sa licenses creative commons non-commercial licenses no-derivative licenses developer side legitimate software service providers independent verification testing source code information technology side companies aggregate common threats patterns security solutions variety security issues
[ 7282, 5001, 5616, 3498, 578, 1805 ]
Test
6,113
2
Apple_ProDOS:apple prodos prodos name two similar operating systems apple ii series personal computers original prodos renamed prodos 8 version 1.2 last official operating system usable 8-bit apple ii series computers distributed 1983 1993 prodos 16 stop-gap solution 16-bit apple ii replaced gs/os within two years prodos marketed apple meaning professional disk operating system became popular operating system apple ii series computers 10 months release january 1983 prodos released address shortcomings earlier apple operating system called simply dos beginning show age apple dos built-in support 5.25 floppy disks requires patches use peripheral devices hard disk drives non-disk-ii floppy disk drives including 3.5 floppy drives prodos adds standard method accessing rom-based drivers expansion cards disk devices expands maximum volume size 400 kilobytes 32 megabytes introduces support hierarchical subdirectories vital feature organizing hard disk storage space supports ram disks machines 128kb memory prodos addresses problems handling hardware interrupts includes well-defined documented programming expansion interface apple dos always lacked although prodos also includes support real-time clock rtc support went largely unused release apple ii first apple ii series include rtc board third-party clocks available ii plus iie iic however prodos unlike earlier apple dos versions developmental roots sos operating system ill-fated apple iii computer released 1980 pre-release documentation prodos including early editions beneath apple prodos documented sos error codes notably one switched disks prodos could never generate disk format programming interface completely different apple dos prodos read write dos 3.3 disks except means conversion utility low-level track-and-sector format dos 3.3 disks retained 5.25 inch disks high-level arrangement files directories completely different reason machine-language programs run apple dos work prodos however basic programs work though sometimes require minor changes third-party program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume release prodos came end support integer basic original apple ii model long since effectively supplanted applesoft basic apple ii plus whereas dos 3.3 always loads built-in support basic programming prodos job given separate system program called basic.system one launches run write applesoft basic programs basic continued built apple roms basic.system merely command interpreter enhancement allows basic programs access prodos means control-d text output used dos 3.3 basic.system alone requires much memory whole dos 3.3 since prodos kernel stowed away language card ram usable amount ram basic programmers remains prodos dos 3.3 despite prodos many advantages many users programmers resisted time investment learning ins outs apple dos apple-dos-based software data formats contributing reason prodos allows 15 characters filename compared apple dos 30 apple integrated software package appleworks released 1984 proved compelling reason switch end 1985 new software products released older operating system apple iis continued able boot older dos even apple ii boot older dos floppies 3.5 floppies hard disks became prevalent users spent bulk time prodos apple iie also released 1983 first apple ii computer 64kb memory built apple shipped dos 3.3 prodos new computers original prodos renamed prodos 8 prodos 16 released support 16-bit apple ii computer although prodos 16 soon replaced gs/os editions prodos require apple ii series computer licensed compatible prodos 8 requires 64kb memory run original prodos 8 1.0 1.0.2 requires 48kb kernel nearly programs including basic.system needed use applesoft basic require 64kb making 48kb system useless prodos practical matter support 48kb machines removed version 1.1 prodos 8 version 2.x requires 65c02 later 65802 65816 cpu prodos 8 2.x runs 64kb utility programs system disk require 128kb systems 6502 cpu instead 65c02 must use prodos 8 versions prior version 2.0 unofficial prodos 8 2.4 released august 16 2016 removes 65c02 requirement run apple ii computers least 64 kb ram although basic.system still requires applesoft rom prodos 16 requires apple iigs release prodos version 1.01 higher check added see running official apple-manufactured computer word apple found computer rom firmware prodos load normal anything else found e.g golden franklin elite prodos refuses run locking boot splash screen measure taken apple computer discourage use unlicensed apple ii clones still possible run newer versions prodos clones however users apply small byte patch every successive version prodos users go far replacing physical rom chip illegal copied version apple rom failing custom patched rom apple added name prodos 8 natively supports disk ii-compatible floppy drives ram drive approximately 59kb computers 128k ram block devices whose controllers support pascal firmware protocol standardized method accepting block reads writes originally introduced use ucsd p-system latter category includes 3.5 disk hard drives custom block device drivers hooked os well prodos uses file system earlier apple sos apple iii sos/prodos file system native apple sos prodos 8 prodos 16 gs/os classic mac os versions also come file system translator handle file system volume allocated 512-byte blocks 5.25 floppy disks still formatted using 256-byte sectors format required controller rom boot disk prodos simply treats pairs 256-byte sectors single block drives volume capacity 32 megabytes file 16 megabytes volume floppy disk hard drive partition volume name filename used base directory name two volumes volume name result conflicts necessary prodos searches available drives find named volume subdirectories supported concept prefix working directory current path provided make working subdirectories easier file directory volume names 1 15 characters starting letter containing letters digits periods file entry also contains 16 bit 2 byte pointer block containing beginning file block index 16-bit block count 24-bit 3-byte file size 8-bit 1-byte filetype 16-bit auxiliary type meaning depends upon filetype creation modification timestamps data related file stored volume sparse files supported files never sparsified removing zero-filled blocks volume header contains similar information relevant volumes directories including root directory sequentially indexed block starting address previous block zero none subsequent block zero none root directory disks initialized 4 blocks allowing 51 entries excluding volume header never changes size except manual intervention special tools subdirectories begin one block grow automatically needed normal files progressively indexed single-block files 513 bytes index block directory entry points directly block file data files 2 256 blocks 513 bytes 128 kb data single index block directory entry points contains list 256 data block addresses larger files master index block containing list 256 index block addresses apple iigs introduced new storage format introduced files two forks typical iigs system program files directory entry points informational block tells computer storage format two forks files read written natively prodos 8 though volume remains compatible volume bitmap used blocks central file allocation table prodos 8 volume formatted apple tools boot sector supports booting prodos sos depending computer booted block 0 apple ii boot block block 1 boots sos allows disk used boot either apple ii apple iii computers putting operating system kernels top directory apple ii boot sector looks file prodos apple iii boot sector looks file sos.kernel third-party formatting utilities often provide sos boot block would even mark block 1 available user data prodos kernel support file systems necessary conversion utility main system disk used transfer files individually prodos older apple dos 3.3 disks use different low-level disk format dos 3.3 prodos transferring data dos 3.2 disks prodos two-step process using dos 3.3 disk intermediary utilizing dos 3.3 utility muffin similar
[ 1616, 1522, 6788, 1524, 4214, 4575, 5101, 4670, 7970, 2733, 7814, 2294, 4320, 5571, 2300, 5661, 5579, 1654, 5232, 1656, 1657, 5937, 405, 7466, 7011, 8043, 6119, 2327, 1123, 6479, 4003, 7583, 4453, 2794, 3748, 1237, 2528, 3751, 2076, 3920 ...
Test
6,114
8
Proximic:proximic proximic platform provides real-time data services contextual data online advertisers agencies company based palo alto research development facilities munich company ceo philipp pieper co-founded company mathematician thomas nitsche thomas nitsche elmar henne proximic chief architect developed mephisto chess computer chief scientist louis monier founder altavista search engine proximic launched alpha testing mode late 2007 2010 company integrated real-time ad platform appnexus started offer contextual data services display advertisers agencies may 2015 proximic acquired comscore
[ 2739, 503, 654, 80, 7886, 855, 3161, 1732 ]
Test
6,115
4
Zeek:zeek zeek formerly bro free open-source software network analysis framework originally developed 1994 vern paxson named reference george orwell big brother novel nineteen eighty-four used network intrusion detection system nids additional live analysis network events released bsd license ip packets captured pcap transferred event engine accepts rejects accepted packets forwarded policy script interpreter event engine analyzes live recorded network traffic trace files generate neutral events generates events something happens triggered zeek process initialization termination zeek process well something taking place network trace file analyzed zeek witnessing http request new tcp connection zeek uses common ports dynamic protocol detection involving signatures well behavioral analysis make best guess interpreting network protocols events policy neutral good bad simply signals script land something happened events handled policy scripts analyze events create action policies scripts written turing complete zeek scripting language default zeek simply logs information events files zeek also supports logging events binary output however configured take actions sending email raising alert executing system command updating internal metric even calling another zeek script default behavior produces netflow-like output conn log well application event information zeek scripts able read data external files blacklists use within zeek policy scripts zeek analyzers located zeek event engine accompanying policy script policy script customized user analyzers perform application layer decoding anomaly detection signature matching connection analysis zeek designed easy add additional analyzers application layer analyzers included zeek http ftp smtp dns amongst others non-application layer analyzers include analyzers detect host port scans intermediary hosts syn-floods zeek also includes signature detection allows import snort signatures
[ 5454, 5571, 7848, 578, 1612 ]
Test
6,116
9
LispWorks:lispworks lispworks computer software proprietary implementation integrated development environment ide programming language common lisp lispworks developed uk software company harlequin ltd. first published 1989 harlequin ultimately spun lisp division xanalys ltd. took management rights lispworks january 2005 xanalys lisp team formed lispworks ltd. market develop support software lispworks features include enterprise edition also includes knowledgeworks supports rule-based logic programming including support prolog commonsql database interface common object request broker architecture corba binding september 2009 announced lispworks 6 would support concurrent threads capi graphics toolkit extended support gtk+ lispworks 6.1 released january 2012 includes many enhancements capi support anti-aliased drawing lispworks ran spacecraft deep space 1 application called rax nasa software year award 1999
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 6428, 5734, 1840, 2568, 1478, 4332, 2218, 4704, 405, 5757, 7557, 1116, 6471, 7573, 2600, 5077, 1885, 2249, 1889, 1890, 5786, 1895, 5787, 4017, 5091, 1152, 6507, 1154, 795, 6876, 4759, 6888, 2639, ...
Test
6,117
6
Btrfs:btrfs btrfs pronounced butter fuss better f butter f b-tree f simply spelling file system based copy-on-write cow principle initially designed oracle corporation use linux development btrfs began 2007 since november 2013 file system on-disk format marked stable btrfs intended address lack pooling snapshots checksums integral multi-device spanning linux file systems chris mason principal btrfs author stated goal let linux scale storage available scaling addressing storage also means able administer manage clean interface lets people see used makes reliable core data structure btrfsthe copy-on-write b-treewas originally proposed ibm researcher ohad rodeh presentation usenix 2007 chris mason engineer working reiserfs suse time joined oracle later year began work new file system based b-trees 2008 principal developer ext3 ext4 file systems theodore ts stated although ext4 improved features major advance uses old technology stop-gap ts said btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4 btrfs 1.0 finalized on-disk format originally slated late-2008 release finally accepted linux kernel mainline 2009 several linux distributions began offering btrfs experimental choice root file system installation july 2011 btrfs automatic defragmentation scrubbing features merged version 3.0 linux kernel mainline besides mason oracle miao xie fujitsu contributed performance improvements june 2012 chris mason left oracle fusion-io left year later josef bacik join facebook companies mason continued work btrfs 2012 two linux distributions moved btrfs experimental production supported status oracle linux march followed suse linux enterprise august 2015 btrfs adopted default filesystem suse linux enterprise server 12 august 2017 red hat announced release notes red hat enterprise linux rhel 7.4 longer planned move btrfs included technology preview since rhel 6 beta fully supported feature noting would remain available rhel 7 release series btrfs removed rhel 8 may 2019 version 5.0 linux kernel btrfs implements following features 2009 btrfs expected offer feature set comparable zfs developed sun microsystems oracle acquisition sun 2009 mason oracle decided continue btrfs development btrfs provides clone operation atomically creates copy-on-write snapshot file cloned files sometimes referred reflinks light associated linux kernel system calls cloning file system create new link pointing existing inode instead creates new inode initially shares disk blocks original file result cloning works within boundaries btrfs file system since version 3.6 linux kernel may cross boundaries subvolumes certain circumstances actual data blocks duplicated time due copy-on-write cow nature btrfs modifications cloned files visible original file vice versa cloning confused hard links directory entries associate multiple file names actual files file system hard links taken different names file cloning btrfs provides independent files share disk blocks support btrfs feature added version 7.5 gnu coreutils via codice_2 option codice_3 command btrfs subvolume thought separate posix file namespace mountable separately passing codice_4 codice_5 options utility also accessed mounting top-level subvolume case subvolumes visible accessible subdirectories subvolumes created place within file system hierarchy also nested nested subvolumes appear subdirectories within parent subvolumes similarly way top-level subvolume presents subvolumes subdirectories deleting subvolume possible subvolumes nesting hierarchy deleted result top-level subvolumes deleted btrfs file system always default subvolume initially set top-level subvolume mounted default subvolume selection option passed codice_6 default subvolume changed required btrfs snapshot subvolume shares data metadata subvolume using btrfs copy-on-write capabilities modifications snapshot visible original subvolume writable snapshot made treated alternate version original file system example roll back snapshot modified original subvolume needs unmounted snapshot needs mounted place point original subvolume may also deleted copy-on-write cow nature btrfs means snapshots quickly created initially consuming little disk space since snapshot subvolume creating nested snapshots also possible taking snapshots subvolume recursive process thus snapshot subvolume created every subvolume snapshot subvolume already contains mapped empty directory name inside snapshot taking snapshots directory possible subvolumes snapshots however workaround involves reflinks spread across subvolumes new subvolume created containing cross-subvolume reflinks content targeted directory available snapshot new volume created subvolume btrfs quite different traditional logical volume manager lvm logical volume lvm logical volume separate block device btrfs subvolume treated used way making dd lvm snapshots btrfs leads dataloss either original copy mounted computer given pair subvolumes snapshots btrfs generate binary diff using codice_7 command replayed later using codice_8 possibly different btrfs file system send–receive feature effectively creates applies set data modifications required converting one subvolume another send/receive feature used regularly scheduled snapshots implementing simple form file system master–slave replication purpose performing incremental backups quota group qgroup imposes upper limit space subvolume snapshot may consume new snapshot initially consumes quota data shared parent thereafter incurs charge new files copy-on-write operations existing files quotas active quota group automatically created new subvolume snapshot initial quota groups building blocks grouped codice_9 command hierarchies implement quota pools quota groups apply subvolumes snapshots quotas enforced individual subdirectories users user groups possible however workarounds possible using different subvolumes users user groups require quota enforced result little metadata anchored fixed locations btrfs warp fit unusual spatial layouts backend storage devices codice_10 tool exploits ability in-place conversion ext2/3/4 reiserfs file system nesting equivalent btrfs metadata unallocated space—while preserving unmodified copy original file system conversion involves creating copy whole ext2/3/4 metadata btrfs files simply point blocks used ext2/3/4 files makes bulk blocks shared two filesystems conversion becomes permanent thanks copy-on-write nature btrfs original versions file data blocks preserved file modifications conversion becomes permanent blocks marked free ext2/3/4 used hold new btrfs modifications meaning conversion undone time although erase changes made conversion btrfs converted files available writable default subvolume btrfs sparse file holding references original ext2/3/4 filesystem created separate subvolume mountable read-only disk image allowing original converted file systems accessed time deleting sparse file frees space makes conversion permanent june 2015 4.x versions linux kernel mainline in-place ext3/4 conversion considered untested rarely used feature however rewritten scratch 2016 codice_11 4.6. considered stable since in-place conversion reiserfs introduced september 2017 kernel 4.13 creating new btrfs existing btrfs used read-only seed file system new file system act copy-on-write overlay seed form union mounting seed later detached btrfs point rebalancer simply copy seed data still referenced new file system detaching mason suggested may useful live cd installer might boot read-only btrfs seed optical disc rebalance target partition install disk background user continues work eject disc complete installation without rebooting 2009 interview chris mason stated support encryption planned btrfs meantime workaround combining encryption btrfs use full-disk encryption mechanism dm-crypt luks underlying devices create btrfs filesystem top layer unix systems traditionally rely fsck programs check repair filesystems functionality implemented via codice_12 program since version 4.0 functionality deemed relatively stable however august 2017 btrfs documentation suggests used tried recovery methods another tool named codice_13 used recover files unmountable filesystem without modifying broken filesystem i.e. non-destructively normal use btrfs mostly self-healing recover broken root trees mount time thanks making periodic data flushes permanent storage default every 30 seconds thus isolated errors cause maximum 30 seconds filesystem changes lost next mount period changed specifying desired value seconds codice_14 mount option ohad rodeh original proposal usenix 2007 noted b+ trees widely used on-disk data structures databases could efficiently allow copy-on-write-based snapshots leaf nodes linked together leaf copy-on-written siblings parents would well would siblings parents entire tree copied suggested instead modified b-tree leaf linkage refcount associated tree node stored ad-hoc free map structure certain relaxations tree balancing algorithms make copy-on-write friendly result would data structure suitable high-performance object store could perform copy-on-write snapshots maintaining good concurrency oracle later year chris mason began work snapshot-capable file system would use data structure almost exclusively—not metadata file data also recursively track space allocation trees allowed traversal modifications funneled single code path features copy-on-write checksumming mirroring needed implemented benefit entire file system btrfs structured several layers trees using b-tree implementation trees store generic items sorted 136-bit key first 64 bits key unique object id middle 8 bits item type field use hardwired code item filter tree lookups objects multiple items multiple types remaining right-hand 64 bits used type-specific ways therefore items object end adjacent tree ordered type choosing certain right-hand key values objects put items type particular order interior tree nodes simply flat lists key-pointer pairs pointer logical block number child node leaf nodes contain item keys packed front node item data packed end two growing toward leaf fills every tree appears object root tree tree tree roots trees file system trees log trees variable number instances given object id trees singletons data relocation extent chunk trees assigned special fixed object ids ≤256 root tree appears tree object id 1 trees refer object id may also refer individual nodes trees triplet tree object id node level within tree leftmost key value references independent tree actually stored user-visible files directories contained file system tree one file system tree per subvolume subvolumes nest case appear directory item described whose data reference nested subvolume file system tree within file system tree file directory object inode item extended attributes acl entries stored alongside separate items within directory directory entries appear directory items whose right-hand key values crc32c hash filename data location key key inode item points directory items together thus act index path-to-inode lookups used iteration sorted hash effectively randomly permuting means user applications iterating opening files large directory would thus generate many disk seeks non-adjacent files—a notable performance drain file systems hash-ordered directories reiserfs ext3 htree-indexes enabled ext4 tea-hashed filenames avoid directory entry directory index item whose right-hand key value item set per-directory counter increments new directory entry iteration index items thus returns entries roughly order stored disk besides inode items files directories also reference item whose right-hand key value object id parent directory data part reference item filename inode known directory allows upward traversal directory hierarchy providing way map inodes back paths files hard links multiple directories multiple reference items one parent directory files multiple hard links directory pack links filenames reference item design flaw limited number same-directory hard links however many could fit single tree block default block size 4 kib average filename length 8 bytes per-filename header 4 bytes would less 350 applications made heavy use multiple same-directory hard links git gnus gmame backuppc later observed fail hitting limit limit eventually removed october 2012 merged pending release linux 3.7 introducing spillover extended reference items hold hard link filenames could otherwise fit file data kept outside tree extents contiguous runs disk blocks extent blocks default 4kib size headers contain possibly compressed file data compressed extents individual blocks compressed separately rather compression stream spans entire extent files extent data items track extents hold contents item right-hand key value starting byte offset extent makes efficient seeks large files many extents correct extent given file offset computed one tree lookup snapshots cloned files share extents small part large extent overwritten resulting copy-on-write may create three new extents small one containing overwritten data two large ones unmodified data either side overwrite avoid re-write unmodified data copy-on-write may instead create bookend extents extents simply slices existing extents extent data items allow including offset extent tracking items bookends non-zero offsets file data small enough fit inside tree node instead pulled in-tree stored inline extent data item tree node stored tree block —a single uncompressed block header tree block regarded free-standing single-block extent extent allocation tree acts allocation map file system unlike trees items tree object ids represent regions space left-hand right-hand key values starting offsets lengths regions represent file system zones allocated space block groups variable-sized allocation regions alternate successively preferring metadata extents tree nodes data extents file contents default ratio data metadata block groups 1:2 intended work like orlov block allocator block groups ext3 allocating related files together resisting fragmentation leaving allocation gaps groups ext3 block groups however fixed locations computed size file system whereas btrfs dynamic created needed block group associated block group item inode items file system tree include reference current block group extent items contain back-reference tree node file occupying extent may multiple back-references extent shared snapshots many back-references fit item spill individual extent data reference items tree nodes turn back-references containing trees makes possible find extents tree nodes region space b-tree range lookup pair offsets bracketing region following back-references relocating data allows efficient upwards traversal relocated blocks quickly find fix downwards references blocks without walk entire file system turn allows file system efficiently shrink migrate defragment storage online extent allocation tree trees file system copy-on-write writes file system may thus cause cascade whereby changed tree nodes file data result new extents allocated causing extent tree change avoid creating feedback loop extent tree nodes still memory yet committed disk may updated in-place reflect new copy-on-written extents theory extent allocation tree makes conventional free-space bitmap unnecessary extent allocation tree acts b-tree version bsp tree practice however in-memory red-black tree page-sized bitmaps used speed allocations bitmaps persisted disk starting linux 2.6.37 via codice_15 mount option special extents exempt checksumming copy-on-write extent items tracking extents stored root tree crc-32c checksums computed data metadata stored checksum items checksum tree room 256 bits metadata checksums full leaf block roughly 4 kb data checksums checksum algorithm options planned future one checksum item per contiguous run allocated blocks per-block checksums packed end-to-end item data checksums fit spill rightwards another checksum item new leaf file system detects checksum mismatch reading block first tries obtain create good copy block another device internal mirroring raid techniques use btrfs initiate online check entire file system triggering file system scrub job performed background scrub job scans entire file system integrity automatically attempts report repair bad blocks finds along way fsync request commit modified data immediately stable storage fsync-heavy workloads like database virtual machine whose running os fsyncs intensively could potentially generate great deal redundant write i/o forcing file system repeatedly copy-on-write flush frequently modified parts trees storage avoid temporary per-subvolume log tree created journal fsync-triggered copy-on-writes log trees self-contained tracking extents keeping checksum items items replayed deleted next full tree commit system crash next remount block devices divided physical chunks 256 mb physical chunks across multiple devices mirrored striped together single logical chunk logical chunks combined single logical address space rest filesystem uses chunk tree tracks storing device therein device item logical chunks chunk map items provide forward mapping logical physical addresses storing offsets right-hand 64 bits key chunk map items one several different types n however many block devices still free space chunk allocated n large enough chosen mirroring/mapping filesystem effectively space device tree inverse chunk tree device extent items provide reverse mapping byte-ranges block devices back logical chunks storing device number left hand 64-bits physical offset right-hand 64 bits key two trees together allow btrfs grow shrink even change raid levels without unmounting make possible efficiently locate chunks affected shrink/move operations relocate contents on-the-fly file system chunks devices assigned universally unique identifier uuid header every tree node contains uuid containing chunk uuid file system chunk device trees refer devices chunks uuids filesystems single block device dup also default profile metadata intended improve odds successful data salvage event media errors defragmentation shrinking rebalancing operations require extents relocated however simple copy-on-write relocating extent break sharing snapshots consume disk space preserve sharing update-and-swap algorithm used special relocation tree serving scratch space affected metadata extent relocated first copied destination following backreferences upward affected subvolume file system tree metadata pointing old extent progressively updated point new one newly updated items stored relocation tree update complete items relocation tree swapped counterparts affected subvolume relocation tree discarded file system trees—including chunk tree itself—are stored chunks creating potential bootstrapping problem mounting file system bootstrap mount list physical addresses chunks belonging chunk root trees must stored superblock superblock mirrors kept fixed locations 64 kib every block device additional copies 64 mib 256 gib 1 pib superblock mirror updated generation number incremented mount time copy highest generation number used superblock mirrors updated tandem except ssd mode alternates updates among mirrors provide wear levelling
[ 3599, 1438, 2182, 2547, 7161, 3613, 4672, 7528, 7171, 6431, 2559, 1835, 3626, 7532, 5744, 6443, 5049, 5753, 7555, 4341, 5762, 759, 7581, 3666, 5783, 6854, 5437, 5440, 4375, 6500, 788, 6505, 5453, 5803, 3685, 5457, 460, 7242, 1534, 1535, ...
Test
6,118
9
Undefined_behavior:undefined behavior computer programming undefined behavior ub result executing computer code whose behavior prescribed language specification code adheres current state program happens translator source code makes certain assumptions assumptions satisfied execution behavior programming languages—most famously c c++—is undefined cases standards languages semantics certain operations described undefined cases typically represent unambiguous bugs code example indexing array outside bounds implementation allowed assume operations never occur correct standard-conforming program code case c/c++ compiler allowed give compile-time diagnostic cases required implementation considered correct whatever cases analogous don't-care terms digital logic responsibility programmer write code never invokes undefined behavior although compiler implementations allowed issue diagnostics happens assumption make various program transformations valid simplify proof correctness giving flexibility implementation result compiler often make optimizations also allows compile-time checks compilers static program analysis c community undefined behavior may humorously referred nasal demons comp.std.c post explained undefined behavior allowing compiler anything chooses even make demons fly nose circumstances specific restrictions undefined behavior example instruction set specifications cpu might leave behavior forms instruction undefined cpu supports memory protection specification probably include blanket rule stating user-accessible instruction may cause hole operating system security actual cpu would permitted corrupt user registers response instruction would allowed example switch supervisor mode documenting operation undefined behavior allows compilers assume operation never happen conforming program gives compiler information code information lead optimization opportunities example c language value codice_1 negative given signed integer overflow undefined behavior c compiler assume codice_2 always false thus codice_3 statement including call function codice_4 ignored compiler since test expression codice_3 side effects condition never satisfied code therefore semantically equivalent compiler forced assume signed integer overflow wraparound behavior transformation would legal optimizations become hard spot humans code complex optimizations like inlining take place another benefit allowing signed integer overflow undefined makes possible store manipulate variable value processor register larger size variable source code example type variable specified source code narrower native register width int 64-bit machine common scenario compiler safely use signed 64-bit integer variable machine code produces without changing defined behavior code program depended behavior 32-bit integer overflow compiler would insert additional logic compiling 64-bit machine overflow behavior machine instructions depends register width important benefit undefined signed integer overflow enables though require erroneous overflows detected compile-time static program analysis run-time checks clang gcc sanitizers valgrind overflow defined semantics wrap-around compile-time checks would possible c c++ standards several forms undefined behavior throughout offer increased liberty compiler implementations compile-time checks expense undefined run-time behavior present particular iso c standard appendix listing common sources undefined behavior moreover compilers required diagnose code relies undefined behavior hence common programmers even experienced ones rely undefined behavior either mistake simply well-versed rules language span hundreds pages result bugs exposed different compiler different settings used testing fuzzing dynamic undefined behavior checks enabled e.g clang sanitizers help catch undefined behavior diagnosed compiler static analyzers scenarios security critical undefined behavior lead security vulnerabilities software gcc developers changed compiler 2008 omitted certain overflow checks relied undefined behavior cert issued warning newer versions compiler linux weekly news pointed behavior observed pathscale c microsoft visual c++ 2005 several compilers warning later amended warn various compilers major forms undefined behavior c broadly classified spatial memory safety violations temporal memory safety violations integer overflow strict aliasing violations alignment violations unsequenced modifications data races loops neither perform i/o terminate c use automatic variable initialized yields undefined behavior integer division zero signed integer overflow indexing array outside defined bounds see buffer overflow null pointer dereferencing general instance undefined behavior leaves abstract execution machine unknown state causes behavior entire program undefined attempting modify string literal causes undefined behavior ref name= c++03 2.13.4/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §2.13.4 string literals lex.string para 2 /ref integer division zero results undefined behavior ref name= c++03 5.6/4 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.6 multiplicative operators expr.mul para 4 /ref certain pointer operations may result undefined behavior ref name= c++03 5.6/5 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.7 additive operators expr.add para 5 /ref c c++ comparison pointers objects strictly defined pointers point members object elements array. ref name= c++03 5.9/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.9 relational operators expr.rel para 2 /ref example reaching end value-returning function main without return statement results undefined behavior value function call used caller ref name= c99 6.9.1/12 iso/iec 2007 iso/iec 9899:2007 e programming languages c §6.9 external definitions para 1 /ref modifying object two sequence points produces undefined behavior considerable changes causes undefined behavior relation sequence points c++11 following example however cause undefined behavior c++ c. modifying object two sequence points reading value object purpose determining value stored also undefined behavior. ref name= c99 6.5/2 iso/iec 1999 iso/iec 9899:1999 e programming languages c §6.5 expressions para 2 /ref c/c++ bitwise shifting value number bits either negative number greater equal total number bits value results undefined behavior safest way regardless compiler vendor always keep number bits shift right operand « » bitwise operators within range codice_6
[ 7333, 6882, 2379, 4128, 8174, 2736, 1361, 2105, 1363, 5218, 4318, 5125, 573, 5571, 5397, 5311, 1019, 5506, 1584, 5190, 8027, 5962, 1237, 4009, 3499, 5091, 1435, 1805 ]
Validation
6,119
2
Apple_DOS:apple dos apple dos family disk operating systems apple ii series microcomputers late 1978 early 1983 superseded prodos 1983 apple dos three major releases dos 3.1 dos 3.2 dos 3.3 one three releases followed second minor bug-fix release case apple dos 3.2 minor release receive version number apple dos 3.2.1 best-known most-used version apple dos 3.3 1980 1983 releases prior release apple dos 3.1 apple users rely audio cassette tapes data storage retrieval apple computer introduced apple ii april 1977 new computer disk drive disk operating system dos although apple co-founder steve wozniak designed disk ii controller late year believed could written dos co-founder steve jobs decided outsource task company considered using digital research cp/m wozniak sought operating system easier use 10 april 1978 apple signed 13,000 contract shepardson microsystems write dos deliver within 35 days apple provided detailed specifications early apple employee randy wigginton worked closely shepardson paul laughton latter wrote operating system punched cards minicomputer apple dos 1 2 versions 0.1 2.8 serially enumerated revisions development might well called builds 1 28 apple dos 3.0 renamed issue version 2.8 never publicly released due bugs apple published official documentation release 3.2 apple dos 3.1 publicly released june 1978 slightly one year apple ii introduced becoming first disk-based operating system apple computer bug-fix release came later addressing problem means utility used create apple dos master bootable disks built-in command created disks could booted machines least amount memory one created includes self-relocating version dos boots apples memory configuration apple dos 3.2 released 1979 reflect changes computer booting methods built successor apple ii apple ii plus new firmware included auto-start feature automatically found disk controller booted system powered up—earning name autostart rom apple dos 3.3 released 1980 improves various functions release 3.2 also allowing large gains available floppy disk storage newer p5a/p6a proms disk controller enabled reading writing data higher density instead 13 sectors 3.25 kib 16 sectors 4 kib data stored per disk track increasing capacity 113.75 kb 140 kb per disk side 16 kb used filesystem overhead copy dos dos 3.3-formatted disk leaving 124 kb user programs data dos 3.3 however backward compatible read write dos 3.2 disks address problem apple computer released utility called muffin migrate apple dos 3.2 files programs version 3.3 disks apple never offered utility copy way migrate apple dos 3.3 files back version 3.2 disks someone wrote niffum utility also commercial utilities copy ii plus copy files either format eventually prodos well release 3.3 also improves ability switch integer basic applesoft basic computer language card ram expansion firmware card apple dos 3.1 disks use 13 sectors data per track sector 256 b uses 35 tracks per disk side access one side floppy disk unless user flipped disk gives user total storage capacity 113.75 kb per side 10 kb used store dos disk directory leaving 100 kb user programs first layer operating system called rwts stands read/write track sector layer consists subroutines track seeking sector reading writing disk formatting api called file manager built top implements functions open close read write delete lock i.e write-protect unlock i.e write-enable rename files verify file structural integrity also catalog function listing files diskette init function formats disk use dos storing copy dos first three tracks storing startup program usually called hello auto-started disk booted top file manager api main dos routines implemented hook machine basic interpreter intercept disk commands provides bload bsave brun storing loading running binary executables load run save provided basic programs exec provided running text-based batch files consisting basic dos commands finally four types files exist identified letters catalog listing four additional file types r additional b none fully supported dos recognizes types catalog listings direct ways manipulate types files r type found use relocatable binary executable files programs support type data files call vector table region 03d0–03ff allows programs find dos wherever loaded system memory example dos hooked basic cli stops functioning reinitialized calling location 03d0 976 hence traditional 3d0g 3d0 go command return basic system monitor process loading apple dos involves series tiny programs carries loading process forward steps passing control next program chain original apple ii included basic interpreter rom known originally apple basic later integer basic variables language handle integer numbers ranging −32,768 +32,767 16-bit binary values floating point numbers supported apple commissioned microsoft develop applesoft basic capable handling floating-point numbers applesoft basic run integer basic programs causing users resist upgrading dos 3.3 released applesoft basic standard rom apple ii plus apple designed support switching back forth two basic interpreters integer basic loaded ram language card apple iis present typing fp int basic user switch either version 1980 apple dos entered state stagnation apple concentrated efforts ill-fated apple iii computer sos operating system two versions apple dos still called dos 3.3 bug fixes better support new apple iie model released early mid-1983 without third-party patches apple dos read floppy disks running 5.25-inch disk ii drive access media hard disk drives virtual ram drives 3.5-inch floppy disk drives structure apple dos disks particularly free sector map restricted part single sector possible 400 kb available time per drive without major rewrite almost sections code main reason apple abandoned iteration dos 1983 apple dos entirely replaced prodos prodos retains 16-sector low-level format dos 3.3 5.25 inch disks introduces new high-level format suitable devices 32 mb makes suitable hard disks era 3.5-inch floppies apple computers ii plus onward run dos 3.3 prodos plus requiring language card memory expansion use prodos e later models built-in language card hardware run prodos straight prodos includes software copy files apple dos disks however many people need improvements prodos like much higher memory footprint continued using apple dos one clones long 1983 apple convention storing bootable os every single floppy disk means commercial software used matter os user owns program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume allows use many floppy-based dos programs hard disk shortly prodos came apple withdrew permission third parties redistribute dos 3.3 granted one company syndicomm exclusive license resell dos 3.3 commercial games usually use apple dos instead custom disk routines copy protection purposes well performance dos rwts routine read write track two revolutions proper interleaving sector spinning disk passes read/write head rwts routine decoding just-read sector encoding next one written missed sector next one needed dos needs wait nearly entire revolution disk sector come around called blowing rev well-understood performance bottleneck disk systems avoid sectors dos disk arranged interleaved order later prodos arranged sectors order reading decoding sector 0 sector 8 passes sector 1 next sector likely needed available without waiting reading sector 7 two unneeded sectors f 0 pass sector 8 available reading sector 15 drive always wait extra revolution sector 0 track however sector 0 actually needed cases next-higher track track arranged relative last one allow needed time decode just-read sector move head sector 0 comes around average full track read two revolutions disk unfortunately early dos file manager subverted efficiency copying bytes read written file one time disk buffer main memory requiring time resulting dos constantly blowing revs reading writing files programs became available early format disks modified sector interleaves disks give dos time sectors copy data ameliorating problem later programmers outside apple rewrote file manager routines avoid making extra copy sectors file rwts instructed read write sectors directly main memory rather disk buffer whenever full sector transferred early patch provide functionality published call-a.p.p.l.e. speedups load command three five times typical functionality soon appeared commercial products pronto-dos diversi-dos hyper-dos david-dos along additional features never used official apple dos release similar functionality however employed apple successor operating system prodos apple iigs-specific operating system gs/os would eventually employ even efficient scatter read technique would read sector happened passing read head needed file read 2013 35 years apple ii debuted original apple dos source code released computer history museum website donated original author paul laughton
[ 1522, 6788, 1524, 4214, 4575, 5101, 4670, 7814, 2294, 4320, 5571, 2300, 578, 5579, 1654, 5232, 1656, 1657, 5401, 405, 5937, 6113, 7011, 8043, 1670, 2327, 1123, 6479, 336, 4003, 7583, 4453, 1599, 2794, 3748, 3751, 3920, 2076, 1992 ]
Test
6,120
9
Free-form_language:free-form language computer programming free-form language programming language positioning characters page program text insignificant program text need placed specific columns old punched card systems frequently ends lines insignificant whitespace characters used delimit tokens significance free-form languages descend algol including c pascal perl lisp languages free-form although descend algol rexx mostly free-form though cases whitespace characters concatenation operators sql though full programming language also free-form free-form languages also structured programming languages sometimes thought go along free-form syntax earlier imperative programming languages fortran 77 used particular columns line numbers many structured languages use need structured languages exist free-form abc curry haskell python others many use variant off-side rule indentation rather keywords braces used group blocks code
[ 5983, 3944, 2740, 2079, 4705, 666, 6029, 1763, 5948, 4543, 5965, 6585, 2803, 1435 ]
Test
6,121
3
Palm_OS_Emulator:palm os emulator descended copilot palm os emulator used writing testing debugging palm os applications palm os emulator emulates motorola 68000-class devices intimate knowledge palm os inner working allowing close monitoring correct application operation unlike xcopilot another descendant copilot palm os emulator boot uclinux using skin files palm os emulator could closely mimic appearance many models palm handheld versions palm os emulator require file containing rom image boot rom image files obtained palmsource part access co. ltd downloaded real palm device palm os emulator supported palm models produced palm handera handspring symbol palm os handhelds produced sony clie line supported separate sony-specific fork palm os emulator copilot palm os emulator released gpl v2 versions developed palm inc. windows macintosh unix platforms sony fork released windows palm os emulator supports palm os 4.x earlier support palm os 5.x later versions based arm processor palmsource provides simulators palm os 5.x palm os recompiled run natively windows linux mac windows versions emulator included cd-rom included palm programming developer guide published o'reilly 1999
[ 3688, 5079, 7914 ]
Test
6,122
7
Semantic_P2P_networks:semantic p2p networks semantic p2p networks new type p2p network combines advantages unstructured p2p networks structural p2p networks avoids disadvantages semantic p2p networks nodes classified dns-like domain names semantic meanings alice brittney.popular.music semantic p2p networks contains prerequisite virtual tree topology net-like topology formed cached nodes semantic p2p networks keep semantic meanings nodes contents nodes within semantic p2p networks communicate various languages semantic p2p network execute complicated queries sql-like language similarities semantic p2p systems software agents p2p means entities exchange information directly without mediator semantic concept add meaning information peer usually autonomous systems well agents agents follow goal though goal attainment requires knowledge base rules strategies major difference software agents semantic peers latter lacks kind intelligence
[ 6025, 7290, 2043 ]
Test
6,123
1
Clive_Finkelstein:clive finkelstein clive finkelstein born ca 1939 australian computer scientist known father information technology engineering 1961 finkelstein received bachelor science university new south wales sydney graduation finkelstein started working field database processing ibm australia usa back australia 1976 founded consultancy firm infocom australia 1972 finkelstein elected fellow australian computer society finkelstein distinguished member international advisory board dama international data administration management association john zachman 2008 awarded position pearcey hall fame acs australia 1976 1980 finkelstein developed concept information technology engineering based original work carried bridge strategic business planning information systems wrote first publication information technology engineering series six in-depth articles name published us computerworld may june 1981 also co-authored james martin influential savant institute report titled information engineering published nov 1981 also wrote monthly column enterprise dm review magazine
[ 3115 ]
Test
6,124
3
Code_Breaker:code breaker code breaker cheat device developed pelican accessories currently available playstation playstation 2 dreamcast game boy advance nintendo ds along competing product action replay one currently supported video game cheat devices originally developed fire international group distributed pelican accessories ntsc/uc north american counterpart pal european xploder cheat device codebreaker first appeared dreamcast relatively late console lifecycle soon dreamcast version released development began playstation 2 version version six hit market fire international abruptly broke partnership pelican develop newly mad catz-acquired gameshark also time game boy advance code breaker discontinued pelican accessories put together internal development team proceeded future versions codebreaker original site www.codebreaker.com codetwink bought new site day1 feature allows get codes online import codebreaker usb flash drive codes removed codetwink brought back though previous versions playstation 2 code breaker plagued limited functionality later versions lauded features simple uncluttered menu typing systems version 9 added support usb keyboards unlike cheat devices store cheat codes proprietary storage devices playstation 2 code breaker stores codes memory cards thus cutting manufacturing costs saves also copied usb flash drives device official web site codetwink run codemasterx also coded entire cheat engine cheat code types product provides codes posted former game shark code creators club codes downloaded official web site using device day1 feature later versions include support playstation 2 broadband adapter internet chat using code breaker device one access feature named day1 import/export saves cases one avoid typing number number using cheats import however pelican accessories longer supports since latest version codebreaker codebreaker 10.1 www.codebreaker.com set codebreaker site device longer connect internet get codes use codebreaker chat site change code breaker discontinued may 2012 www.codetwink.com uses vbulletin type site format still codebreaker day1 files available download people register account june 2013 day1 files unavailable codetwink.com server moved hard drive damaged april 2017 mirror old codetwink site hosted wes castro developer cheat device project codemasterx also returned hosting maintaining modern codetwink site also sells game genie game save editor playstation 3 consoles
[ 7147 ]
Test
6,125
2
IPod_Touch_(5th_generation):ipod touch 5th generation fifth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 5g ipod touch 5 unveiled apple media event alongside iphone 5 september 12 2012 released october 11 2012 all-purpose pocket computer designed marketed apple inc. touchscreen-based user interface succeeded 4th-generation ipod touch compatible ios 9.3.5 released august 25 2016 like iphone 5 fifth-generation ipod touch slimmer lighter model introduces higher-resolution 4-inch screen series widescreen aspect ratio improvements include support recording 1080p video panoramic still photos via rear camera led flash apple a5 chip chip used ipad mini 1st generation ipad 2 iphone 4s support apple siri additionally unlike predecessors fifth-generation ipod touch initially featured slate silver pink yellow blue product red back colors however release iphone 5s slate color changed space gray colors remained unchanged device initially sold 32 gb 64 gb models first 16 gb model introduced may 30 2013 available one color lacks rear isight camera ipod touch loop included 32 gb models june 26 2014 replaced new 16 gb model longer omits rear camera full range color options pricing ipod touch also changed 16 gb model 199 instead 229 32 gb model 249 instead 299 64 gb model 299 instead 399 ipod touch 5th generation officially discontinued apple july 15 2015 release successor ipod touch 6th generation however apple still continues sell refurbished models fifth generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode initially shipped ios 6 released september 19 2012 play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations users rotate device horizontally landscape mode access cover flow feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods comes ipod include remote mic voice control feature also used identify track play songs playlist specific artist create genius playlist like iphone 4s later models fifth generation ipod touch first ipod touch line-up include siri allows user operate device spoken commands software improved ios 6 include ability make restaurant reservations launch apps dictate facebook twitter updates retrieve movie reviews detailed sports statistics typing aided voice assistant converts speech text also supports imessage specialised instant messaging program service allows unlimited texting apple devices running ios 5 later newer applications features came ios 6 included apple maps passbook screen mirroring apple maps replaced former map application powered google maps lacks many features present competing maps apps also known give wrong directions users still fixed ios 7 updates new apple maps app uses apple new vector-based engine eliminates lag making smoother zooming new maps turn-by-turn navigation spoken directions 3d views major cities real-time traffic new passbook app able retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook scanned reader process mobile payment locations compatible hardware airplay made available allows screen mirroring apple tv supported external device allows screen ipod touch mirrored first generation ipod touch support ios 7 released september 18 2013 ios devices generation ipod touch ipod touch line-up run ios 7 june 2 2014 announced ipod touch 5th generation would receive ios 8 fall released september 17 2014 confirmed june 8 2015 apple wwdc ipod touch 5th generation would support ios 9 makes first ipod touch support 4 major versions ios ios 6 ios 7 ios 8 ios 9. ios 9 said apple feature performance improvements may help aging device function smoothly a5-based devices also support ios 9 including ipad 2 6 major ios versions iphone 4s 5 major ios versions ipad mini 4 major ios versions ios 9.3.5 last update supports ipod touch 5th generation receive ios 10 along iphone 4s ipad 2 3 ipad mini 1st generation due hardware limitations fifth generation ipod touch features apple a5 chip similar one iphone 4s ipad 2 ipad mini chip comprises 1 ghz dual core arm cortex-a9 processor powervr sgx543mp2 2-core gpu making faster fourth generation ipod touch uses apple a4 chip storage capacities available 32 64 gb 16 gb announced later date replace previous generation retina display ipod similar one iphone 5 measuring 1,136 640 pixels aspect ratio almost exactly 16:9 measuring 4 inches diagonally display size 6.7 square inches pixel density 326 ppi remains fourth generation screen icons arranged matrix 6 rows 4 icons larger screen previous generation model fifth generation ipod touch allows 6th row icons added 5 rows present fourth generation ipod touch however fifth generation ipod touch include ambient light sensor included previous generation new isight camera 5 megapixels capable 1080p video recording illuminated sensor led flash front-facing camera also upgraded 1.2 megapixels capable 720p video compared vga 0.3 megapixels front camera fourth generation fifth-generation ipod touch finish features aluminum unibody made kind anodized aluminium used macbook line new isight camera led flash ipod touch includes new feature known ipod touch loop bottom left corner back ipod touch button pressed allow wrist strap attach ipod touch changes ipod touch include addition colors available five space grey replacing slate color variant september 2013 silver pink yellow blue product red space grey slate version comes black front rest color variants ipod come white front fifth-generation ipod touch initially released 32 gb 64 gb models 16 gb version include isight camera led flash loop released may 30 2013 model replaced 16 gb model original design june 26 2014 fifth generation ipod touch well iphone 5 ipod nano 7th generation ipad 4th generation ipad mini feature new dock connector named lightning replacing 30-pin apple dock connector first introduced apple 2003 third generation ipod apple lightning connector eight pins signaling digital new connector also inserted either way unlike 30-pin connector inserted one way adapters released apple convert apple lightning connector older 30-pin apple dock connector usb although accessories work adapter signals available particular video output ipod feature bmw automobiles earphones known apple earpods also included fifth generation ipod touch devices announced apple media event september 12 2012 superseded earphones included previous generation iphones ipods according technology commentators redesign earphones aimed improve sound quality allowing air travel freely apple states redesign earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although redesigned earphones sounded better predecessor reviewers felt quality sound produced still underwhelming stated earpods pale comparison earphones similar price accessories sold ipod touch include lanyard ipod touch loop available 16 gb model andrew williams trustedreviews noted 5th generation ipod touch common features iphone 5 praising design respectable connectivity graham barlow techradar commended improved screen color variants greater quality earphones ipod light weight criticizing reset lightning port scott stein cnet praised enhanced camera quality design remarked ipod touch still weaker outclassed compared ios devices
[ 6788, 3940, 7890, 722, 1094, 4320, 2926, 4690, 734, 5752, 405, 5405, 2954, 1123, 6847, 6142, 2609, 1895, 4376, 5091, 4749, 5450, 7601, 6165, 3001, 2284, 3008, 5477, 120, 1940, 2300, 3025, 2665, 2679, 1582, 2327, 6565, 2331, 3050, 4820, ...
Validation
6,126
4
Clavister:clavister br clavister swedish company specialized network security software listed nasdaq first north according report 451 research edward snowden nsa leaks consequent loss trust us-based products helped international expansion clavister clavister global presence customers japanese ntt-bp german marbach group clavister partnerships example japanese canon-its area virtualized network security nokia networks artesyn comparison firewalls
[ 2746 ]
Test
6,127
3
Compaq_Portable_II:compaq portable ii compaq portable ii third product compaq portable series brought compaq computer corporation released 1986 price us 3499 portable ii much improved upon predecessors included 8 mhz processor lighter smaller compaq portable four models compaq portable ii basic model 1 shipped one 5.25 floppy drive 256kb ram model 2 added second 5.25 floppy drive sold 3599 model 3 shipped 10mb hard disk addition one 5.25 floppy drive 640kb ram 4799 launch model 4 would upgrade model 3 20mb hard drive sold 4999 also may 4.1 mb hard drive included one point compaq portable ii significantly lighter predecessors model 1 weighed 23.6 pounds compared 30.5 pounds compaq portable 286 weighed compaq shipped system small demo disk ms-dos 3.1 purchased separately least two reported cases improperly serviced computers exploding non-rechargeable lithium battery motherboard connected power supply recorded injuries compaq portable ii succeeded compaq portable iii 1987 compaq portable ii room additional market upgrades compaq manufactured four memory expansion boards 512kb 2048kb isa memory cards 512kb 1536kb memory boards attached back motherboard 640kb installed motherboard isa card expansion board computer could upgraded maximum 4.2mb ram motherboard also space optional 80287 math coprocessor two revisions motherboard functionally identical although earlier version larger motherboard four isa slots expansion cards two 8-bit two 16-bit however first 16-bit slot already occupied cga graphics card one 8-bit slots used ata drive controller board leaving two available add cards keyboard hardwired uses standard ps/2 signaling din ps/2 socket retrofitted allow use common ps/2 keyboards usb ones
[ 7698, 5571, 1237, 7759 ]
Test
6,128
1
SQLf:sqlf sqlf sql extended fuzzy set theory application expressing flexible fuzzy queries traditional ″regular″ relational databases among known extensions proposed sql present time complete allows use diverse fuzzy elements constructions language sql sqlf known proposal flexible query system allowing linguistic quantification set rows queries achieved extension sql nesting partitioning structures fuzzy quantifiers also allows use quantifiers qualify quantity search criteria satisfied single rows several mechanisms proposed query evaluation important one based derivation principle consists deriving classic queries produce given threshold -cut result fuzzy query additional processing cost using fuzzy language diminished fundamental querying structure sqlf multi-relational block conception structure based three basic operations relational algebra projection cartesian product selection application fuzzy sets ’ concepts result sqlf query fuzzy set rows fuzzy relation instead regular relation basic block sqlf consists codice_1 clause codice_2 clause optional codice_3 clause semantic query structure following example codice_1 query returns list hotels cheap query retrieves rows hotels table satisfice fuzzy predicate cheap defined fuzzy set μ= 25 30 result sorted descending order membership degree query
[ 4303, 1449, 7248, 5209, 105, 1730, 3951, 3776, 2103, 7067, 3011, 4950, 2659, 6543, 2124, 6462, 2054, 7205, 684, 4359, 4635, 7303, 4274, 1891, 4457, 1792, 7777, 4743, 784 ]
Validation
6,129
4
Security_Administrator_Tool_for_Analyzing_Networks:security administrator tool analyzing networks security administrator tool analyzing networks satan free software vulnerability scanner analyzing networked computers satan captured attention broad technical audience appearing pc magazine drawing threats united states department justice featured web interface complete forms enter targets tables display results context-sensitive tutorials appeared vulnerability found offended name satan software contained special command called repent rearranged letters program acronym satan santa tool developed dan farmer wietse venema neil gaiman drew artwork satan documentation satan designed help systems administrators automate process testing systems known vulnerabilities exploited via network particularly useful networked systems multiple hosts like security tools useful good malicious purposes – also useful would-be intruders looking systems security holes satan written mostly perl utilized web browser netscape mosaic lynx provide user interface easy use interface drove scanning process presents results summary format well reporting presence vulnerabilities satan also gathered large amounts general network information hosts connected subnets types machines services offered satan fallen popularity height popularity 1990s satan released 1995 development ceased 2006 sectools.org conducted security popularity poll developed list 100 network security analysis tools order popularity based responses 3,243 people results suggest satan replaced nmap nessus lesser degree sara security auditor research assistant saint
[ 5983, 2478, 5571, 1942, 3088, 1949, 294 ]
Test
6,130
7
Dynamic_infrastructure:dynamic infrastructure dynamic infrastructure information technology paradigm concerning design data centers underlying hardware software respond dynamically changing levels demand fundamental efficient ways paradigm also known infrastructure 2.0 next generation data center vendors promoting dynamic infrastructures include ibm microsoft sun fujitsu hp dell bright computing basic premise dynamic infrastructures leverage pooled resources provide flexible capacity enabling allocation resources line demand business processes achieved using server virtualization technology pool computing resources wherever possible allocating resources on-demand using automated tools allows load balancing efficient approach keeping massive computing resources reserve run tasks take place example month otherwise under-utilized early examples server-level dynamic infrastructures flexframe sap flexframe oracle introduced fujitsu siemens computers fujitsu 2003 flexframe approach dynamically assign servers applications demand leveling peaks enabling organizations maximize benefit investments dynamic infrastructures may also used provide security data protection workloads moved migrations provisioning enhancing performance building co-location facilities dynamic infrastructures promoted enhance performance scalability system availability uptime increasing server utilization ability perform routine maintenance either physical virtual systems minimizing interruption business operations reducing cost dynamic infrastructures also provide fundamental business continuity high availability requirements facilitate cloud grid computing networking companies infrastructure 2.0 refers ability networks keep movement scale requirements new enterprise initiatives especially virtualization cloud computing according companies like cisco f5 networks infoblox network automation connectivity intelligence networks applications endpoints required reap full benefits virtualization many types cloud computing require network management infrastructure consolidated enabling higher levels dynamic control connectivity networks systems endpoints dynamic infrastructures take advantage intelligence gained across network design every dynamic infrastructure service-oriented focused supporting enabling end users highly responsive way utilize alternative sourcing approaches like cloud computing deliver new services agility speed global organizations already foundation dynamic infrastructure bring together business infrastructure create new possibilities example virtualized applications reduce cost testing packaging supporting application 60 reduced overall tco 5 7 model – source gartner – tco traditional software distribution vs application virtualization michael silver terrence cosgrove mark margevicious brian gammage 16 april 2008 green issues primary driver 10 current data center outsourcing hosting initiatives cost reductions initiatives driver 47 time aligned well green goals combining two means least 57 data center outsourcing hosting initiatives driven green – source gartner – green services catalyst cost optimization kurt potter 4 december 2008 2013 50 midsize organizations 75 large enterprises implement layered recovery architectures – source gartner – predicts 2009 business continuity management juggles standardization cost outsourcing risk roberta j witty john p morency dave russell donna scott rober desisto 28 january 2009
[ 972, 7512, 3764, 4299, 2185, 3514, 3268, 3005, 5564, 4408, 3633, 6543, 7003, 4798, 4159, 4800, 3807, 602, 2961, 3155, 6586, 4554, 2803, 2807 ]
Test
6,131
6
Microsoft_Reserved_Partition:microsoft reserved partition microsoft reserved partition msr partition data storage device created simply reserve portion disk space possible subsequent use windows operating system installed separate partition meaningful data stored within msr though msr chunks may taken creation new partitions may contain data structures gpt label partition type codice_1 formerly disks formatted using older mbr partition layout certain software components used hidden sectors disk data storage purposes one example logical disk manager ldm disk converted basic disk dynamic disk would store metadata 1 mb area end disk allocated partition gpt formatted disks uefi partition specification allow hidden sectors microsoft reserves chunk disk space using msr partition type provide alternative data storage space software components previously may used hidden sectors mbr formatted disks software components example ldm mentioned create small software-component specific partition portion space reserved msr partition starting size msr depends disk size usually aligns following table size gets reduced portions msr taken used described beginning windows 10 minimum size msr 16 mb installer allocates default msr located efi system partition esp oem service partitions must located primary partitions bootable windows operating systems microsoft expects msr present every gpt disk recommends created disk initially partitioned chunks msr partition may also used remapping damaged sectors software device driver used temporary mirror critical operations core gpt structure emergency fast writing internal disk cache memory case power failure many disks fast write-through cache memory generally exceeding 32 mb msr created windows generally 128 mb default may larger systems fast recovery powering system contents msr generally data signature identify content make sure meaningful signature vendor-specific hardware component using normal operation system booted msr partition usually longer needed except device-specific power management systems may use msr also fast recoverable scratch area disk dynamically powered demand hardware raid managers msr may much smaller 1 2 mb start disk generally enough proper operation depending total disk size partition alignment parameters disks larger capacities 2 tb used servers may larger fast cache memory cache may backed frontal hidden ssd space needed msr area physical disk fast recovery case power failure using dynamic power management pcs preinstalled single ssd oem recovery partition usually end disk allows oem partition backed external dvd usb drive deleted ssd freeing space main data partition may extended free space old oem backup partition without move sectors ssd operation small msr partition may temporarily used scratch area recovery case unexpected failure conversion battery/power failure finally security tools may add data software components msr checking system integrity boot time uefi boot tools may also use msr temporary scratch area summary actual usage content msr device-specific invisible normal application software windows api msr partition exposed mountable volume contains standard filesystem msr partition visible within microsoft windows disk management control utility listed reserved microsoft diskpart command line utility bootable disks uefi systems msr partition generally second partition first small partition displayed system 100 mb containing fat32 filesystem store uefi boot data partitions actual main partition windows usually mounted volume c oses multiboot systems one several recovery partitions usually mounted visible microsoft windows disk management control utility oem system recovery partition usually located either end disk hard disks capacity 1tb near start disk msr partition large disks uefi-capable systems oem recovery partitions may also hidden microsoft windows disk management control utility using gpt partition attribute flag internal filesystem generally ntfs fat32 may mounted diskpart
[ 1254, 4759, 5571, 847, 1992 ]
Validation
6,132
2
Samsung_Galaxy_(original):samsung galaxy original samsung gt-i7500 galaxy mobile phone manufactured samsung uses open source android operating system announced 27 april 2009 released 29 june 2009 first android-powered device samsung mobile first would become long galaxy series succeeded samsung i5700 galaxy spica galaxy smartphone offering quad-band gsm announced tri-band hsdpa 900/1700/2100 7.2mbit/s however samsung official pages danish finnish norwegian swedish versions mention dual-band umts 900/2100 phone features 3.2-inch amoled capacitive touchscreen 5 megapixel autofocus camera power led flash digital compass unlike first android phone htc dream g1 i7500 standard 3.5mm headphone jack directional pad place trackball software-wise galaxy offers suite mobile google services including google search gmail youtube google calendar google talk phone gps enables google maps features location google latitude also supports mp3 aac including itunes plus downloads codec .aac format h.264 video beta version spotify music streaming service also available phone via android marketplace due lack firmware updates samsung received criticism original galaxy users countries samsung updated galaxy firmware donut 1.6 users countries could download update manually risk warranty voiding
[ 463, 1921, 5473, 201, 5571, 740, 7007, 7189, 136, 7749, 1582, 6219, 6132, 5775, 7030, 1237, 972 ]
Validation
6,133
3
Intel_SHA_extensions:intel sha extensions intel sha extensions set extensions x86 instruction set architecture support hardware acceleration secure hash algorithm sha family introduced intel goldmont microarchitecture amd added support processors instructions starting ryzen seven new sse-based instructions four supporting sha-1 three sha-256
[ 2000, 3173, 4845, 2989, 3262, 4224, 6523, 6616, 1465, 1377, 5665, 5934, 4879, 742, 3717, 5669, 496, 584, 5055, 5670, 6647, 2226, 1770, 4077, 6563, 3248, 2332, 1881, 766, 8024, 5431, 6945, 6057, 3747, 6675, 6236, 352, 971, 6956, 1335, 48...
Test
6,134
4
UDPCast:udpcast udpcast file transfer tool send data simultaneously many destinations lan instance used install entire classrooms pcs advantage udpcast using methods nfs ftp whatever udpcast uses user datagram protocol multicast abilities wo n't take longer install 15 machines would install 2 default protocol operates udp port 9000 default behaviour changed boot stage http //udpcast.linux.lu/
[]
Train
6,135
4
Phoning_home:phoning home phoning home also called phone home call home computing refers act client server communication may undesirable user and/or proprietor device software often used refer behavior security systems report network location username data another computer phoning home may useful proprietor tracking missing stolen computer type phoning home frequently used mobile computers corporations typically involves software agent difficult detect remove however malicious types phoning home surreptitious communication applications hardware installed end-user sites manufacturers developers traffic may encrypted make difficult impractical end-user determine data transmitted stuxnet attack iran nuclear facilities facilitated phone home technology reported new york times uses phoning home practice legal countries example phoning home could purposes access restriction transmitting authorization key done adobe creative suite time one programs opened phones home serial number serial number listed already use fake program present user option inputting correct serial number user refuses next time program loads operate trial mode valid serial number input however method thwarted either disabling internet connection starting program adding firewall hosts file rule prevent program communicating verification server phoning home could also marketing purposes sony bmg rootkit transmits hash currently playing cd back sony digital video recorder dvr reporting viewing habits high-end computing systems mainframes 'phone home capabilities many years alert manufacturer hardware problems mainframes disk storage subsystems enables repair maintenance performed quickly even proactively maintenance contract similarly high-volume copy machines long equipped phone-home capabilities billing preventive/predictive maintenance purposes research computing phoning home used track daily usage open source academic software phoning used develop logs purposes justification grant proposals support ongoing funding projects aside malicious software phoning home phoning home may done track computer assets—especially mobile computers one well-known software applications leverages phoning home tracking absolute software computrace software employs agent calls absolute-managed server regular intervals information companies police use locate missing computer phoning home website applications authors applications allow documents thing thus allowing documents authors trigger essentially anonymous tracking setting connection intended logged behavior example caused v7.0.5 adobe reader add interactive notification whenever pdf file tries phoning author home html e-mail messages easily implement form phoning home images files required e-mail body may generate extra requests remote web server viewed ip address user computer sent web server unavoidable process reply required details embedded request urls identify user e-mail address marketing campaign etc extra page resources referred web bugs also used track off-line viewing uses ordinary web pages prevent activation requests many e-mail clients load images web resources html e-mails first viewed giving users option load images e-mail trusted source many malware applications phone home use gather store information person machine example pushdo trojan shows new complexity modern malware applications phoning home capabilities systems pushdo 421 executables available sent infected windows client surveillance cameras reported security researcher brian krebs secretly phone home manufacturer
[ 2086, 1571, 5378, 3172, 2566, 7287, 6135 ]
Validation
6,136
2
List_of_features_removed_in_Windows_7:list features removed windows 7 windows 7 contains many new features however similarly transition windows xp windows vista certain capabilities programs present windows vista longer present windows 7 changed following list features originated earlier versions windows included windows vista
[ 448, 7879, 2452, 6684, 458, 4759, 5637, 6256, 7616, 1536, 2999, 3180, 378, 5378, 3187, 6096, 2472, 4500, 4687, 6989, 1097, 4880, 5313, 224, 7660, 7602, 2772, 7570, 8118, 2329, 3048, 3907, 2066, 5781, 2885, 2345, 6580, 3585, 7685, 5442, ...
Train
6,137
7
Apache_Pig:apache pig apache pig high-level platform creating programs run apache hadoop language platform called pig latin pig execute hadoop jobs mapreduce apache tez apache spark pig latin abstracts programming java mapreduce idiom notation makes mapreduce programming high level similar sql relational database management systems pig latin extended using user-defined functions udfs user write java python javascript ruby groovy call directly language apache pig originally developed yahoo research around 2006 researchers ad-hoc way creating executing mapreduce jobs large data sets 2007 moved apache software foundation example word count program pig latin program generate parallel executable tasks distributed across multiple machines hadoop cluster count number words dataset webpages internet comparison sql pig hand argued dbmss substantially faster mapreduce system data loaded loading data takes considerably longer database systems also argued rdbmss offer box support column-storage working compressed data indexes efficient random data access transaction-level fault tolerance pig latin procedural fits naturally pipeline paradigm sql instead declarative sql users specify data two tables must joined join implementation use specify implementation join sql thus ... many sql applications query writer may enough knowledge data enough expertise specify appropriate join algorithm. pig latin allows users specify implementation aspects implementation used executing script several ways effect pig latin programming similar specifying query execution plan making easier programmers explicitly control flow data processing task sql oriented around queries produce single result sql handles trees naturally built mechanism splitting data processing stream applying different operators sub-stream pig latin script describes directed acyclic graph dag rather pipeline pig latin ability include user code point pipeline useful pipeline development sql used data must first imported database cleansing transformation process begin
[ 2451, 4573, 7238, 4759, 894, 4303, 5728, 7805, 6428, 2741, 7444, 7896, 917, 5571, 578, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 7924, 3479, 5863, 6387, 5075, 7488, 7857, 5874, 5965, 1511, 6153, 4742, 5007, ...
Test
6,138
0
Aggregation_(linguistics):aggregation linguistics aggregation subtask natural language generation involves merging syntactic constituents sentences phrases together sometimes aggregation done conceptual level simple example syntactic aggregation merging two sentences john went shop john bought apple single sentence john went shop bought apple syntactic aggregation much complex example aggregation embed one constituents e.g. aggregate john went shop shop closed sentence john went shop closed pragmatic perspective aggregating sentences together often suggests reader sentences related case reader may confused example someone reads john went shop bought apple may infer apple bought shop case sentences aggregated aggregation algorithms must two things first issue deciding aggregate poorly understood aggegration decisions certainly depend semantic relations constituents mentioned also depend genre e.g. bureaucratic texts tend aggregated instruction manuals probably depend rhetorical discourse structure literacy level reader also probably important poor readers need shorter sentences integrated model brings factors together single algorithm regard second issue studies different types aggregation carried harbusch kempen describe several syntactic aggregation strategies terminology john went shop bought apple example forward conjunction reduction much less known conceptual aggregation di eugenio et al show conceptual aggregation done intelligent tutoring system demonstrate performing aggregation makes system effective conceptual aggregation make bigger impact syntactic aggregation unfortunately much software available performing aggregation however simplenlg system include limited support basic aggregation example following code causes simplenlg print man hungry buys apple
[ 1718 ]
Train
6,139
7
HyperCast:hypercast hypercast overlay middleware implemented java application-level overlay networks network applications use hypercast build overlay network top underlying networks internet without changing internet routing switching infrastructure hypercast supports multiple overlay topologies node discovery algorithms routing schemes multicast models etc designed simple interfaces application overlay functions allowing developers quickly create network applications without much knowledge internal details application-layer overlay networks hypercast introduces concept overlay sockets endpoints communication i.e node overlay network hypercast overlay network simply viewed collection overlay sockets overlay socket logical address physical address logical address unique address identifies node overlay network well route overlay messages among overlay sockets physical address overlay socket specifies address underlying network overlay socket send receive messages hypercast provides best-effort communication service unreliable unordered possible duplication application messages referred overlay messages hypercast implements secure distributed peer-to-peer naming service
[]
Validation
6,140
0
Machine_translation_software_usability:machine translation software usability sections give objective criteria evaluating usability machine translation software output repeated translations converge single expression languages i.e translation method show stationarity produce canonical form translation become stationary without losing original meaning metric criticized well correlated bleu bilingual evaluation understudy scores system adaptive colloquialism argot slang french language many rules creating words speech writing popular culture two rules reverse spelling words femme meuf called verlan b attachment suffix -ard noun verb form proper noun example noun faluche means student hat word faluchard formed faluche colloquially mean depending context group students gathering students behavior typical student google translator 28 december 2006 n't derive constructed words example rule b shown il une chorale falucharde mercredi venez nombreux les faluchards chantent des paillardes == choral society falucharde wednesday come many faluchards sing loose-living women french argot three levels usage united states national institute standards technology conducts annual evaluations machine translation systems based bleu-4 criterion combined method called iqmt incorporates bleu additional metrics nist gtm rouge meteor implemeneted gimenez amigo output grammatical well-formed target language using interlingua helpful regard fixed interlingua one able write grammatical mapping target language interlingua consider following arabic language input english language translation result google translator 27 december 2006 google translator output n't parse using reasonable english grammar repeated re-translations preserve semantics original sentence example consider following english input passed multiple times french using google translator 27 december 2006 noted kind round-trip translation unreliable method evaluation interesting peculiarity google translate 24 january 2008 corrected 25 january 2008 following result translating english spanish shows embedded joke english-spanish dictionary added poignancy given recent events raises issue trustworthiness relying machine translation system embedded life-critical system translation system input safety critical decision making process conjointly raises issue whether given use software machine translation system safe hackers known whether feature google translate result joke/hack perhaps unintended consequence use method statistical machine translation reporters cnet networks asked google explanation january 24 2008 google said internal issue google translate mistranslation subject much hilarity speculation internet unintended consequence use method statistical machine translation joke/hack event demonstration potential source critical unreliability statistical machine translation method human translations particular part interpreters selectivity part translator performing translation often commented one two parties served interpreter knows languages leads issue whether particular translation could considered verifiable case converging round-trip translation would kind verification
[ 5008, 3486 ]
Train
6,141
1
Upsizing_(database):upsizing database upsizing term coined microsoft describe process upgrading microsoft access database microsoft sql server allows continue using microsoft access database front-end whereas actual back-end served separate local remote sql server allowing much higher productivity data volumes microsoft access version 2000 special upsizing wizard facilitates data migration proprietary microsoft sql server rdbms currently supported upsizing two strategies database migrated access sql server first strategy often seen first step towards complete migration sql server stage 2 seen part strategy 2 peculiarities every strategy see table data migration procedure microsoft access database upsizing requires fundamental refactoring database structure source code even though aspects procedure seem automatized upsizing wizard still many points requiring human intervention following changes done upsizing
[ 5252, 3280, 1526, 7715 ]
Test
6,142
2
IPad_Mini_3:ipad mini 3 ipad mini 3 stylized marketed ipad mini 3 third-generation ipad mini tablet computer designed developed marketed apple inc announced alongside ipad air 2 october 16 2014 released october 22 uses primarily design hardware predecessor ipad mini 2 new features addition touch id sensor compatible apple pay differing storage sizes available gold color well previous colors september 9 2015 ipad mini 3 discontinued replaced ipad mini 4 ipad mini 3 comes ios 8.1 operating system preinstalled comes several built-in applications camera photos messages facetime mail music safari maps siri calendar itunes store app store notes contacts ibooks game center reminders clock videos newsstand photo booth podcasts apple app store digital application distribution platform ios allows users browse download applications made various developers itunes store additional apps made apple available free download imovie garageband itunes u find iphone find friends apple store trailers remote iwork apps pages keynote numbers ipad mini 3 includes version apple pay built-in nfc functionality removed siri intelligent personal assistant knowledge navigator integrated device activated hands-free application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results additionally siri identify songs using shazam listen song playing nearby siri stores list songs managed identify itunes facebook twitter come integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store ipad mini 3 uses almost exactly design ipad mini 2 addition touch id additionally announcement ipad mini 3 ipad air 2 apple added gold color option existing silver space gray color choices ipads ipad mini 3 uses nearly hardware ipad mini 2 main exception addition touch id sensor 7.9 retina display 2048-by-1536-pixel resolution 326 ppi ipad mini 3 also uses a7 chip 64-bit architecture m7 motion coprocessor 5mp isight camera capable recording 1080p hd video 1.2mp facetime hd camera capable recording 720p hd video new touch id sensor detects user fingerprint used instead passcode unlock ipad touch id ipad mini 3 also compatible apple pay used authorize purchases online apps fingerprint verification opposed entering passwords ipad mini 3 available storage options 16 64 128gb expansion option apple released camera connection kit sd card reader used transfer photos videos ipad ipad mini 3 received positive reviews drew fainter praise predecessor identical ipad mini 2 except addition touch id availability gold color ipad mini 2 regarded better buy 100 usd cheaper featuring screen internals mini 2 3 stuck hardware level original ipad air ipad air 2 new hardware considerably powerful furthermore air 2 also redesigned lighter smaller original air nullified advantages mini 2 3 compact form factor
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 5752, 405, 6125, 2954, 1123, 7572, 6482, 6847, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3001, 2284, 3008, 5477, ...
Validation
6,143
4
Open_Identity_Exchange:open identity exchange open identity exchange oix membership organisation works accelerate adoption digital identity services based open standards non-profit organisation technology agnostic collaborative works across private public sectors members work together jointly fund participate pilot projects sometimes referred alpha projects pilots test business legal and/or technical concepts theory interoperability real world use cases white paper published every project shortly coming office obama administration asked u.s. general services administration gsa leverage open identity technologies allow american public easily efficiently safely interact federal websites national institute health nih social security administration ssa internal revenue service irs 2009 rsa conference gsa sought build public/private partnership open id foundation oidf information card foundation icf order craft workable identity information framework would establish legal policy precedents needed establish trust open id transactions partnership eventually developed trust framework model described meetings held internet identity workshop november 2009 resulted oidf icf forming joint steering committee committee task study best implementation options newly created framework us chief information officer recommended formation non-profit corporation open identity exchange oix january 2010 oidf icf approved grants fund creation open identity exchange oix first trust framework provider certified us government booz allen hamilton ca technologies equifax google paypal verisign verizon members either oidf icf agreed become founding members oix open identity exchange publicly launched rsa 2010 addressed increasing challenges building trust online identity outlined 2012 executive director position founded national strategy trusted identities cyberspace nstic pilot projects showed growing proof traction increased awareness attention 2012 oix uk formed throughout 2013 initial uk cabinet office identity assurance programme idap pilots launched white papers published 2014 oix established oixnet trust registry global authoritative registry business legal technical requirements needed ensure market adoption global interoperability 2014 oidf also announced plans register companies self-certifying conformance openid connect via openid certification program oixnet official online publicly-accessible repository documents information relating identity systems identity system participants referred “ registry ” functions official centralized source documents information much like government-operated recorder deeds individuals entities register documents information oixnet registry provide notice contents public members public seeking access documents information go single authoritative location find oixnet registry designed provide single comprehensive authoritative location documents information relating specific purpose case identity systems safely stored purpose putting others notice certain facts documents information accessed interested stakeholders seeking information oixnet launched 2015 openid foundation first registrant registering initial set organizations including google forgerock microsoft nri paypal ping identity certifying conformance openid connect additional registrations added oixnet throughout 2015 2016 10 trusted identity services currently registered oixnet registry currently pilot 2016 registering new diverse trust frameworks communities interest oix developed chapters policy 2015 allows regional oix chapters established 2016 oix united kingdom chapter approved oix board launched oix board represents leaders online identity internet telecom data aggregation industries concerned market expansion information security oix board met howard schmidt 2011 discuss public–private partnership envisioned nstic strategy uk government cabinet office joined oix board level began work identity assurance programme gov.uk verify states jersey joined 2015 could leverage knowledge gained development uk government identity assurance programme hasten adaptation adoption jersey open identity exchange currently thirteen executive members 50+ general members november 2016 executive members beginning 2015 cabinet office requested open identity exchange begin process exploring legal business pragmatic considerations creating self-sustaining uk ‘ chapter ’ open identity exchange point oix uk operated independent uk entity able administer ‘ directed funding ’ member organisations received series grants uk cabinet office used collaboratively funded projects ad-hoc board advisers formed independent experienced public private sector leaders addressed policy considerations transition process addition considering role oix uk future board advisers considered private sector ’ needs identity services resulting ongoing oix project open identity exchange board directors approved oix chapters policy end 2015 allowing formation individual chapters affiliated oix various local markets april 2016 oix uk europe chapter appointed board directors oix white papers deliver joint research examine wide range challenges facing open identity market provide possible solutions written experts fields technology particularly open identity open identity exchange oix white papers focus current issues opportunities emerging identity markets oix white papers intended deliver value identity ecosystem take one two perspectives retrospective report outcome given project pilot prospective discussion current issue opportunity oix white papers authored independent domain experts intended summaries general business audience recent published whitepapers include • use online activity part identity verification • uk private sector needs identity assurance • use digital identity peer-to-peer economy • shared signals proof concept • creating digital identity jersey • giving gov.uk verify • creating pensions dashboard • could digital identities help transform consumers attitudes behavior towards savings • digital identity across borders opening bank account another eu country • generating revenue subscriber benefits analysis arpu identity oix projects deliver joint research examine wide range challenges facing open identity market provide possible solutions hypothesis uk government identity assurance model could adapted jersey support certified uk idps potential identity assurance hub providers meet requirements soj hypothesis also considered would create attractive market opportunity jersey one providers 3-year project started september 2016 partially funded european union horizon 2020 research innovation programme g.a 700321 lightest consortium consists 14 partners 9 european countries coordinated fraunhofer-gesellschaft project looks reach beyond europe build global community lightest lightweight infrastructure global heterogeneous trust management support open ecosystem stakeholders trust schemes objective lightest create global cross-domain trust infrastructure renders transparent easy verifiers evaluate electronic transactions querying different trust authorities worldwide combining trust aspects related identity business reputation etc become possible conduct domain-specific trust decisions achieved reusing existing governance organization infrastructure standards software community know-how existing domain name system combined new innovative building blocks approach allows efficient global rollout solution assists decision makers trust decisions integrating mobile identities scheme lightest also enables domain-specific assessments levels assurance identities uk government cabinet office joined oix board level began work identity assurance programme idap oix directed funding programme considerable number projects continue carried oix governance results helped ongoing development gov.uk verify work continues gds looks digital identities used public private sector gov.uk verify built maintained government digital service gds part cabinet office uk government committed expanding gov.uk verify helping grow market identity assurance able meet user needs relation central government services well local health private sector services gov.uk verify uses certified companies verify identity government certified company private company works high industry government standards verify identity
[ 904, 6179, 2043, 1373, 7708, 2140, 5511, 15 ]
Test
6,144
1
Database_design:database design database design organization data according database model designer determines data must stored data elements interrelate information begin fit data database model database design involves classifying data identifying interrelationships theoretical representation data called ontology ontology theory behind database design majority cases person design database person expertise area database design rather expertise domain data stored drawn e.g financial information biological information etc therefore data stored database must determined cooperation person expertise domain aware data must stored within system process one generally considered part requirements analysis requires skill part database designer elicit needed information domain knowledge necessary domain knowledge frequently express clearly system requirements database unaccustomed thinking terms discrete data elements must stored data stored determined requirement specification database designer aware data stored within database must determine dependency within data sometimes data changed changing data visible example list names addresses assuming situation multiple people address one person one address address dependent upon name provided name list address uniquely determined however inverse hold given address list name uniquely determined multiple people reside address address determined name address considered dependent name relationships dependencies amongst various pieces information determined possible arrange data logical structure mapped storage objects supported database management system case relational databases storage objects tables store data rows columns object database storage objects correspond directly objects used object-oriented programming language used write applications manage access data relationships may defined attributes object classes involved methods operate object classes way mapping generally performed set related data depends upon single object whether real abstract placed table relationships dependent objects stored links various objects table may represent implementation either logical object relationship joining one instances one logical objects relationships tables may stored links connecting child tables parents since complex logical relationships tables probably links one parent database designs also include er entity-relationship model diagrams er diagram diagram helps design databases efficient way attributes er diagrams usually modeled oval name attribute linked entity relationship contains attribute field relational database design normalization systematic way ensuring database structure suitable general-purpose querying free certain undesirable characteristics—insertion update deletion anomalies could lead loss data integrity standard piece database design guidance designer create fully normalized design selective denormalization subsequently performed performance reasons trade-off storage space vs performance normalized design less data redundancy therefore takes less space store however common data retrieval patterns may need complex joins merges sorts occur takes data read compute cycles modeling disciplines dimensional modeling approach data warehouse design explicitly recommend non-normalized designs i.e designs large part adhere 3nf normalization consists normal forms 1nf,2nf,3nf boyce-codd nf 3.5nf ,4nf 5nf document databases take different approach document stored database typically would contain one normalized data unit often relationships units well data units relationships question often retrieved together approach optimizes number retrieves also simplifies data gets replicated clearly identifiable unit data whose consistency self-contained another consideration reading writing single document databases require single transaction important consideration microservices architecture situations often portions document retrieved services via api stored locally efficiency reasons data units split across services read write support service consumer might require one service calls could result management multiple transactions may preferred schema refinement database specifies data normalized reduce data insufficiency conflicts physical design database specifies physical configuration database storage media includes detailed specification data elements data types indexing options parameters residing dbms data dictionary detailed design system includes modules database hardware software specifications system
[ 5010, 1449, 1082, 3951, 6098, 6462, 7205, 7937, 1891, 1902, 784, 1905, 7248, 4775, 3011, 4054, 6543, 2663, 7999, 7290, 6932, 7303, 4457, 6594, 6604, 7330, 5209, 7341, 3776, 5561, 906, 5217, 6636, 3115, 3119, 3801, 5943, 2054, 5252, 2796, ...
Validation
6,145
5
L-carrier:l-carrier l-carrier system one series carrier systems developed high-capacity transmission long-distance communications period late 1930s 1970s system evolved six significant phases development designated bell system engineers l-1 l-5 l-5e coaxial cable principle transmission medium stages initially lending system another descriptions coaxial system successor series previous carrier systems typically identified capital letters 1960s system hardened dangers cold war using complete placement terminal repeater equipment hardened underground vaults initial development testing coaxial system took place 1935 1937 test bed 95-mile two-way coaxial cable locations new york city philadelphia distance 3800 miles simulated repeatedly remodulating signals looping twenty times endpoints system provided 240 channels single circuit first production installation l-1 carrier system went service stevens point wi minneapolis mn 1941 distance almost 200 miles capacity 480 channels far could carried balanced pair carrier systems cheaper per channel high-usage routes small-scale l2 system baltimore md washington dc intended short-distance low-volume traffic abandoned early stage anticipation end war-time responsibilities announced december 1944 development plan nationwide build-out coaxial carrier network support long-distance telephone service also television transmissions result post-war research goal definition l-3 carrier system successive version least twice many channels previous version culminating l-5e design 1976 long lines built two coast-to-coast systems l-3 well shorter ones connecting major cities especially big cities eastern united states supplement mainstay microwave radio relay systems later upgraded l-4 others simply overbuilt new l-5 system starting 1911 telephone networks used frequency-division multiplexing carry several voice channels single physical circuit beginning first type c carrier year heterodyned three voice channels stacked top one voice circuit l-carrier systems loaded multiplexing supermultiplexing single sideband channels using long-standard 12 channel voice group produced type channel banks occupying frequency spectrum 60 108 khz basic group entire line spectrum previous long haul carrier systems types j k. first type a-1 channel banks appeared use type j open wire carrier 1934 work espenschied herman affel bell labs patented piezoelectric crystal lattice filters provide sharp bandpass cutoff made single-sideband carrier work lattice filters heart analog multiplex systems using single-sideband/carrier suppressed architecture active ic-based filtering became available mid-1970s single-sideband modulation schemes twelve voice channels would modulated channel group turn five groups could multiplexed similar method supergroup containing 60 voice channels one 48 khz group-band circuit sometimes used single high speed data link rather voice circuits also entire supergroups could dedicated single data channel running data rate 56 kbit/s early late 1960s long distance systems supergroups multiplexed mastergroups 300 voice channels european ccitt hierarchy 600 long lines type l-600 multiplex transmission coaxial cable microwave even higher levels multiplexing became possible send thousands voice channels single circuit example type l-4 system used multi-master group system stack six u600 mastergroups l4 line spectrum hardware modified take three mmg spectra stack early l5 line spectrum later advancements technology allowed even stacking type l-5e allowing 22 mastergroups stacked 66 mhz line spectrum accompanying diagrams process bell system type channel bank forming mastergroup three stages l-carrier also carried first television network connections though later microwave radio relay system soon became important purpose type l-3 used short time coast-to-coast network television feeds advent ntsc color cause move type td microwave radio tube repeaters l-3 added much group delay baseband broadcast signal cables much use broadcasters l-pipes n't used broadcast television much around 1964 variant 1950s l-3 system designed early 1960s provide land line connections key military command control facilities united states starting l-3i improved system upgraded able withstand nuclear attack system consisted 100 main stations 1000 individual repeater vaults main stations emergency power systems blast doors accommodations staff two-week post-attack period nuclear early warning systems blast detection emergency services generally provided redundant underground microwave circuits case one failed late 1970s early 1980s l-carrier system determined redundant advance satellite fiber-optic communication cables upgraded t-4 t-5 instead l-5 never upgraded past l-4 due advancement technology generally advancement glass fiber laser technology made copper coaxial cable obsolete long haul carrier service western electric fielded ft series g single-mode fiber cable system 1984
[ 1976, 2208, 2236 ]
Validation
6,146
9
Hermann_Bottenbruch:hermann bottenbruch hermann bottenbruch born september 14 1928 german mathematician computer scientist bottenbruch grew german state north rhine-westphalia toward end second world war served 1947 began study mathematics graduated 1951 following graduation joined staff institute applied mathematics tu darmstadt institute founded alwin walther bottenbruch earned doctorate 1957 year walther recommendation joined international working group develop new programming language language intended combine current understanding programming languages single standard according friedrich bauer bottenbruch coined name algol least germany english algorithmic language “ 1958 members working group—friedrich l. bauer bottenbruch heinz rutishauser klaus samelson john backus charles katz alan perlis joseph henry wegstein—met eth zurich result deliberations algol 58 1960 1961 bottenbruch worked us oak ridge national laboratory took leading position german industry among things served specialist area industrial chimney construction 1994 founded company primasoft gmbh german city oberhausen providing consulting database solutions
[ 964, 2054, 1381, 4152, 1308 ]
Train
6,147
4
Ruth_A._David:ruth a. david ruth a. david born 1953 american engineer cia david responsible encouraging agency pursue partnerships private sector designed proposal procure technology stage development private sector awarded cia director award defense intelligence agency director award cia distinguished intelligence medal national reconnaissance officer award distinguished service national security agency distinguished service medal ruth a. david born may 13 1953 arkansas city kansas attaining bs electrical engineering wichita state university 1975 went earn master 1976 phd 1981 electrical engineering stanford university david began career 1975 holding several positions sandia national laboratories albuquerque new mexico served adjunct professor university new mexico teaching adaptive digital signal digital microprocessor system design linear least-squares estimation 1986 employed supervisor data systems development organization responsible developing remote controlled digital system deployment underground nuclear tests nevada test site three years later transferred federal aviation administration managing department non-destructive test electromagnetic test optics program aging aircraft 1991 1994 david director development testing center supervising broad spectrum engineering test facilities 1995 appointed deputy director science technology central intelligence agency became responsible advising agency science technology capacity proposed radical new approach agency deal swift growth information internet revolution rather procuring technology developed david deputy joanne isham recognized pushed agency pursue partnerships within private sector technology advancing far faster government bureaucracy procurement program could secure new innovation proposed technology obtained stage development private sector recommended utilizing technology streamline processes move away simply collecting data toward analytical leveraged position disseminating exploiting information 1998 david left cia awarded cia director award defense intelligence agency director award cia distinguished intelligence medal national reconnaissance officer award distinguished service national security agency distinguished service medal year david joined anser formerly analytic services inc. president chief executive officer anser provided analysis research public service national transnational security issues 1999 developed homeland defense strategic thrust focus research internal external terrorist entities hostile nations expanded department anser institute homeland security 2001 provide public awareness education national security 2010 david inducted women technology international hall fame appointed president obama member national science board national science foundation 2012 david retired anser 2015
[]
Test
6,148
3
Speculative_execution:speculative execution speculative execution optimization technique computer system performs task may needed work done known whether actually needed prevent delay would incurred work known needed turns work needed changes made work reverted results ignored objective provide concurrency extra resources available approach employed variety areas including branch prediction pipelined processors value prediction exploiting value locality prefetching memory files optimistic concurrency control database systems speculative multithreading special case speculative execution modern pipelined microprocessors use speculative execution reduce cost conditional branch instructions using schemes predict execution path program based history branch executions order improve performance utilization computer resources instructions scheduled time yet determined instructions need executed ahead branch speculative computation related earlier concept eager execution form speculative execution sides conditional branch executed however results committed predicate true unlimited resources eager execution also known oracle execution would theory provide performance perfect branch prediction limited resources eager execution employed carefully since number resources needed grows exponentially level branch executed eagerly predictive execution form speculative execution outcome predicted execution proceeds along predicted path actual result known prediction true predicted execution allowed commit however misprediction execution unrolled re-executed common forms include branch predictors memory dependence prediction generalized form sometimes referred value prediction lazy execution involve speculation incorporation speculative execution implementations haskell programming language current research topic eager haskell designed around idea speculative execution 2003 phd thesis made ghc support kind speculative execution abortion mechanism back case bad choice called optimistic execution deemed complicated starting 2017 series security vulnerabilities found implementations speculative execution common processor architectures effectively enabled elevation privileges include
[ 704, 3932, 5012, 1447, 5371, 3948, 7527, 7529, 2560, 5737, 2567, 4694, 5042, 1481, 5055, 5405, 2226, 1867, 2248, 441, 2266, 5449, 4765, 5472, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 4807, 7666, 515, 6569, 8024, 5521, 3747, 1237, ...
Validation
6,149
4
IPFilter:ipfilter ipfilter commonly referred ipf open-source software package provides firewall services network address translation nat many unix-like operating systems author software maintainer darren reed ipfilter supports ipv4 ipv6 protocols stateful firewall ipfilter delivered freebsd netbsd solaris 10 11 illumos used part openbsd removed may 2001 due problems license negotiations theo de raadt reed broke subsequently replaced openbsd pf developed openbsd developers dragonfly bsd removed support ipfilter may 2011 ipfilter installed runtime-loadable kernel module directly incorporated operating system kernel depending specifics kernel user preferences software documentation recommends module approach possible operating systems support ipfilter include
[ 1809, 5373, 385, 7536, 732, 6107, 3636, 3637, 6456, 5760, 5065, 6477, 7581, 6860, 7597, 6505, 4759, 806, 1547, 2296, 1193, 4059, 7275, 8001, 6211, 3394, 6560, 7289, 4441, 5518, 4091, 7683, 6235, 8037, 3751, 6951, 875, 6962, 1249, 885, 1...
Test
6,150
4
Project_Shield:project shield project shield anti-distributed-denial-of-service anti-ddos service offered jigsaw subsidiary google parent company alphabet inc. websites media elections human rights related content main goal project serve small under-resourced news sites vulnerable web ’ growing epidemic ddos attacks according team lead george conard similar services offered companies like cloudflare google initially announced project shield ideas conference october 21 2013 service initially offered trusted testers february 25 2016 google opened service qualifying website google-owned reverse proxy identifies filters malicious traffic may 2018 jigsaw announced would start offering free protection distributed denial service attacks us political campaigns candidates political action committees setting project shield involves changing dns domain traffic website goes google ’ system gets front page project shield provides news human rights elections monitoring sites protection ddos distributed denial service system caching storing data protected website reduce load site also filters traffic thwart ddos attacks project shield built google cloud services provided free charge qualifying websites independent journalists human rights elections monitoring websites protect regardless location project shield 2016 october users europe asia north america africa
[ 1691, 84 ]
Test
6,151
3
Konami_Game_Master:konami game master utility cartridge released konami december 12 1985 meant used conjunction konami msx game cartridges allowing users select stages adjust number lives save progress high scores make screen dumps play slow motion among uses updated model called released february 18 1988 new version adds support msx2 games features battery backup allows users save data via s-ram compatible games
[ 3858, 2254, 1472, 7947, 3049 ]
Test
6,152
3
Sapphire_Rapids:sapphire rapids sapphire rapids intel cpu microarchitecture based either second refinement 10 nanometer process new 7 nanometer process used part tinsley workstation server platform 2020 limited information desktop/mobile version sapphire rapids exists difficulties 10 nm 7 nm fabrication processes may result release pushed back 2021 earliest
[ 2449, 2814, 5802, 6332, 6698, 6793, 3942, 3849, 4765, 6170, 3443, 6344, 7449, 7453, 3020, 7364, 3717, 3803, 6647, 1867, 3565, 4985, 766, 691, 5343, 6057, 4098, 352, 2351, 2977, 4108 ]
Test
6,153
9
Sawzall_(programming_language):sawzall programming language sawzall procedural domain-specific programming language used google process large numbers individual log records sawzall first described 2003 szl runtime open-sourced august 2010 however since mapreduce table aggregators released open-sourced runtime useful large-scale data analysis multiple log files shelf sawzall replaced lingo logs go purposes within google google server logs stored large collections records protocol buffers partitioned many disks within gfs order perform calculations involving logs engineers write mapreduce programs c++ java mapreduce programs need compiled may verbose necessary writing program analyze logs time-consuming make easier write quick scripts rob pike et al developed sawzall language sawzall script runs within map phase mapreduce emits values tables reduce phase script writer concerned aggregates tables multiple runs single set tables currently language runtime runs sawzall script single input open-sourced supporting program built mapreduce released interesting features include sawzall design favors efficiency engine simplicity power complete sawzall program read input produce three results number records sum values sum squares values
[ 2902, 3507, 4116, 5455, 6697, 4762, 3848, 3850, 5372, 7431, 7967, 6978, 6176, 993, 6427, 561, 5560, 201, 5476, 7346, 2475, 5302, 2569, 831, 2037, 7007, 5141, 136, 2317, 2673, 8107, 3309, 2867, 7285, 6297, 2591, 2417, 2683, 7924, 855, 57...
Test
6,154
3
Stormbringer_(video_game):stormbringer video game stormbringer computer game written david jones released 1987 mastertronic mastertronic added dimension label originally released zx spectrum commodore 64 amstrad cpc msx version atari st published 1988 fourth final game magic knight series in-game music david whittaker magic knight finally returns home obtained second-hand time-machine tyme guardians end knight tyme however accident whilst travelling back two magic knights off-white knight dreaded stormbringer called storm cloud plans use destroy magic knight magic knight kill off-white knight without destroying process option find off-white knight merge gameplay takes form graphic adventure commands inputted via windimation menu-driven interface style previous two games spellbound knight tyme 1986 magic knight limited amount strength consumed performing actions moving screen screen well sapped various enemies stormbringer storm cloud spinning axes balls bounce around rooms avoided need player monitor magic knight strength avoid enemies means stormbringer gameplay closer arcade adventure feel spellbound rather much pure graphic adventure feel knight tyme previous two magic knight games characters magic knight interact help magic knight spellcasting abilities also important solving game puzzles including merge spell used finds off-white knight
[ 8048, 4065 ]
Test
6,155
4
Gh0st_RAT:gh0st rat gh0st rat trojan horse windows platform operators ghostnet used hack many sensitive computer networks cyber spying computer program rat part name refers software ability operate remote administration tool ghostnet system disseminates malware selected recipients via computer code attached stolen emails addresses thereby expanding network allowing computers infected according infowar monitor iwm ghostnet infection causes computers download trojan known gh0st rat allows attackers gain complete real-time control computer controlled inspected hackers software even ability turn camera audio-recording functions infected computer capabilities enabling monitors see hear goes room
[ 6417, 4759, 5571, 6419, 104, 6756, 3486 ]
Test
6,156
1
ActiveJPA:activejpa activejpa open-source application framework written java object-relational mapping based java persistence api jpa strictly follow jsr 338 specification implements different design patterns technologies framework originated effort add behavior entities making act active records also implements different way proxying persistence operations transaction management intercepting operations validating logging caching using cross-cutting concerns decouple responsibilities retain modularity encapsulating aspects coding convention best way decrease number decisions made developers implementing technology activejpa require initial configuration datasource connection details database running persistence context supports specific unconventional aspects application well using annotations using type safe domain-specific language dsl database queries made using fluent object-oriented interface persistence operations transaction management interception validation logging caching vertically defined using cross-cutting concerns encapsulating responsibilities aspects improves performance scatters tangles code design implementation database access abstracted jdbc 4.2 specification supporting java 1.7 new jdbc features activejpa handles jta nested transactions global transactions transactions managed jdbc connection
[ 3077, 2180, 367, 631, 3951, 7347, 1640, 5571, 7459, 3879, 3479, 7848, 3225, 4185, 2519, 2520, 3915, 6319, 2619, 6594, 4287 ]
Test
6,157
4
L0phtCrack:l0phtcrack l0phtcrack password auditing recovery application originally produced mudge l0pht heavy industries used test password strength sometimes recover lost microsoft windows passwords using dictionary brute-force hybrid attacks rainbow tables one crackers tools choice although use old versions low price high availability initial version released spring 1997 application produced stake l0pht merged stake 2000 stake acquired symantec 2004 symantec later stopped selling tool new customers citing us government export regulations discontinued support december 2006 january 2009 l0phtcrack acquired original authors zatko wysopal rioux symantec l0phtcrack 6 announced 11 march 2009 source boston conference l0phtcrack 6 contains support 64-bit windows platforms well upgraded rainbow tables support l0phtcrack 7 released 30 august 2016 seven years previous release l0phtcrack 7 supports gpu cracking increasing performance 500 times previous versions
[ 6412, 5194, 5272, 3842, 4759, 1928, 7175, 5571, 6022, 3592, 6411 ]
Test
6,158
2
Nintendo_3DS_system_software:nintendo 3ds system software nintendo 3ds system software set updatable firmware versions software frontend nintendo 3ds family video game consoles updates downloaded via system internet connection allow nintendo add remove features software updates also include changes previous updates home menu graphical shell similar nintendo dsi menu wii u menu nintendo 3ds nintendo 2ds systems used launch software stored nintendo ds nintendo 3ds game cards applications installed sd card dsiware titles installed system ’ internal memory application icons set grid navigable touchscreen d-pad may re-arranged via drag-and-drop amount icons per column also changed 1 icon 6 menu display 120 application tiles upper screen special 3d animated logo displayed individual app well system information wireless signal strength date time battery life bottom screen application icons displayed also possible change screen brightness menu using home button users suspend current software running bring home menu allowing user launch certain multitasking applications internet browser miiverse similarly nintendo dsi menu upgradeable firmware game cards also hot-swapped menu power button prompts user either put console sleep mode shut april 25 2012 system update brought introduction folder system 60 folders created applications dragged top folder order move apps added folder using procedure 60 apps per folder title folder automatically created order creation 1 60 name also edited user first character title displayed folder icon apps inside folders receive streetpass spotpass notifications notification icon appear top folder june 20 2013 system update brought introduction save data backup feature feature allows user back save data downloadable nintendo 3ds software virtual console games creating backup save data allows users delete software sd card without losing save data backup created automatically restored user re-downloads software nintendo eshop total 30 save data backups stored time possible back save data retail versions nintendo 3ds software dsiware game boy advance software october 6 2014 9.0 system update brought revamp entire home menu exception multitasking applications also adding support themes allowing users customize home menu theme adds new backgrounds changes folder icons background music sound effects match theme new application called nintendo badge arcade released december 2014 japan november 2015 america europe allows yet customizing menu using badges pay-to-play crane game badges accessed/used via additional menu within home menu installed upon loading game placed removed like normal software icons/folders badges act shortcuts access specific pre-installed applications streetpass mii plaza nintendo 3ds camera built-in photo video recorder integrated media gallery photo editing functionality app uses system ’ two front-facing cameras take 3-d photos user-facing camera take regular 2-d photos photographs taken resolution 640 × 480 px vga 0.3 megapixels addition manual recording controls timers set take photo three ten seconds pressing take button means voice commands saying ok wishing take photo sd cards hold 3,000 photos photo data size vary number may reduced two may decrease various options filters available taking photos recording video addition normal mode low-light option useful taking photos recording video dark lighting conditions options include manual controls color type normal black white sepia negative solarize sharpness contrast brightness real-time photo filters also available including sparkle adds moving stars photo dream adds dream-like bright light photo pinhole lightens center screen darkens edges mystery adds random finish photo also special mode called merge takes photo user facing inner camera merges photo someone facing outer cameras december 7 2011 system update added ability record 3-d video along three special recording options interval shot allows sequences images recorded short-timed intervals create time-lapse photography frame pick edits still images together create stop motion animation montage lets user pause resume recording seamlessly videos recorded 10 minutes sd card ’ enough space available shooting time reduced however recording modes allow single video ten minutes long despite advanced predecessor software fewer features predecessor nintendo dsi camera even ’ enough free space sd card hold maximum combined total 3,000 photos videos nintendo 3ds sound built-in music player sound recorder supported audio codecs include mp3 audio .mp3 filename extensions aac audio .mp4 .m4a .3gp filename extensions audio files played sd card visualizations displayed upper screen music played console sleep mode using system ’ headphone jack using headphones included mic button button toggle play/pause skip next previous track set sound manipulation options available well several audio filters ten-second voice recordings also recorded edited audio filters manipulated modulation playback speed users may save modify 18 console ’ memory 180 sd card used throughout applications swapnote ’ streetpass function built-into app user streetpass ’ someone also streetpass enabled users exchange song data song ’ name artist album release year many times ’ played also compatibility chart users involved depending amount matching songs users score displayed ranging 0 100 latter compatible despite advanced predecessor software features fewer filters themes predecessor nintendo dsi sound nintendo 3ds uses friend code system much like original wii connect network exception one code necessary console makes much easier flexible players interact internet regardless nintendo network services require nintendo network id account order accessed nintendo eshop miiverse account shared wii u nintendo switch nintendo network administration team moderators staff remove inappropriate content services miiverse streetpass close proximity data exchange functionality allows game content exchanged nintendo 3ds systems using console background connectivity sleep mode nintendo 3ds automatically discover nintendo 3ds systems within range establish connection exchange content mutually played games transparently without requiring user input example user passes someone software initiate battle collect trophies application streetpass content stored one twelve data slots console using data slot nintendo 3ds users readily share exchange content multiple games time whenever connected regardless game card currently console spotpass always background network connectivity system automatically seek connect wireless network nodes wi-fi hotspots sending downloading information background sleep mode playing game spotpass also makes uses certified hotspots partners north america cloud united kingdom users able connect hotspots automatically free charge content downloaded via spotpass include full game application downloads firmware updates patches specific in-game content customized fit user preferences including opting altogether selected software application similar e-book reader considered use functionality automatically acquire magazine newspaper articles august 5 2013 system update introduced new feature called streetpass relay feature allows users exchange streetpass data passing certified nintendo zone hotspot last nintendo 3ds user pass hotspot streetpass enabled united states 29,000 street pass relay points europe set see approximately 30,000 day later feature also became available japan date streetpass relay points updated north america europe allow six users stored exchange instead one streetpass mii plaza streetpass application comes pre-installed every nintendo 3ds system players meet players miis streetpass online nintendo network interact application player mii customized hats earned mini games along short customizable message information new mii characters encountered system appear plaza gate player use play various mini games encountering mii characters meeting mii characters multiple times adds extra functionality personalized messages ability rate application comes three minigames minigames purchased optionally nintendo zone viewer built-in application detects makes use certified spotpass hotspots hotspot detected notification would appear system home menu application users could see game trailers game screenshots download game demos view information current upcoming nintendo 3ds titles player leaves hotspot app remains nintendo 3ds system although content accessed nintendo 3ds firmware run four different modes native_firm native running firmware nintendo 3ds software including home menu safe_mode_firm used safe mode applications system settings system updater twl_firm nintendo dsi native firmware used nintendo ds/dsi backward compatibility finally agb_firm game boy advance native firmware used run game boy advance virtual console games native_firm different new nintendo 3ds nomenclature firmware version shown 3ds system settings divided three parts first three numbers separated periods represent firmware version without eshop features one stored retail cartridges number dash represents improvements related eshop obtained via online update finally letter end represents region console possible letters china c europe australia e japan j south korea k taiwan americas u six regions exclusive firmware releases gaming platforms nintendo gaming platforms generation gaming platforms seventh generation
[ 7514, 3081, 2187, 3835, 4400, 3097, 5116, 474, 2564, 728, 481, 3457, 5391, 2300, 5486, 5579, 740, 5236, 6294, 5062, 1399, 3039, 1582, 5068, 2503, 2240, 424, 7030, 5872, 7126, 2520, 4549, 2071, 349, 5794, 786, 6158, 7956 ]
Test
6,159
3
Elite_(video_game):elite video game elite space trading video game written developed david braben ian bell originally published acornsoft bbc micro acorn electron computers september 1984 elite open-ended game model revolutionary 3d graphics led ported virtually every contemporary home computer system earned place classic genre maker gaming history game title derives one player goals raising combat rating exalted heights elite elite one first home computer games use wire-frame 3d graphics hidden line removal added graphics twitch gameplay aspects genre established 1974 game star trader another novelty inclusion dark wheel novella robert holdstock gave players insight moral legal codes might aspire game followed sequels 1993 1995 introduced newtonian physics realistic star systems seamless freeform planetary landings third sequel elite dangerous began crowdfunding 2012 launched 16 december 2014 following period semi-open testing elite proved hugely influential serving model games including grand theft auto eve online freelancer x series man sky non-acorn versions first published firebird imagineer subsequently frontier developments claimed game game frontier part back catalogue rights game owned david braben player initially controls character commander jameson though name changed time game saved player starts lave station 100 credits lightly armed trading ship cobra mark iii ships player encounters similarly named snakes reptiles credits accumulated number means include piracy trade military missions bounty hunting asteroid mining money generated enterprises allows player upgrade ship enhancements better weapons increased cargo capacity automated docking system extra energy bank game universe stars single planets space station orbit stars always separated interstellar distances effectively untraversable using ship sublight engines travel stars accomplished hyperspace jumps constrained within range limited fuel capacity maximum 7 light years ship hyperdrive sublight fuel capacity apparently infinite fuel replenished docking space station requires matching ship rotation station entering docking bay task avoided purchasing docking computer equipment upgrades include fuel scoop allows raw fuel skimmed surface stars described manual dangerous difficult activity practice fairly simple process far easier manually docking space station—and collecting free-floating cargo canisters escape capsules liberated destruction ships making hyperspace jump star systems antagonistic thargoid insect race may intercept player half way forcing player ship remain witch-space battle smaller invasion ships interrupted jump uses full journey fuel player may insufficient fuel subsequently jump nearby planet trapping witch-space must use escape capsule owned abort game reload extremely expensive one-shot galactic hyperspace upgrade permits travel eight galaxies game universe little practical difference different galaxies however versions necessary travel least second galaxy access game missions planetary layout galaxies different many players discovered trade runs closely positioned planets fortuitous economic combinations versions elite included several optional missions galactic navy one requires tracking destroying stolen experimental ship another involves transporting classified information thargoids home planet thargoid invasion ships best see succeed throughout duration mission involving multiple interplanetary jumps rewards differed depending mission cash gems esoteric hardware cloaking device according braben bell elite inspired range sources developers refer star wars hitchhiker guide galaxy original battlestar galactica influences braben also cites works larry niven jerry pournelle arthur c. clarke robert l. forward isaac asimov orson scott card thought much game content derived traveller tabletop role-playing game including default commander name jameson david braben denied several times developers met jesus college cambridge bell already working game acornsoft called freefall braben started writing game called fighter yet completed two projects sufficiently similar braben bell compared notes seeing star raiders atari 800 decided collaborate produce eventually became elite first approached thorn emi company rejection letter stated game complicated needed finishable 10 minutes three lives braben bell met acornsoft demo elite combat docking sequences impressed managing director david johnson-davies acornsoft executives company agreed publish finished game although company feared ambitious braben bell uncertain merits two developers instead one single game game took two years write started 3d arcade game without trading element written machine code using assembly language giving much care maximum compactness code last part added 3d radar display fitted last unused bytes computer original bbc version used novel split screen approach show four colours onscreen simultaneously upper two thirds screen displayed mode 4 lower part mode 5 subsequent electron version ran entirely mode 4 video chips 100 compatible therefore black white elite universe contains eight galaxies 256 planets explore due limited capabilities 8-bit computers worlds procedurally generated single seed number run fixed algorithm appropriate number times creates sequence numbers determining planet complete composition position galaxy prices commodities name local details text strings chosen numerically lookup table assembled produce unique descriptions planet carnivorous arts graduates means extra memory needed store characteristics planet yet unique fixed properties galaxy also procedurally generated first braben bell first intended 2 galaxies acornsoft insisted smaller universe hide galaxies mathematical origins however use procedural generation created problems number poorly located systems reached galactic hyperspace— 7 light years nearest neighbour thus trapping traveller braben bell also checked none system names profane removing entire galaxy finding planet named arse developers spend much time playing creation quality testing mostly performed acornsoft director marketing david johnson-davies also planned packaging marketing campaign time original bbc micro disk version uses non-standard disk-format copy protection relied specific osword 7f dfs opcodes intel 8271 floppy-disk controller directly access disk produce non-standard sector/track-layout causes issues legitimate customers use western digital 1770 disk-controller dfs roms third-party manufacturers watford electronics acorn subsequently released alternative versions bbc disks compatible wd1770 addition self-modifying code used part protection system created rob northen bbc disk-copy-protection also used superior software exile game acornsoft set motion large-scale publicity campaign commissioned presentational package game far elaborate normal acornsoft packaged elite box larger usual releases complete novella robert holdstock called dark wheel 64-page space trader flight training manual reference card ship identification poster flight training manual written style took rookie trader controls various aspects play dark wheel first novella included distribution video game original acornsoft version promised back cover sequel novella planned publication 1985 direct sequel ever written second novella imprint andy redman included ibm pc release elite plus apart set universe way connected original story marketing activities included £50,000 promotional budget acornsoft including television advertising launch party thorpe park theme park holding event video game almost unheard time competition among first achieve status elite story tells young starship pilot named alex ryder whose father jason killed merchant ship attacked notorious pirate trying understand avenge father death achieve iron ass space-trader term well armed- armoured spaceship alex encounters basics elite universe—including combat hyperdrive hyperspace deadly aliens called thargoids finally alex discovers truth father combat rank also acts acceptable face trading due female co-pilot elyssia fields alien species wanted several systems alex wants avenge father death must exercise caution tracking assassin trading commodities slowly improves arms armour ship competent using spaceship combat feels ready makes trade sure bring father killer alex also learns dark wheel takes join ranks first version game released bbc micro model b tape disk month two later acorn electron tape version released electron limitations meant several game features cut including thargoids suns neither bbc electron tape versions featured missions additionally original tape version electron contained bug stopped galactic hyperspace working acorn provided mail-in tape-replacement service upgrade v1.1 marked tape label fixed bug bbc b disk version referred classic elite would load new set ships every hyperspace jump space station launch meaning larger number ships available new disk version released superior software 1986 enhanced take advantage bbc micro model b successors including bbc micro model b+ master 128 computers optional 6502 second processor sideways ram fitted case game used modes 1 2 make colours available great commercial success bbc micro version prompted bidding war rights publish elite formats british telecom software arm telecomsoft eventually eventually ported virtually every contemporary home computer system including amiga atari st apple ii amstrad cpc commodore 64 zx spectrum msx tatung einstein ibm pc compatible console version released 1991 nintendo entertainment system nes version released exclusively europe according developers n't released north america could find publisher game north america versions slightly altered gameplay characteristics number missions offered player contemporary versions home computers based 6502 microprocessor ported either bell bell braben commodore 64 conversion introduced trumbles creatures based tribbles docking computer activated commodore 64 version versions musical rendition blue danube waltz played nod space docking sequence stanley kubrick 1968 film music arranged david dunn zx spectrum version programmed torus included supernova mission found version amstrad cpc conversion port zx version fewer ships platforms lacking anaconda transport along minor differences missions titles according lead programmer 16 bit amiga/atari st msx conversions rob nicholson access source code contractual issues write blind ship shapes procedural generation code galaxies elite plus released dos 1991 whereas original elite 1987 pc used cga graphics elite plus upgraded take advantage ega vga mcga coded entirely assembly language chris sawyer later wrote rollercoaster tycoon elite plus ninth galaxy reached hyperspacing witch space elite plus published microplay software acorn archimedes version arcelite 1991 written warren burch clive gringras regarded stuff magazine best conversion original game added intelligent opponents engage private battles police take active interest protecting law well gameplay enhancements version also exploited modern hardware using polygon mesh graphics place wire-frames game world longer seems centred around player freighter fleets escorts go business pirate formations patrol lawless systems looking cargo loot mining ships often found breaking asteroids mineral content unlike mythical generation ships original rare occurrences non-pirate entities mentioned manual really found archimedes version geometric formations space beacons hermits living among asteroids abandoned ships towed police although dredgers generation ships confirmed exist archimedes elite archimedes version elite originally written space trading game called trojan however obvious similarities eventually meant avoid potential lawsuit trojan become official elite conversion arcelite one number games released free icon bar website 2006 versions feature new title archangel player earn substitutes rank commander archangel reached undertaking special mission destroy space station system invaded thargoids player reward completing mission receive title archangel obtain device capable emulating anti-ecm broadcast elite received positive reviews launch bbc micro version eventually sold 107,898 copies game popularity became national phenomenon uk reports airing channel 4 elsewhere elite firebird best-selling commodore game late 1987 bell estimates approximately 600,000 copies eventually sold platforms combined frontier developments elite page states numbers around million units elite technical breakthroughs reportedly amazed bbc micro developers sophie wilson calling game could n't written many players found gameplay difficult unfamiliar however game controversial micro user devoted april 1985 letter column readers debating review game beebug magazine 1984 david fell called elite best game ever bbc micro personal computer games shingo sugiura said elite vast complex absorbing 've got bulging red eyeballs staying early hours n't care 'm going continue playing ranked elite ... least competent ... even average ... buy john cook wrote december 1984 issue micro adventurer masterpiece difficult describe within existing parameters standards elite excellent game certainly top three year bbc standards simply best game ever written machine crash magazine said spectrum version elite one imaginative ever designed run home computer gave score 92 time best-seller gallup charts game number 16 sinclair top 100 speccy games 1992 voted number 7 sinclair readers top 100 games time 1993 voted 9th best game time readers retro gamer magazine article scheduled special sinclair tribute issue similarly zzap 64 gave commodore 64 version 97 stating brilliant game blasting trading certainly best game 've seen year 1985 amiga version 98 1989 1984 elite received golden joystick award best original game 1985 game awarded best game overall year readers crash magazine elite ranked 14 top game time next generation 1996 12 ign 2000 top 25 pc games time list 3 influential video game ever times online 2007 6 greatest game stuff magazine 2008 1 top retro game retro gamer 2004 1 best game 1980s next generation 2008 game retrospectively awarded 10/10 multi-format magazine edge —together 2 games— exhibited places london science museum game exhibition organised toured barbican art gallery elite also featured game pong oblivion 50 greatest video games time authors simon byron ste curran david mccarthy 1991 pc format placed elite plus list 50 best computer games time editors called classic game mixes solid 3d space combat trading create universe spend many happy half-hour bushwhacking dastardly thargoids elite often regarded yardstick subsequent space trading games measured since release elite credited title defined modern space flight simulation genre significant source inspiration later games genre well influential upon gaming whole interviews senior producers ccp games cited elite one inspirations acclaimed mmorpg eve online developers jumpgate evolution battlecruiser 3000ad infinity quest earth hard truck apocalyptic wars flatspace likewise credited elite source inspiration similar praise bestowed elsewhere media years named one influential games history credited first truly open-ended open world game opening door future online persistent worlds second life world warcraft eve online elite one popularly requested games remade arguing still best example genre date recent titles—including immediate sequel—not rising level november 1999 game 15th birthday ian bell released many binaries source code several versions original game website dispute arose bell david braben regarding bell decision make available versions original elite dispute since ended various versions became available bell site late 1980s variant commercial bbc micro elite release created angus duggan disassembling modifying 6502 code existing many extra features originally titled elite iii known elite minimise confusion includes many ship types ship types flyable player begins less capable adder cargo delivery missions extra equipment items numerous gameplay improvements elite released publicly 1997 like original game downloaded free ian bell web site played emulation many attempts develop clones elite made abandoned completion otherwise failed come fruition open source oolite notable exception another successful adaptation 1337 meaning elite leetspeak developed jose maria enguita oric machines 2010 oldschool gaming game year award contrasting conversions around 1999 christian pinder developed elite new kind modern pc port original bbc micro version achieved faithful port reverse-engineering original assembly written bbc micro version recreating platform neutral c code variant david braben request version withdrawn distribution 2003 september 2014 elite 30th birthday ian bell blessed elite new kind re-released free website since elite new kind also distributed version 1.1 christian pinder source code mirror hosted github 20 october 2013 internet archive started offer elite zx spectrum version online playing browser via mess emulation three official sequels created 1993 elite iii 1995 produced braben company frontier developments third sequel elite dangerous conceived 1998 provisionally titled elite 4 successfully crowdfunded initially kickstarter campaign late 2012 released december 2014 bell limited involvement first sequel involved production second frontier games considerable advance original elite filled 3d graphics missions complex economy time player confined orbit could land explore mine planets number flyable ships greatly increased new political backstory introduced enabling player gain ranks competing interstellar empires frontier elite ii appeared commodore amiga atari st ibm pc whilst frontier first encounters released ibm pc two frontier games significantly flawed number respects games many bugs first encounters particular due apparently published incomplete state first encounters extensively patched reissued finally withdrawn sale followed lawsuit brought gametek david braben two games employed realistic flight model based newtonian mechanics rather original arcade-style engine realistic many players also found frustratingly difficult particularly combat space trading games since elite stuck arcade-style flight model ships behave though flying atmosphere elite dangerous added multiplayer extended use procedural generation allowing players fly survey every non-atmospheric planet every size galaxy containing billions stars elite dangerous also offers newtonian flight model well arcade one player able choose using 'flight assist
[ 336, 7093, 4277, 2189, 263, 5787, 7588, 5862, 5190, 2123, 7848, 4060, 1435 ]
Test
6,160
2
ISIS_(operating_system):isis operating system isis short intel system implementation supervisor operating system early intel microprocessors like 8080 originally developed ken burgett new management bill davidow intel microprocessor development system starting 1975 later adopted isis-ii systems floppy drives communication user terminal-like user interface somewhat cp/m-like even program interface point view file opening program sends name file gets back handle device name entered pair colons codice_1 codice_2 floppies codice_3 printer etc. diskette one directory subdirectories isis-ii distributed part intel microprocessor development system includes standard operating system commands copy delete dir rename format debugging software assembler linker debugger external debugging developed device two editors one aedit contains editing macros support file editing provided directly diskette .bak file always created editor credit isis-ii needed least 32 kilobytes ram 8080/8085 cpu maximum address space 64 kilobytes mds-800 series-ii monitor occupied f800h ffffh floppy disk format 8-inch single-sided 250 kb single-sided single-density fm 500 kb single-sided double-density mmfm isis-pds also software media incompatible unique came 720 kb dsdd 5¼-inch floppies intel personal development system ipds-100 isis-iv operating system another incompatible even intel development systems ran imdx-430 series-iv network development system-ii intel asm80 plm-80 basic-80 cobol-80 fortran-80 available isis-ii asm86 asm48 asm51 available well following list commands supported isis-ii console
[ 1522, 3210, 6088, 336, 3905 ]
Test
6,161
2
TurboPrint:turboprint turboprint closed source printer driver system linux amigaos morphos supports number printers n't yet free driver fuller printer functionality printer models recent versions integrates cups printing system
[ 6431, 3099, 2815, 7384, 5571, 5833, 5660, 5661, 578 ]
Test
6,162
4
Risk-based_authentication:risk-based authentication authentication risk-based authentication non-static authentication system takes account profile agent requesting access system determine risk profile associated transaction risk profile used determine complexity challenge higher risk profiles leads stronger challenges whereas static username/password may suffice lower-risk profiles risk-based implementation allows application challenge user additional credentials risk level appropriate
[ 1249, 3884, 6944, 3461, 5725, 3794, 5074, 7576 ]
Test
6,163
3
Jewels_of_Darkness:jewels darkness jewels darkness formerly middle-earth trilogy trilogy text adventure games level 9 individual games initially released separately 1983 featured themes inspired books j. r. r. tolkien became known middle-earth trilogy 1986 three games revised expanded rereleased together compilation legal reasons references middle-earth removed trilogy retitled jewels darkness games featured simple static graphics expanded version original adventure crowther woods similar structure previous game player must defeat dark lord continuation previous game following defeat dark lord player must explore tower looking treasure computer gaming world stated compilation claim games significantly revised incorporate latest innovative techniques false described puzzles illogical commodore version graphics crude like parser standard previous firebird text adventures graphics colourful 're great works art location descriptions scenarios always struck good enough br zzap issue sept. 1986
[ 6380, 6030 ]
Test
6,164
2
Windows_Mobility_Center:windows mobility center windows mobility center component microsoft windows introduced windows vista centralizes information settings relevant mobile computing mobility center displayed device settings pertinent mobile devices first shown windows hardware engineering conference 2004 based activity center user interface design originated microsoft abandoned windows neptune project slated inclusion windows vista known codename longhorn windows mobility center user interface consists square tiles contain information settings related component audio settings battery life power schemes display brightness wireless network strength status tiles appear within interface depend hardware system device drivers windows mobility center located windows control panel also launched pressing keys windows vista 7 default wmc inaccessible desktop computers limitation bypassed one modifies windows registry windows mobility center extensible original equipment manufacturers customize interface additional tiles company branding though supported microsoft possible individual developers create tiles interface well
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, 3407, ...
Test
6,165
3
Apple_A8X:apple a8x apple a8x 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared ipad air 2 announced october 16 2014 variant a8 inside iphone 6 family smartphones apple states 40 cpu performance 2.5 times graphics performance predecessor apple a7 a8x three cores clocked 1.5 ghz powerful gpu compared a8 contains 3 billion transistors extra 100 mhz additional core a8x performs around 13 better single threaded 55 better multithreaded operations a8 inside iphone 6 iphone 6 plus comparison a8 shows a8x uses metal heat spreader a8 n't use package package configuration included ram a8 similar older x variants a5x a6x designed instead a8x ipad air 2 uses external 2 gb ram module first apple a8x reported semi-custom gpu a8x uses 8-cluster gpu based imagination technologies powervr series 6xt architecture officially largest implementation rogue 6-cluster design indicating apple made customizations design order provide higher performance gpu referred gxa6850 denoting apple customization a8x branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016
[ 6788, 6421, 7890, 5732, 722, 1799, 1094, 5737, 2926, 4690, 5037, 5740, 1473, 5750, 740, 5752, 405, 5405, 5406, 1864, 6125, 2954, 7572, 6482, 6847, 67, 6142, 2609, 4373, 7226, 4376, 2978, 446, 4749, 5450, 7601, 451, 3346, 4389, 5463, 102...
Test
6,166
0
Word-sense_induction:word-sense induction computational linguistics word-sense induction wsi discrimination open problem natural language processing concerns automatic identification senses word i.e meanings given output word-sense induction set senses target word sense inventory task strictly related word-sense disambiguation wsd relies predefined sense inventory aims solve ambiguity words context output word-sense induction algorithm clustering contexts target word occurs clustering words related target word three main methods proposed literature underlying hypothesis approach words semantically similar appear similar documents similar context windows similar syntactic contexts occurrence target word corpus represented context vector context vectors either first-order vectors directly represent context hand second-order vectors i.e. contexts target word similar words tend co-occur together vectors clustered groups identifying sense target word well-known approach context clustering context-group discrimination algorithm based large matrix computation methods word clustering different approach induction word senses consists clustering words semantically similar thus bear specific meaning lin ’ algorithm prototypical example word clustering based syntactic dependency statistics occur corpus produce sets words discovered sense target word clustering committee cbc also uses syntactic contexts exploits similarity matrix encode similarities words relies notion committees output different senses word interest approaches hard obtain large scale many domain languages main hypothesis co-occurrence graphs assumes semantics word represented means co-occurrence graph whose vertices co-occurrences edges co-occurrence relations approaches related word clustering methods co-occurrences words obtained basis grammatical collocational relations hyperlex successful approaches graph algorithm based identification hubs co-occurrence graphs cope need tune large number parameters deal issue several graph-based algorithms proposed based simple graph patterns namely curvature clustering squares triangles diamonds squat++ balanced maximum spanning tree clustering b-mst patterns aim identifying meanings using local structural properties co-occurrence graph randomized algorithm partitions graph vertices iteratively transferring mainstream message i.e word sense neighboring vertices chinese whispers applying co-occurrence graphs approaches shown achieve state-of-the-art performance standard evaluation tasks
[ 1314, 5429, 282, 3158, 4037 ]
Test
6,167
8
Jinja_(template_engine):jinja template engine jinja web template engine python programming language licensed bsd license created armin ronacher similar django template engine provides python-like expressions ensuring templates evaluated sandbox text-based template language thus used generate markup well sourcecode jinja template engine allows customization tags filters tests globals also unlike django template engine jinja allows template designer call functions arguments objects jinja flask default template engine also used ansible features jinja jinja like smarty also ships easy-to-use filter system similar unix pipeline small example template file example.html.jinja templating code produces html string
[ 6489, 5965, 3495, 6791, 7333, 5931, 7848 ]
Validation
6,168
2
U3_(software):u3 software u3 joint venture sandisk m-systems producing proprietary method launching windows software special usb flash drives flash drives adhering u3 specification termed u3 smart drives u3 smart drives come preinstalled u3 launchpad looks similar windows os start menu controls program installation applications comply u3 specifications allowed write files registry information host computer must remove information flash drive ejected customizations settings instead stored application flash drive microsoft sandisk created successor called startkey sandisk began phasing support u3 technology late 2009 u3 flash drive presents host system usb hub cd drive standard usb mass storage device attached u3 launchpad launchu3.exe windows program manager preinstalled every u3 smart drive u3 launchpad automatically starts insertion u3 enabled device fully u3 compliant application programmed clean data local machine must also packaged u3 special program format u3 applications run u3 device u3 programs downloaded u3 website places applications include opera skype need installed computer u3 application programming interfaces apis allow u3 programs lower-level access usb flash drive query drive letter u3 apis primarily allow developers choose use power u3 control application handles things like device removal saves data back drive configuration documents latest version u3 launchpad supports windows 2000 service pack 4 windows xp windows vista windows 7 windows 8 data accessed using os capable reading usb mass storage devices unless u3 device password-protected early versions u3 launchpad software vista compatibility issues specifically sandisk cruzer titanium series device numbers 2.17 2.18 2.19 2.20 although problem could eliminated updating launcher software prior sandisk updated launcher software released microsoft supported u3 releasing update vista information building u3 compliant applications u3 software development kit available registered developers official u3 website individuals must register company download sdk participate forums applications require installation steps order run easily utilize u3 little modification taking steps either modify host systems files registry undoing changes application terminates wizard packages distribution files creates special manifest file provided may 2009 software development kit longer available u3.com website longer available reformatting drive remove software hidden system folder virtual cd-rom drive removed reformatting presented host system physical device attached usb hub official u3 launchpad removal software available u3 website disabled virtual cd drive device leaving usb mass storage device active u3 usb hub controller point remaining software removed subsequent format performed removal software u3_tool another option includes ability remove virtual cd-rom drive well ways reconfigure user liking numerous criticisms made u3 platform criticisms
[ 1710, 6528, 4759, 3271, 788 ]
Test
6,169
3
IBM_ThinkPad_760:ibm thinkpad 760 ibm thinkpad 760 notebook computer introduced 1995 ibm corporation market part thinkpad 700-series succeeded 1998 thinkpad 770 series 760 -series ibm thinkpad available time production state art notebook available public ibm featured advanced mobile technology came standard latest hardware available laptops notebooks time used intel pentium processor utilized edo ram soldered onto motherboard prevent booting without usable ram ability easily exchange critical hardware components hard drive battery option hardware fit ultrabay ram model also featured unique keyboard could slide upward back side rails flip towards user provide ergonomic feel note model number signifies machine updated chassis provision fitment cd-rom drive using adapter plate internal floppy disk drive models without n't officially come updated chassis
[ 4148, 6170, 7670 ]
Test
6,170
3
P5_(microarchitecture):p5 microarchitecture first pentium microprocessor introduced intel march 22 1993 dubbed p5 microarchitecture fifth generation intel first superscalar ia-32 microarchitecture direct extension 80486 architecture included dual integer pipelines faster floating-point unit wider data bus separate code data caches features reduced address calculation latency 1996 pentium mmx technology often simply referred pentium mmx introduced basic microarchitecture complemented mmx instruction set larger caches enhancements p5 pentium competitors included motorola 68060 powerpc 601 well sparc mips alpha microprocessor families also used superscalar in-order dual instruction pipeline configuration time intel larrabee multicore architecture project uses processor core derived p5 core p54c augmented multithreading 64-bit instructions 16-wide vector processing unit intel low-powered bonnell microarchitecture employed early atom processor cores also uses in-order dual pipeline similar p5 intel discontinued p5 pentium processors downgraded entry-level product since pentium ii debuted 1997 1999 favor celeron processor also replaced 80486 brand p5 microarchitecture designed santa clara team designed 386 486 design work started 1989 team decided use superscalar architecture on-chip cache floating-point branch prediction preliminary design first successfully simulated 1990 followed laying-out design time team several dozen engineers design taped transferred silicon april 1992 point beta-testing began mid-1992 p5 team 200 engineers intel first planned demonstrate p5 june 1992 trade show pc expo formally announce processor september 1992 design problems forced demo cancelled official introduction chip delayed spring 1993 john h. crawford chief architect original 386 co-managed design p5 along donald alpert managed architectural team dror avnon managed design fpu vinod k. dham general manager p5 group p5 microarchitecture brings several important advancements preceding i486 architecture pentium designed execute 100 million instructions per second mips 75 mhz model able reach 126.5 mips certain benchmarks pentium architecture typically offered twice performance 486 processor per clock cycle common benchmarks fastest 80486 parts slightly improved microarchitecture 100 mhz operation almost powerful first-generation pentiums amd am5x86 roughly equal pentium 75 regarding pure alu performance early versions 60–100 mhz p5 pentiums problem floating-point unit resulted incorrect predictable results division operations bug discovered 1994 professor thomas nicely lynchburg college virginia became known pentium fdiv bug caused embarrassment intel created exchange program replace faulty processors soon afterwards discovered bug could allow malicious program crash system without special privileges f00f bug fortunately operating systems able implement workarounds prevent crashes 60 66 mhz 0.8 µm versions p5 pentium processors also time high heat production due 5 v operation p54c used 3.3 v significantly lower power draw 51 quadratic relationship p5 pentiums used socket 4 p54c started socket 5 moving socket 7 later revisions desktop pentiums p54cs onwards used socket 7 pentium intel primary microprocessor personal computers mid-1990s original design reimplemented newer processes new features added maintain competitiveness well address specific markets portable computers result several variants p5 microarchitecture first pentium microprocessor core code-named p5 product code 80501 80500 earliest steppings q0399 two versions specified operate 60 mhz 66 mhz respectively first implementation pentium used traditional 5-volt power supply descended usual ttl logic compatibility requirements contained 3.1 million transistors measured 16.7 mm 17.6 mm area 293.92 mm fabricated 0.8 µm bicmos process 5-volt design resulted relatively high energy consumption operating frequency compared later models p5 followed p54c 80502 also known pentium-s versions specified operate 75 90 100 mhz using 3.3 volt power supply first pentium processor operate 3.3 volts reducing energy consumption employed internal clock multiplier let internal circuitry work higher frequency external address data buses complicated cumbersome increase external frequency due physical constraints also allowed two-way multiprocessing integrated local apic well new power management features contained 3.3 million transistors measured 163 mm fabricated bicmos process described 0.5 µm 0.6 µm due differing definitions p54c followed p54cqs operated 120 mhz fabricated 0.35 µm bicmos process first commercial microprocessor fabricated 0.35 µm process transistor count identical p54c despite newer process identical die area well chip connected package using wire bonding allows connections along edges chip smaller chip would required redesign package limit length wires edges chip would away pads package solution keep chip size retain existing pad-ring reduce size pentium logic circuitry enable achieve higher clock frequencies p54cqs followed p54cs operated 133 150 166 200 mhz contained 3.3 million transistors measured 90 mm fabricated 0.35 µm bicmos process four levels interconnect p24t pentium overdrive 486 systems released 1995 based 3.3 v 0.6 µm versions using 63 83 mhz clock since used socket 2/3 modifications made compensate 32-bit data bus slower on-board l2 cache 486 motherboards therefore equipped 32 kb l1 cache double pre-p55c pentium cpus p55c 80503 developed intel research development center haifa israel sold pentium mmx technology usually called pentium mmx although based p5 core featured new set 57 mmx instructions intended improve performance multimedia tasks encoding decoding digital media data pentium mmx line introduced october 22 1996 new instructions worked new data types 64-bit packed vectors either eight 8-bit integers four 16-bit integers two 32-bit integers one 64-bit integer example paddusb packed add unsigned saturated byte instruction adds two vectors containing eight 8-bit unsigned integers together elementwise addition would overflow saturates yielding 255 maximal unsigned value represented byte rather specialized instructions generally require special coding programmer used changes core include 6-stage pipeline vs. 5 p5 return stack first done cyrix 6x86 better parallelism improved instruction decoder 32 kb l1 cache 4-way associativity vs. 16 kb 2-way p5 4 write buffers could used either pipeline vs. one corresponding pipeline p5 improved branch predictor taken pentium pro 512-entry buffer vs. 256 p5 contained 4.5 million transistors area 140 mm fabricated 0.28 µm cmos process metal pitches previous 0.35 µm bicmos process intel described 0.35 µm similar transistor density process four levels interconnect p55c compatible common socket 7 motherboard configuration voltage requirements powering chip differ standard socket 7 specifications motherboards manufactured socket 7 prior establishment p55c standard compliant dual intensity required proper operation chip intel temporarily manufactured upgrade kit called overdrive designed correct lack planning motherboard makers part pentium mmx notebook cpus used mobile module held cpu module pcb cpu directly attached smaller form factor module snapped notebook motherboard typically heat spreader installed made contact module however 0.25 µm tillamook mobile pentium mmx named city oregon module also held 430tx chipset along system 512 kb sram cache memory introduction pentium competitors nexgen amd cyrix texas instruments announced pentium-compatible processors 1994 cio magazine identified nexgen nx586 first pentium-compatible cpu pc magazine described cyrix 6x86 first followed amd k5 delayed due design difficulties amd later bought nexgen order help design amd k6 cyrix purchased national semiconductor later processors amd intel retain compatibility original pentium manuals provide overview pentium processor features
[ 5012, 6793, 3942, 5737, 5055, 2226, 1867, 766, 5784, 3674, 6152, 441, 2977, 2263, 1909, 5802, 1162, 6169, 4765, 3002, 818, 3020, 7990, 3717, 3385, 7280, 3040, 2685, 515, 7670, 4816, 4088, 3747, 4098, 1237, 2351, 4108, 3443, 7364, 2036, ...
Test
6,171
3
MOVAPD:movapd x86 assembly programming language movapd name specific action performable modern x86 processors 2nd-generation streaming simd extensions sse2 action involves copying pair numbers temporary space processor use computations movapd one fastest ways accomplish effect specifically movapd causes 16-byte-aligned packed-doubles source copied xmm register 16-byte memory region source operand either xmm register xmm2 memory address m128 destination operand either xmm register xmm1 memory address m128 note however source destination operands memory addresses memory address operand 16-byte-aligned general protection exception gp raised cause strange interoperability bugs ordinary code calls external code compiled assumption 16-byte-aligned stack frame boundary x86 instruction listings
[ 7465, 4611, 4215, 352, 4077, 1335, 5670 ]
Validation
6,172
9
ECMAScript:ecmascript ecmascript es scripting-language specification standardized ecma international ecma-262 iso/iec 16262 created standardize javascript foster multiple independent implementations javascript remained best-known implementation ecmascript since standard first published well-known implementations including jscript actionscript ecmascript commonly used client-side scripting world wide web increasingly used writing server applications services using node.js ecmascript specification standardized specification scripting language developed brendan eich netscape initially named mocha later livescript finally javascript december 1995 sun microsystems netscape announced javascript press release first edition ecma-262 adopted ecma general assembly june 1997 several editions language standard published since name ecmascript compromise organizations involved standardizing language especially netscape microsoft whose disputes dominated early standards sessions eich commented ecmascript always unwanted trade name sounds like skin disease javascript jscript aim compatible ecmascript also provide additional features described ecma specifications ten editions ecma-262 published work version 10 standard finalized june 2019 june 2004 ecma international published ecma-357 standard defining extension ecmascript known ecmascript xml e4x ecma also defined compact profile ecmascript – known es-cp ecma 327 – designed resource-constrained devices withdrawn 2015 proposed fourth edition ecma-262 ecmascript 4 es4 would first major update ecmascript since third edition published 1999 specification along reference implementation originally targeted completion october 2008 overview language released working group october 23 2007 august 2008 ecmascript 4th edition proposal scaled back project codenamed ecmascript harmony features discussion harmony time included intent features partly better support programming large allow sacrificing script ability dynamic improve performance example tamarin – virtual machine actionscript developed open sourced adobe – just-in-time compilation jit support certain classes scripts addition introducing new features es3 bugs proposed fixed edition 4 fixes others support json encoding/decoding folded ecmascript 5th edition specification work started edition 4 es-cp compact profile specification completed continued approximately 18 months slow progress made balancing theory netscape javascript 2 specification implementation experience microsoft jscript .net time focus shifted ecmascript xml e4x standard update without controversy late 2007 debate eich later mozilla foundation cto chris wilson microsoft platform architect internet explorer became public number blogs wilson cautioned proposed changes ecmascript made backwards incompatible respects earlier versions language update amounted breaking web stakeholders opposed changes hidden view eich responded stating wilson seemed repeating falsehoods blogs denied attempt suppress dissent challenged critics give specific examples incompatibility pointed microsoft silverlight adobe air rely c actionscript 3 respectively larger complex ecmascript edition 3 yahoo microsoft google 4th edition dissenters formed subcommittee design less ambitious update ecmascript 3 tentatively named ecmascript 3.1 edition would focus security library updates large emphasis compatibility aforementioned public sparring ecmascript 3.1 ecmascript 4 teams agreed compromise two editions would worked parallel coordination teams ensure ecmascript 3.1 remains strict subset ecmascript 4 semantics syntax however differing philosophies team resulted repeated breakages subset rule remained doubtful ecmascript 4 dissenters would ever support implement ecmascript 4 future year since disagreement future ecmascript within ecma technical committee 39 two teams reached new compromise july 2008 brendan eich announced ecma tc39 would focus work ecmascript 3.1 later renamed ecmascript 5th edition project full collaboration parties vendors would target least two interoperable implementations early 2009 april 2009 ecma tc39 published final draft 5th edition announced testing interoperable implementations expected completed mid-july december 3 2009 ecma-262 5th edition published 6th edition initially known ecmascript 6 es6 later renamed ecmascript 2015 finalized june 2015 update adds significant new syntax writing complex applications including class declarations class foo ... es6 modules like import modulename ... export const foo defines semantically terms ecmascript 5 strict mode new features include iterators for/of loops python-style generators arrow function expression ... codice_1 keyword local declarations codice_2 keyword constant variable declarations binary data typed arrays new collections maps sets weakmap promises number math enhancements reflection proxies metaprogramming virtual objects wrappers template literals strings complete list extensive first ecmascript harmony specification also known es6 harmony 7th edition officially known ecmascript 2016 finalized june 2016 major standard language features include block-scoping variables functions destructuring patterns variables proper tail calls exponentiation operator codice_3 numbers codice_4 codice_5 keywords asynchronous programming 8th edition officially known ecmascript 2017 finalized june 2017 includescodice_6constructions work using generators promises ecmascript 2017 es2017 eighth edition includes features concurrency atomics syntactic integration promises async/await 9th edition officially known ecmascript 2018 finalized june 2018 new features include rest/spread operators variables three dots codice_7 asynchronous iteration codice_8 additions regexp 10th edition officially known ecmascript 2019 published june 2019.. es.next dynamic name refers whatever next version time writing es.next features correctly called proposals definition specification finalized yet ecmascript language includes structured dynamic functional prototype-based features es6 brought new mode defining functions called arrow functions es5 function would defined var readwikiarticle function content whereas es6 using new concise arrow function syntax var readwikiarticle content arrow functions also improve variable binding functions since es 2015 transpiling javascript become common transpilation source source compilation newer versions javascript used user source code transpiler rewrites compliant current specification usually transpilers transpile es3 maintain compatibility versions browsers settings transpiling specific version configured according need transpiling adds extra step build process sometimes done avoid needing polyfills polyfills allow using functionalities newer ecma versions older environments lack polyfills runtime interpreter user browser server instead transpiling rewrites ecma code build phase development reaches interpreter 2010 ecma international started developing standards test ecma 262 ecmascript test262 ecmascript conformance test suite used check closely javascript implementation follows ecmascript 5th edition specification test suite contains thousands individual tests tests specific requirements ecmascript specification development test262 project ecma technical committee 39 tc39 testing framework individual tests created member organizations tc39 contributed ecma use test262 important contributions made google sputnik testsuite microsoft contributed thousands tests test262 testsuite already contains 11,000 tests developed ecmascript specifications es7 well-supported major web browsers table shows conformance rate current versions software respect recent editions ecmascript content test hosted official repository https //github.com/tc39/test262 date test suite harness web browsers accessed also https //v8.github.io/test262/website/default.html https //bakkot.github.io/test262-web-runner/ official repository also points community maintained projects using test suite test ecmascript javascript environments like node.js
[ 361, 2176, 6789, 4296, 3620, 6428, 16, 1435, 2214, 737, 1102, 6452, 38, 7557, 1114, 3985, 1116, 54, 422, 3663, 6497, 84, 1152, 6507, 2986, 4755, 6176, 109, 2285, 1543, 3363, 2658, 831, 3719, 6208, 3398, 5172, 3057, 7687, 2348, 538, 16...
Test
6,173
3
LGA_2011:lga 2011 lga 2011 also called socket r cpu socket intel released november 14 2011 replaces intel lga 1366 socket b lga 1567 performance high-end desktop server platforms socket 2011 protruding pins touch contact points underside processor lga 2011 socket uses qpi connect cpu additional cpus dmi 2.0 used connect processor pch memory controller 40 pci express pcie lanes integrated cpu secondary processor extra ×4 pcie interface replaces dmi interface predecessor lga 1366 provisioning integrated graphics socket supports four ddr3 ddr4 sdram memory channels three unbuffered registered dimms per channel well 40 pci express 2.0 3.0 lanes lga 2011 also ensure platform scalability beyond eight cores 20 mb cache lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors corresponding x79 e enthusiast class c600-series ep xeon class chipsets lga 2011-1 socket r2 updated generation socket successor lga 1567 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket r3 also referred lga 2011-3 another updated generation socket used haswell-e haswell-ep cpus released august september 2014 respectively updated socket generations physically similar lga 2011 different electrical signals ilm keying prevent backward compatibility older cpus intel cpu sockets use so-called independent loading mechanism ilm retention device apply specific amount uniform pressure required correctly hold cpu socket interface part design ilms differently placed protrusions intended mate cutouts cpu packagings protrusions also known ilm keying purpose preventing installation incompatible cpus otherwise physically compatible sockets preventing ilms mounted 180-degree rotation relative cpu socket different variants generations lga 2011 socket associated cpus come different ilm keying makes possible install cpus generation-matching sockets cpus intended mounted lga 2011-0 r lga 2011-1 r2 lga 2011-v3 r3 sockets mechanically compatible regarding dimensions ball pattern pitches designations contacts different generations lga 2011 socket cpus makes electrically logically incompatible original lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors lga 2011-1 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket used haswell-e haswell-ep cpus released august september 2014 respectively two types ilm exist different shapes heatsink mounting hole patterns m4 x 0.7 threads square ilm 80×80 mm mounting pattern narrow ilm 56×94 mm mounting pattern square ilm standard type narrow one alternatively available space-constrained applications matching heatsink required ilm type information intel x79 desktop c600 series workstations servers codenamed romley chipsets table romley ep platform delayed approximately one quarter allegedly due sas controller bug x79 appears contain silicon c600 series ecs enabled sas controller one boards even though sas officially supported intel x79 desktop processors lga 2011 2011-3 socket listed table x79 chipset allows increasing base clock bclk intel calls cpu strap 1.00× 1.25× 1.66× 2.50× cpu frequency derived bclk times cpu multiplier server processors lga 2011 socket listed table server processors lga 2011 socket server processors lga 2011-v3 socket listed tables one significant changes previous generation support ddr4 memory
[ 2541, 4123, 3849, 3443, 1729, 2828, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 5669, 5670, 584, 4968, 3385, 4972, 6647, 5853, 3565, 4077, 2685, 6935, 7484, 8021, 7302, 5963, 866, 3333, 7499, 7134, 262, 6683, 2977, 5886, 3248 ]
Test
6,174
2
Real_Time_AudioSuite:real time audiosuite real-time audiosuite rtas format audio plug-in developed digidesign currently avid technology pro tools le pro tools m-powered systems although run pro tools hd pro tools tdm systems rtas plug-ins use processing power host computer rather dsp cards used pro tools hd systems name suggests plug-in architecture designed run real-time mimicking hardware inserts traditional mixing console contrast rendering files time effects applied directly audio pro tools facilitated audiosuite plug-ins avid aax format runs native cpu pro tools hdx dsp replacement rtas april 7 2013 avid announced pro tools 11 version forward avid made aax plug-in format supported pro tools launch many third-party plug-in developers yet port software new aax format avid sell pro tools 11 11 10 license allowing users run pro tools 10.3.8 last version support rtas plug-ins employ form copy protection notably pace ilok dongle though plug-ins available free charge accompanying source code programming documentation available general public developers must contact avid sdk terms disclosure releasing information avid development materials making official rtas development incompatible open source software fxpansion stated rtas vst converter happen technical legal reasons
[ 4759, 5571, 578, 2085 ]
Test
6,175
2
SystemRescueCD:systemrescuecd systemrescuecd linux distribution x86 64 previously x86 computers primary purpose systemrescuecd repair un-bootable otherwise damaged computer systems system crash systemrescuecd intended used permanent operating system runs live cd usb flash drive type hard drive designed team led françois dupoux based arch linux starting version 6.0 provides x86-64 images based arch linux systemd init system increased size iso image longer fits one standard 700 mib cd requires either one dvd non-standard high-capacity cd 100-min writable cd using technique called overburning bootable media like usb flash drive systemrescuecd capable graphics using linux framebuffer option tools gparted uses version 4.19.20 linux kernel options connecting internet adsl modem ethernet graphical web browsers mozilla firefox systemrescuecd many features including cd also boot customized dvd almost 4.6 gb free space backed-up files makes good storing information needed hard drive formatting burn dvd one must burn image file first add separate files folders affect general way dvd works dvd used insert files hard drive using midnight commander
[ 2816, 5200, 4759, 1534, 1629, 2728, 3444, 7251, 474, 204, 7075, 5571, 1941, 5660, 578, 314, 5232, 5753, 2758, 1663, 2864, 6209, 7954, 6761, 768, 2063, 343, 4824, 5523, 7587, 5259, 1893, 1793, 2349, 352, 3751, 5530, 5704, 6317, 6244, 788...
Test
6,176
9
Google_Apps_Script:google apps script apps script scripting framework light-weight application development g suite platform based javascript 1.6 also includes portions 1.7 1.8 subset ecmascript 5 api apps script projects run server-side google infrastructure according google apps script provides easy ways automate tasks across google products third party services apps script also tool powers add-ons google docs sheets slides following code uses apps script ui services doclist services display contents google drive folder tree format notice use javascript use google web toolkit widgets google also introduced html service june 2012 alternative gwt widgets lets serve web pages interact server-side apps script functions embedding html gas gwt widget march 2014 google introduced add-ons docs sheets soon followed forms add-on stores let users add extra features google editors mail-merging workflows diagrams builders ... add-ons either 100 built apps script simply use apps script display ui google editors relying external backend perform tasks example mailchimp mail-merging tool add-on google docs communicates mailchimp platform send emails add-ons possible publish scripts google sheets script gallery users installed scripts gallery copy apps script code installed user sheet add-ons source code visible end user everyone using latest version published developer new approach make easier support existing code helped convince several companies mailchimp lucidchart invest apps script part add-ons release google also introduced ui style guide css package help developers built add-ons integrate smoothly editors add-on also reviewed google publication developers benefit advice googlers provide better user experience possible embed ads add-ons possible monetize
[ 2902, 3507, 4116, 2451, 5455, 6697, 4762, 3848, 3850, 5372, 6172, 7431, 7967, 6978, 993, 6427, 7346, 561, 201, 5476, 2107, 562, 2475, 5302, 2569, 831, 2037, 7007, 5141, 2040, 136, 2317, 2673, 8107, 3309, 2867, 7285, 6297, 2591, 2417, 26...
Validation
6,177
3
MIPS-X:mips-x mips-x microprocessor instruction set architecture developed follow-on project mips project stanford university team developed mips project supported defense advanced research projects agency started 1984 final form described set papers released 1986–87 unlike older cousin mips-x never commercialized workstation cpu mainly seen embedded designs based chips designed integrated information technology use digital video applications mips-x designed team architecturally similar instruction-set compatible mainline mips r-series processors processor obscure enough november 20 2005 support provided specialist developers green hills software notably missing gcc mips-x become important among dvd player firmware hackers since many dvd players especially low-end devices use chips based iit design produced ess technology central processor devices ess videodrive soc also include dsp co-processor decoding mpeg audio video streams programmer manual describes hsc instruction halt spontaneously combust instruction executed protection violation detected present -nsa variant processor platforms type instruction known halt catch fire
[ 5893, 895, 7533, 4408, 3014, 1556, 2929, 5055, 4251, 2130, 2226, 1959, 1772, 3747, 4009, 5614, 6236, 534, 1430, 2443, 971 ]
Validation
6,178
5
Exterior_Gateway_Protocol:exterior gateway protocol exterior gateway protocol egp routing protocol internet originally specified 1982 eric c. rosen bolt beranek newman david l. mills exterior gateway protocol egp protocol exchanging routing information two neighbor gateway hosts router network autonomous systems egp commonly used hosts internet exchange routing table information routing table contains list known routers addresses reach cost metric associated path router best available route chosen router polls neighbor intervals 120 480 seconds neighbor responds sending complete routing table egp-2 latest version egp egp developed bolt beranek newman early 1980s first described rfc 827 formally specified rfc 904 1984 egp simple reachability protocol unlike modern distance-vector path-vector protocols limited tree-like topologies early days internet egp version 3 egp3 used interconnect autonomous systems currently bgp version 4 accepted standard internet routing essentially replaced limited egp3 https //whatis.techtarget.com/definition/exterior-gateway-protocol-egp
[ 1462, 963, 106, 4177 ]
Test
6,179
4
Verisign:verisign verisign inc. american company based reston virginia united states operates diverse array network infrastructure including two internet thirteen root nameservers authoritative registry generic top-level domains country-code top-level domains back-end systems top-level domains verisign also offers range security services including managed dns distributed denial-of-service ddos attack mitigation cyber-threat reporting 2010 verisign sold authentication business unit – included secure sockets layer ssl certificate public key infrastructure pki verisign trust seal verisign identity protection vip services – symantec 1.28 billion deal capped multi-year effort verisign narrow focus core infrastructure security business units symantec later sold unit digicert 2017 verisign former chief financial officer cfo brian robins announced august 2010 company would move original location mountain view california dulles northern virginia 2011 due 95 company business east coast company incorporated delaware verisign founded 1995 spin-off rsa security certification services business new company received licenses key cryptographic patents held rsa set expire 2000 time-limited non-compete agreement new company served certificate authority ca initial mission providing trust internet electronic commerce digital authentication services products prior selling certificate business symantec 2010 verisign 3 million certificates operation everything military financial services retail applications making largest ca world 2000 verisign acquired network solutions operated tlds agreements internet corporation assigned names numbers icann united states department commerce core registry functions formed basis verisign naming division company largest significant business unit 2002 verisign charged violation securities exchange act verisign divested network solutions retail domain name registrar business 2003 retaining domain name registry wholesale function core internet addressing business year ended december 31 2010 verisign reported revenue 681 million 10 616 million 2009 verisign operates two businesses naming services encompasses operation top-level domains critical internet infrastructure network intelligence availability nia services encompasses ddos mitigation managed dns threat intelligence august 9 2010 symantec completed approximately 1.28 billion acquisition verisign authentication business including secure sockets layer ssl certificate services public key infrastructure pki services verisign trust services verisign identity protection vip authentication service majority stake verisign japan deal capped multi-year effort verisign narrow focus core infrastructure security business units following ongoing controversies regarding symantec handling certificate validation culminated google untrusting symantec-issued certificates chrome web browser symantec sold unit digicert 2017 verisign share price tumbled early 2014 hastened u.s. government announcement would relinquish oversight internet domain-naming system non-government entity ultimately internet corporation assigned names numbers chose continue verisign role root zone maintainer two entered new contract 2016 verisign core business naming services division division operates authoritative domain name registries two internet important top-level domains also contracted registry operator .name .gov top-level domains well country code top-level domains cocos islands tuvalu addition verisign primary technical subcontractor top-level domains respective registry operators non-profit organizations role verisign maintains zone files particular domains hosts domains domain servers registry operators wholesalers internet domain names domain name registrars act “ retailers ” working directly consumers register domain name address verisign also operates two internet thirteen root servers identified letters a-m verisign operates “ ” “ j ” root servers root servers form top hierarchical domain name system supports modern internet communication verisign also generates globally recognized root zone file also responsible processing changes file ordered icann via iana approved u.s. department commerce changes root zone originally distributed via root server distributed thirteen servers via separate distribution system verisign maintains verisign one 12 root server operators operate one thirteen root nameservers j root servers anycasted ” longer operated company datacenters means increase redundancy availability mitigate threat single point failure 2016 department commerce ended role managing internet dns transferred full control icann initially negatively impacted verisign stock icann eventually chose contract verisign continue role root zone maintainer verisign naming services division dates back 1993 network solutions awarded contract national science foundation manage operate civilian side internet domain name registrations network solutions sole registrar internet non governmental generic top-level domains 1998 icann established new system competitive registrars implemented result new policies network solutions divided two divisions nsi registry division established manage authoritative registries company would still operate separated customer-facing registrar business would compete registrars divisions even geographically split nsi registry moving corporate headquarters herndon virginia nearby dulles virginia 2000 verisign purchased network solutions taking role internet dns nsi registry division eventually became verisign naming services division remainder network solutions later sold verisign 2003 pivotal equity group verisign also offers trust seal products e-commerce sites competing space truste bbb online webtrust following sale authentication services division 2010 verisign relocated former headquarters mountain view california headquarters naming division sterling virginia originally nsi registry headquarters verisign began shopping year new permanent home shortly moving signed lease 12061 bluemont way reston former sallie mae headquarters 2010 decided purchase building september 2011 since terminated lease current space two buildings lakeside loudoun technology center company completed move end november 2011 new headquarters located reston town center development become major commercial business hub region addition reston headquarters verisign owns three data center properties one 22340 dresden street dulles virginia far corporate headquarters within large broad run technology park one 21 boulden circle new castle delaware third fribourg switzerland three data centers mirrored disaster one data center minimal impact operations verisign also leases office suite downtown washington d.c. k street government relations office located also leased server space numerous internet data centers around world dns constellation resolution sites located mostly major internet peering facilities one facility equinix ashburn datacenter ashburn virginia one world largest datacenters internet transit hubs january 2001 verisign mistakenly issued two class 3 code signing certificates individual claiming employee microsoft mistake discovered certificates revoked two weeks later routine audit verisign code-signing certificates specify certificate revocation list distribution point way automatically detected revoked placing microsoft customers risk microsoft later release special security patch order revoke certificates mark fraudulent 2002 verisign sued domain slamming – transferring domains registrars making registrants believe merely renewing domain name although found broken law barred suggesting domain expire claim transfer actually renewal september 2003 verisign introduced service called site finder redirected web browsers search service users attempted go non-existent domain names icann asserted verisign overstepped terms contract u.s. department commerce essence grants verisign right operate dns verisign shut service subsequently verisign filed lawsuit icann february 2004 seeking gain clarity services could offer context contract icann claim moved federal california state court august 2004 late 2005 verisign icann announced proposed settlement defined process introduction new registry services registry documents concerning settlements available icann.org icann comments mailing list archive documents criticisms raised regarding settlement additionally verisign involved matter decided ninth circuit keeping icann charter introduce competition domain name marketplace verisign agreed give operation top-level domain 2003 exchange continuation contract operate time 34 million registered addresses mid-2005 existing contract operation expired five companies including verisign bid management verisign enlisted numerous telecom heavyweights including microsoft ibm sun microsystems mci others assert verisign perfect record operating proposed verisign continue manage dns due critical importance domain underlying numerous backbone network services verisign also aided fact several bidders foreign based raised concerns national security circles june 8 2005 icann announced verisign approved operate 2011 information bidding process available icann july 1 2011 icann announced verisign approval operate .net extended another six years 2017 february 2012 verisign revealed network security repeatedly breached 2010 verisign stated breach impact domain name system dns maintain would provide details loss data verisign widely criticized disclosing breach earlier apparently attempting hide news october 2011 sec filing lack details provided verisign clear whether breach impacted certificate signing business acquired symantec late 2010 according oliver lavery director security research ncircle trust site using verisign ssl certificates without clarity logical answer ” november 29 2010 u.s. immigration customs enforcement u.s. ice issued seizure orders 82 web sites internet addresses reported involved illegal sale distribution counterfeit goods registry operator verisign performed required takedowns 82 sites order law enforcement informationweek reported verisign say received sealed court orders directing certain actions taken respect specific domain names removal 82 websites cited impetus launch dot-p2p project order create decentralized dns service without centralized registry operators following disappearance wikileaks following week forced move wikileaks.ch swiss domain electronic frontier foundation warned dangers key pieces internet infrastructure dns name translation corporate control
[ 978, 363, 6874, 5459, 17, 4948, 6991, 4783, 8103, 4969, 6461, 2043, 1762, 7567, 8118, 6219, 5511, 6043, 518, 1043, 6143, 1505, 1142, 3756 ]
Test
6,180
2
Openwall_Project:openwall project openwall project source various software including openwall gnu/*/linux owl security-enhanced linux distribution designed servers openwall patches security extensions included many major linux distributions name implies openwall gnu/*/linux draws source code design concepts numerous sources importantly project usage linux kernel parts gnu userland others include bsds openbsd openssh suite inspiration behind blowfish-based crypt password hashing compatible openbsd implementation issues international journal proof-of-concept get fuck poc||gtfo mirrored openwall project samizdat licence first issue 00 published 2013 issue 02 featured chaos computer club issue 07 2015 homage dr. dobb journal could rendered codice_1 codice_2 codice_3 codice_4 openwall project maintains also list algorithms source code public domain software lwn.net reviewed openwall linux 3.0 wrote
[ 1019, 5627, 3486, 6725, 5571, 2993, 578, 4626, 1265, 4986 ]
Test
6,181
9
P-code_machine:p-code machine computer programming p-code machine portable code machine virtual machine designed execute p-code assembly language hypothetical cpu term applied generically machines java virtual machine matlab precompiled code specific implementations famous p-machine pascal-p system particularly ucsd pascal implementation among whose developers p p-code construed mean pseudo often portable pseudo-code thus meaning instructions pseudo-machine although concept first implemented circa 1966 o-code bcpl p code euler language term p-code first appeared early 1970s two early compilers generating p-code pascal-p compiler 1973 nori ammann jensen hageli jacobi pascal-s compiler 1975 niklaus wirth programs translated p-code either interpreted software program emulates behavior hypothetical cpu translated machine code cpu program run executed sufficient commercial interest hardware implementation cpu specification may built e.g. pascal microengine version java processor compared direct translation native machine code two-stage approach involving translation p-code execution interpreter just-in-time compiler offers several advantages one significant disadvantages p-code execution speed sometimes remedied use jit compiler p-code often also easier reverse-engineer native code early 1980s least two operating systems achieved machine independence extensive use p-code business operating system bos cross-platform operating system designed run p-code programs exclusively ucsd p-system developed university california san diego self-compiling self-hosted operating system based p-code optimized generation pascal programming language 1990s translation p-code became popular strategy implementations languages python microsoft p-code visual basic java bytecode java go programming language uses generic portable assembly form p-code implemented ken thompson extension work plan 9 bell labs unlike clr bytecode jvm bytecode stable specification go build tools emit bytecode format used later time go assembler uses generic assembly language intermediate representation go executables machine-specific statically linked binaries like many p-code machines ucsd p-machine stack machine means instructions take operands stack place results back stack thus add instruction replaces two topmost elements stack sum instructions take immediate argument like pascal p-code strongly typed supporting boolean b character c integer real r set pointer types natively simple instructions unlike stack-based environments forth java virtual machine similar real target cpu p-system one stack shared procedure stack frames providing return address etc arguments local instructions three machine registers point stack grows upwards also present constant area heap growing towards stack np new pointer register points top lowest used address heap ep gets greater np machine memory exhausted fifth register pc points current instruction code area stack frames look like procedure calling sequence works follows call introduced codice_1 specifies difference nesting levels remember pascal supports nested procedures instruction mark stack i.e reserve first five cells stack frame initialise previous ep dynamic static link caller computes pushes parameters procedure issues call user procedure codice_1 number parameters codice_3 procedure address save pc return address cell set procedure address new pc user procedures begin two instructions first sets sp mp codice_4 second sets ep sp codice_5 codice_4 essentially specifies space reserved locals plus number parameters plus 5 codice_5 gives number entries needed locally stack memory exhaustion checked point returning caller accomplished via codice_8 giving return type r c b p return value return value stored appropriate cell previously types except p returning leave value stack instead calling user procedure cup standard procedure codice_9 called standard procedures pascal procedures like codice_10 codice_11 codice_12 codice_13 etc peculiarly codice_14 p-code instruction instead niklaus wirth specified simple p-code machine 1976 book algorithms data structures programs machine 3 registers program counter p base register b top-of-stack register 8 instructions code machine written pascal machine used run wirth pl/0 pascal subset compiler used teach compiler development
[ 4290, 7970, 993, 5117, 1361, 6002, 3782, 5571, 4694, 6733, 7093, 931, 5678, 5948, 8111, 7474, 2420, 152, 5424, 3746, 5965, 6778, 2803, 4745, 5190 ]
Validation
6,182
5
Internet_Open_Trading_Protocol:internet open trading protocol internet open trading protocol iotp protocol provides inter-operable standardized payment system independent framework internet commerce tries replicate real-world trading processes closely possible iotp systems include variety different payment systems including digital cash electronic checks debit cards within protocol various payment transaction data contained within specific iotp messages customer merchant credit checker certifier bank delivery handler
[]
Validation
6,183
2
Android_Developer_Challenge:android developer challenge android developer challenge adc launched google 2008 aim providing awards high-quality mobile applications built android platform november 2009 winners android developers challenge ii selected two rounds scoring thousands android users well official panel judges overall winners adc ii sweetdreams doodle wavesecure android software stack mobile devices includes operating system middleware key applications android sdk provides tools apis necessary begin developing applications run android-powered devices android developer challenge competition innovative applications android google offered us 10 million prizes distributed adc adc ii entries judged panel experts fields mobile devices cellular telecommunications software development technology innovation google selected judges member organizations open handset alliance google mobile experts android developer challenge first announced january submissions accepted 2 january 14 april 2008 participants 70 countries total 1,788 entries adc immediate success android developers blog reported submission rate 170+ submissions per hour 14 april developers united states accounted one-third total applications rest came countries germany japan china india canada france uk many others entries represented diverse range application areas including games social-networking applications utilities productivity developer tools panel 100 judges received judging packets laptops preloaded submissions consistent fair environment judge submissions three weeks rigorous analysis judges released list 50 first round winners eligible participate final round 50 promising entries announced 5 may 2008 received 25,000 award fund development finalists given deadline 30 june 2008 submit applications final round competition concluded announcement ten teams received 275,000 ten teams received 100,000 entire list 275,000 award recipients 100,000 award recipients finalists judges viewed adc ii announced 27 may 2009. calling developers submit apps one ten specially-designated adc ii categories august categories applicants allowed submit applications single category winners selected two rounds scoring thousands android users well official panel judges adc ii contest open applications made publicly available android market prior august 1 2009 additionally applications entered adc contest ineligible adc ii contest regardless whether winning apps similarly updated versions applications entered adc 1 contest ineligible adc ii september 2009 users android-powered handsets could access android market able obtain special adc ii judging application android market app could download test rank applications submitted challenge users choosing participate review process downloaded submitted apps randomly rated along number criteria resulting final score app results first round generated top 20 applications 10 categories 200 apps total went second round first round adc ii closed 6 october 2009 first-round winners announced 5 november 2009 voting second round opened day ended november 25 android users able download final top 20 applications category evaluate manner first round using adc 2 judging app end voting period applications category ranked community vote constituting 40 final judging score along public ranking team google-selected judges evaluated applications scores constituted 60 final score google announced top winners adc ii november 30 sweetdreams doodle wavesecure nominated overall winners challenge furthermore 1st 2nd 3rd prizes awarded 10 categories
[ 3507, 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 195, 6978, 5473, 6427, 7346, 561, 201, 474, 2107, 2017, 5919, 822, 649, 1095, 3863, 4234, 5302, 5571, 7357, 2398, 5666, 740, 2037, 2756, 7007, 136, 42, 4340, 7749, 6209, 3310, 2591, ...
Test
6,184
1
TimesTen:timesten timesten in-memory relational database management system persistence recoverability originally designed implemented hewlett-packard labs palo alto california timesten spun separate startup 1996 acquired oracle corporation 2005 data within timesten database located physical memory ram means data operation requires disk i/o unlike traditional disk-optimized relational databases oracle database db2 informix sql server whose designs must contain algorithms attempt minimize disk accesses timesten provides applications short consistent response-times high throughput required applications database-intensive workloads memory operates far faster hard disk timesten used applications service-level agreements require low predictable response times telecommunications real-time financial-services trading applications network equipment large web applications also unlike memory-caching systems use key-value pairs memcached hazelcast coherence timesten accessed standard interfaces provides functionality sql query language applications data residing oracle database utilize timesten database caching option distinct oracle database in-memory timesten functions in-memory cache database front oracle database timesten runs major unix/linux platforms various windows platforms 32-bit 64-bit modes timesten in-memory database management technology provides fast data access time assumes data reside physical memory ram run time result low response times enable high throughput even commodity hardware timesten functionality contained set shared libraries application developers link application allowing timesten execute part application process shared library approach different conventional rdbms systems database essentially set distinct processes applications connect via form inter-process communication communication may take form client/server connection spanning network may form intra-system ipc unix domain socket connection shared memory based connection mechanism data active timesten database stored shared memory segment allowing multiple timesten databases active concurrently also allowing application simultaneously access several timesten databases system 64-bit platforms size timesten database practically limited amount ram available host computer one customer production timesten database approaching two terabytes size utilized on-line transaction processing starting timesten requires starting background process called timesten main daemon starts multiple timesten subdaemon processes manage database created system subdaemon processes perform database operations client applications connect traditional disk-based relational databases typically use tcp/ip another ipc mechanism communicate database server process timesten applications reside server timesten database connect directly in-memory image database using timesten direct driver eliminating need inter-process communication kind thus providing extremely fast performance application resides remote server application also connect timesten database using traditional client/server model data access timesten data exists ram however timesten utilize non-volatile storage hard disk database persistence recoverability timesten database stores transactional data modifications in-memory log buffer eventually persisted disk form transaction log files addition timesten also persists snapshots in-memory database called checkpoint files disk combination checkpoint files transaction log files allow timesten provide recoverability event system failure timesten implements parallel log manager order maximize throughput large smp systems default timesten operates non-durable commit mode mode commit operation occurs purely memory writing log records transaction disk occurs asynchronously commit provides low response times high throughput cost potential small amount data loss event system failure true synchronous commit mode durable commit mode also provided mode avoids possibility data loss cost reduced performance operating synchronous commit mode timesten provides automatic group commit optimization timesten allows architect developer balance performance versus data safety providing control commit mode three different levels database connection transaction another option data protection high-availability use timesten replication timesten replication mechanism enables highly available system sending database updates two hosts timesten replication master host sends updates one subscriber hosts timesten recommends active-standby pair configuration highest availability active-standby pair consists two master databases active standby database addition active standby databases multiple subscriber databases configured serve disaster recovery copies read-only farms replication timesten implemented replication agent daemon process aims every timesten database involved replication replication agent sends receives updates databases communicating replication agents databases involved replication scheme change capture via log-mining in-memory optimization normal operating conditions change records captured in-memory log buffer need disk i/o communication replication agents via efficient stream-oriented protocol built top regular tcp/ip connections replication agent multi-threaded 11.2.2 release timesten supports parallel replication increased throughput replication workload automatically parallelized maximize throughput still maintaining correctness timesten provides capability cache data oracle database source used fashion timesten referred oracle in-memory database cache imdb cache oracle database product option utilize oracle database caching one defines one sql objects known cache groups cache group set one related database tables allows subsets rows and/or columns database tables cache group must defined primary key unique index declared across set non-nullable columns must related parent-child hierarchy via primary key-foreign key constraints sql predicates used control data cached cache group defined cache group loaded allowing oracle database data cached timesten applications read write cache groups data modifications synchronized corresponding oracle database tables either automatically manually timesten provides event notification mechanism transaction log api xla xla provides functions allow applications notified data changes occurring timesten tables also ddl occurring timesten database xla also used conjunction materialized views simplify process monitoring changes made rows spanning multiple tables xla works mining timesten transaction log stream similar manner replication agent database application deployments include oracle database want use timesten in-memory cache database use xla capture updates via custom application code apply updates backend database timesten founded hp labs marie-anne neimat sherry listgarten kurt shoens name smallbase hp jean-rené bouvier decided embed smallbase hp opencall made first commercial use product 1995 1996 product spun separate venture capital funded startup company based mountain view california leadership ceo jim groff product became popular telecommunications equipment response times milliseconds even microseconds required applications like packet switching company 90 employees profitable acquired oracle corporation 2005 acquisition neimat remained director timesten development oracle adding many oracle database features product support pl/sql integration oracle sql developer oracle enterprise manager
[ 3764, 6878, 4759, 7715, 3855, 6270, 1185, 3371, 1554, 6279, 6281, 578, 7368, 1105, 4798, 4427, 418, 6386, 1223, 1590, 517, 7213, 5882, 971 ]
Test