node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,185 | 2 | Global_Resource_Serialization:global resource serialization global resource serialization grs component within ibm z/os operating system responsible enabling fair access serially reusable computing resources datasets tape drives virtual resources lists queues control blocks programs request exclusive access resource means program subsequent requesting programs blocked program given access resource usually requested program needs update resource shared access means multiple programs given access resource usually requested program needs query state resource grs manages requests fifo first in/first order grs manages resources three different levels scoping order grs serialize resources multiple systems systems must clustered several options enable clustering ca inc. licenses product called multi-image manager ca-mim contains component called multi-image integrity mii used implement similar functions grs | [] | Validation |
6,186 | 9 | Translation_unit_(programming):translation unit programming c c++ programming language terminology translation unit ultimate input c c++ compiler object file generated casual usage sometimes referred compilation unit translation unit roughly consists source file processed c preprocessor meaning header files listed codice_1 directives literally included sections code within codice_2 may included macros expanded c program consists units called source files preprocessing files addition source code includes directives c preprocessor translation unit output c preprocessor – source file preprocessed preprocessing notably consists expanding source file recursively replace codice_1 directives literal file declared directive usually header files possibly source files result step preprocessing translation unit steps include macro expansion codice_4 directives conditional compilation codice_5 directives among others translates preprocessing translation unit translation unit translation unit compiler generates object file processed linked possibly object files form executable program note preprocessor principle language agnostic lexical preprocessor working lexical analysis level – parsing thus unable processing specific c syntax input compiler translation unit thus see preprocessor directives processed compiling starts given translation unit fundamentally based file actual source code fed compiler may appear substantially different source file programmer views particularly due recursive inclusion headers translation units define scope roughly file scope functioning similarly module scope c terminology referred internal linkage one two forms linkage c. names functions variables declared outside function block may visible either within given translation unit case said internal linkage – visible linker – may visible object files case said external linkage visible linker c notion modules however separate object files hence also translation units used produce object files function similarly separate modules source file include source files internal linkage translation unit scope may thought file scope including header files bulk project code typically held files codice_6 suffix codice_7 codice_8 codice_9 c++ codice_7 used conventionally files intended included typically codice_11 suffix codice_12 codice_13 also used c++ codice_11 common even c++ generally contain function variable definitions avoid name conflicts headers included multiple source files often case header files often included header files standard practice codice_6 files project include least one codice_11 file | [
1361,
3931,
4662,
5082,
7333,
6680,
2403,
1435,
3926
] | Test |
6,187 | 7 | Zetta_(cloud_backup):zetta cloud backup zetta american company specializing cloud-based backup disaster recovery small mid-sized businesses enterprises msps zetta provides cloud backup disaster recovery services on-premises backup archiving notable network efficient data transfer uses lightweight agent software replicate customer data creating second copy zetta bi-coastal enterprise-grade data centers available recovery data loss event server crash natural disaster zetta end-to-end disaster recovery service provides deployment-to-failback coverage features upfront network firewall vpn connectivity configuration automated disaster recovery testing software supports windows linux mac plug-ins sql ms exchange hyper-v vmware netapp filers zetta awarded several patents backup disaster recovery technology including minimizing network bandwidth replication/backup ensuring data replicated bit bit source system able scale internet volumes data zetta agent eliminates network round trips client side cache server state extensive parallelism wan optimization zetta also provides mountable backup zetta founded 2008 sunnyvale california jeff whitehead lou montulli jason harrison current ceo mike grossman investors zetta include sigma partners foundation capital industry ventures | [
4554,
2390
] | Test |
6,188 | 2 | Launchd:launchd launchd init operating system service management daemon created apple computer part macos efforts port launchd freebsd derived systems two main programs launchd system launchd launchctl launchd manages daemons system user level similar xinetd launchd start daemons demand similar watchdogd launchd monitor daemons make sure keep running launchd also replaced init pid 1 macos result responsible starting system boot time configuration files define parameters services run launchd stored launchagents launchdaemons subdirectories library folders property list-based files approximately thirty different keys set launchd knowledge configuration files ability read responsibility launchctl launchctl command line application talks launchd using ipc knows parse property list files used describe launchd jobs serializing using specialized dictionary protocol launchd understands launchctl used load unload daemons start stop launchd controlled jobs get system utilization statistics launchd child processes set environment settings launchd two main tasks first boot system second load maintain services simplified view mac os x tiger system startup powerpc mac intel mac efi replaces open firmware codice_1 replaces bootx step 4 startup scripts scan different directories jobs run two different directories scanned directories kept typical library directories mac os x. launchd different systemstarter may actually launch daemons boot time key launchd similar xinetd idea launch demand daemons launchd scans job plists boot time reserves listens ports requested jobs indicated plist ondemand key daemon actually loaded time rather launchd listen port start daemon needed shut daemon loaded launchd keep track make sure running needed way like watchdogd shares watchdogd requirement processes attempt fork daemonize process goes background launchd lose track attempt relaunch consequently mac os x tiger boots much faster previous releases system register daemons run actually launch fact progress bar appears boot time placebo application named waitingforloginwindow really show anything passage time hardest part manage launchd boot dependencies systemstarter simple system dependencies used uses requires provides keys plist startup item two main strategies creating launch dependencies tiger using ipc allow daemons talk amongst work watch files paths changes using ipc much subtle systemstarter keys requires work developer may lead cleaner quicker startups systemstarter still supported os x mountain lion removed os x yosemite launchd control services centralized launchctl application launchctl take commands command line standard operate interactive mode superuser privileges launchctl used make changes global scale set launchctl commands made permanent stored /etc/launchd.conf per-user ~/.launchd.conf file appears considered supported existing version macos launchctl communicates launchd via mach-specific ipc mechanism property list plist type file launchd uses program configuration launchd scans folder job submitted launchctl reads plist file describes program run list often used keys follows keys optional unless otherwise noted full list see apple manpage codice_5 name key sockets placed environment job run file descriptor socket available environment variable differs systemd socket activation name socket definition inside job configuration hardcoded application protocol less flexible although systemd require daemon hardcode starting file descriptor 2014 3 software designed coded dave zarzycki apple company planned following superseded os x environments – – things superseded launchd introduced mac os x v10.4 tiger 2005 r. tyler croy ported launchd freebsd part google summer code project could run pid 1 session init commonly used platform 2006 ubuntu linux distribution considered using launchd option rejected source code subject apple public source license – described inescapable licence problem ubuntu instead developed switched service management tool upstart august 2006 apple relicensed launchd apache license version 2.0 effort make adoption open source developers easier linux distributions use systemd upstart continue init bsds also continue init december 2013 r. tyler croy announced intent resume work port launchd freebsd openlaunchd github repo subsequently rose activity last wayback machine capture mac os forge area launchd june 2012 recent open source version apple 842.92.1 code os x 10.9.5 2014 os x 10.10 ios 8 apple moved code launchd closed source libxpc august 2015 jordan hubbard kip macy announced nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code os x. apple developer apple developer retired documents library links | [
3940,
713,
4690,
734,
6832,
3989,
2597,
3322,
1502,
5786,
4740,
1897,
6505,
2627,
7609,
1171,
5109,
2284,
1178,
2649,
1187,
1562,
6909,
6548,
502,
6557,
2679,
6565,
2329,
3050,
163,
6582,
6586,
5535,
1992,
3073,
5191,
8051,
7335,
3445,
... | Test |
6,189 | 4 | Security_controls:security controls security controls safeguards countermeasures avoid detect counteract minimize security risks physical property information computer systems assets classified several criteria example according time act relative security incident according nature example similar categorization distinguishes control involving people technology operations/processes field information security controls protect confidentiality integrity and/or availability information so-called cia triad systems controls referred frameworks standards frameworks enable organization manage security controls across different types assets consistency numerous information security standards promote good security practices define frameworks systems structure analysis design managing information security controls well known outlined iso/iec 27001 specifies 114 controls 14 groups federal information processing standards fips apply us government agencies however certain national security systems purview committee national security systems managed outside standards federal information processing standard 200 fips 200 minimum security requirements federal information information systems specifies minimum security controls federal information systems processes risk-based selection security controls occurs catalog minimum security controls found nist special publication sp 800-53 fips 200 identifies 17 broad control families starting revision 3 800-53 program management controls identified controls independent system controls necessary effective security program starting revision 4 800-53 eight families privacy controls identified align security controls privacy expectations federal law telecommunications security controls defined security services part osi reference model technically aligned model widely recognized wide range frameworks standards looking internal business inter-business controls including | [
3932,
4036,
5908,
5568,
8091,
6998,
2213,
3474,
943,
3143,
429,
5255
] | Test |
6,190 | 9 | Connected_Limited_Device_Configuration:connected limited device configuration connected limited device configuration cldc specification framework java applications describing basic set libraries virtual-machine features must present implementation cldc combined one profiles give developers platform building applications embedded devices limited resources pagers mobile phones cldc developed java community process jsr 30 cldc 1.0 jsr 139 cldc 1.1 cldc designed devices limited processing power memory graphical capability devices typically following features compared java se environment several apis absent entirely apis altered code requires explicit changes support cldc particular certain changes n't absence classes interfaces actually change signatures existing classes base class library example absence codice_1 interface appear base class library due restrictions reflection usage codice_2 classes normally implement codice_1 therefore implement tagging interface examples limitations depend version used features re-introduced version 1.1 cldc profile set apis support devices different capabilities resources within cldc framework provide complete java application environment specific profiles devices ranging vending machines set-top boxes mobile phone profile midp prevalent mobile information device profile profile designed cell phones two versions midp available specified jsr 37 midp 1.0 jsr 118 midp 2.0 versions provide lcd oriented gui api midp 2.0 including basic 2d gaming api applications written use profile called midlets many cell phones come midp implementation popular platform downloadable cell phone games information module profile specified jsr 195 designed vending machines network cards routers telephone boxes systems either simple display form limited two way network access apis application creation storage network access defined subset javax.microedition.io rms midlet packages midp siemens mobile nokia put forward specification jcp doja profile designed docomo i-mode mobile phone ntt docomo digital set top box profile specified jsr 242 designed cable market also referred onramp profile based subset opencable application platform ocap defines set apis development applications set-top boxes similar devices profile consists subsets cdc personal basis profile including support awt xlet file access network apis well several media-related interfaces ocap whole profile encompassed 31 java packages approximately 1500 apis pda optional packages specified jsr-75 designed pdas palm windows ce devices specification defines two independent packages represent important features found many pdas mobile devices packages | [
224,
7235,
2520,
2564,
1237,
484,
4055,
6280
] | Validation |
6,191 | 9 | Weblocks:weblocks weblocks advanced web framework common lisp web pages built simple widgets analogous gui widgets used application toolkits widgets written lisp using cl-who meta-language framework supports delimited continuations control flow full-stack framework since comes built-in database persistence systems programming weblocks similar continuation-passing style frameworks like seaside html http level details abstracted especially regard ajax form parameters although access easily available weblocks active development user community major lisp web-framework uncommon web extensions lisp lines built atop | [
1716,
2451,
5983,
6876,
1445,
6701,
1819,
103,
6888,
2915,
6428,
7347,
6095,
2740,
3368,
6352,
3370,
5571,
5575,
486,
3543,
4332,
4878,
5494,
5757,
6116,
6029,
3212,
933,
7750,
6210,
1116,
417,
54,
940,
6471,
1676,
2870,
4535,
5077,
454... | Test |
6,192 | 1 | MathSciNet:mathscinet mathscinet searchable online bibliographic database created american mathematical society 1996 contains contents journal mathematical reviews mr since 1940 along extensive author database links mr entries citations full journal entries links original articles contains almost 3 million items 1.7 million links original articles along parent publication mathematical reviews mathscinet become essential tool researchers mathematical sciences access database subscription generally available individual researchers affiliated larger subscribing institution first 40 years existence traditional typesetting used produce mathematical reviews journal starting 1980 bibliographic information reviews produced print electronic form formed basis first purely electronic version called mathfile launched 1982 enhancements added next 18 years current version known mathscinet went online 1996 unlike abstracting databases mathscinet takes care uniquely identify authors author search allows user find publications associated given author record even multiple authors exactly name person publishes multiple names name variants mathematical reviews personnel sometimes even contact authors ensure mathscinet correctly attributed papers mathscinet contains information 3 million articles eight hundred thousand authors indexed 1800 mathematical journals many abstracted cover-to-cover addition reviews bibliographical information selected articles included many engineering computer science applied journals abstracted mathscinet selection done editors mathematical reviews editors accept suggestions cover additional journals reconsider missing articles inclusion | [
8179
] | Test |
6,193 | 4 | Table_of_costs_of_operations_in_elliptic_curves:table costs operations elliptic curves elliptic curve cryptography popular form public key encryption based mathematical theory elliptic curves points elliptic curve added form group addition operation article describes computational costs group addition certain related operations used elliptic curve cryptography algorithms next section presents table time-costs possible operations elliptic curves columns table labelled various computational operations rows table different models elliptic curves operations considered poem dbl doubling add addition madd mixed addition addition input scaled z -coordinate 1. mdbl mixed doubling doubling input scaled z coordinate 1 tpl tripling dbl+add combined double add step /poem see adding add doubling dbl points elliptic curves defined see group law importance doubling speed scaler multiplication discussed table information possible operations elliptic curves see http //hyperelliptic.org/efd/g1p/index.html different assumptions multiplication addition inversion elements fixed field time-cost operations varies table assumed means 100 multiplications required invert element one multiplication required compute square element multiplication needed multiply element parameter *param constant *const add two elements information results obtained different assumptions see http //hyperelliptic.org/efd/g1p/index.html applications elliptic curve cryptography elliptic curve method factorization ecm necessary consider scalar multiplication n p one way compute successively faster use double-and-add method e.g 5 p 2 2 p p general compute k p write formula_2 k 0,1 formula_3 k 1 formula_4 note simple algorithm takes 2l steps step consists doubling k ≠ 0 adding two points one reasons addition doubling formulas defined furthermore method applicable group group law written multiplicatively double-and-add algorithm instead called square-and-multiply algorithm | [] | Test |
6,194 | 4 | BlueBorne_(security_vulnerability):blueborne security vulnerability blueborne type security vulnerability bluetooth implementations android ios linux windows affects many electronic devices laptops smart cars smartphones wearable gadgets one example vulnerabilities first reported armis iot security firm 12 september 2017 according armis blueborne attack vector potentially affect devices bluetooth capabilities estimated 8.2 billion devices today 2017 blueborne security vulnerabilities first reported armis iot security firm 12 september 2017 2017 blueborne estimated potentially affect 8.2 billion devices worldwide many devices affected including laptops smart cars smartphones wearable gadgets google provides blueborne vulnerability scanner armis android procedures help protect devices blueborne security vulnerabilities reported september 2017 | [
704,
3932,
2912,
376,
3277,
2923,
740,
2587,
3323,
5779,
7600,
4025,
1528,
4759,
2991,
1173,
6526,
6904,
6541,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
208,
2021,
5922,
6628,
578,
924,
4531,
600,
1307,
2800,
6323... | Test |
6,195 | 3 | Antarctic_Adventure:antarctic adventure gameplay similar sega turbo plays much slower pace features platform game elements penguin later named penta must reach next station time runs avoiding sea lions breaks ice throughout levels fish jump ice holes caught bonus points game like many early video games ending – player reaches last station game starts first level increased difficulty antarctic adventure followed sequel msx computer 1986 entitled penguin adventure addition penguin character penta son pentarou became mascot konami 1980s made appearances 10 games particularly note appearances parodius series shoot 'em games penta son pentarou appeared medal games like tsurikko penta balloon penta imo hori penta following 2002 released mobile 2001 released three mobiles like may 6 2003 titled part konami taisen colosseum following fishing game penta tsuri boken released i-revo screen game briefly seen introduction gradius rebirth released 2008 wii virtual console 2014 wii u virtual console msx version re-released windows store egg project november 25 2014 japan rumored coin-operated arcade version released konami 1984 existence actual example yet confirmed 1990 konami released japan handheld electronic game antarctic adventure although usually listed south pole literal translation japanese title 2014 antarctic adventure released special version colecovision flashback atgames available dollar general stores games pentarou makes fisherman | [
7469,
7388,
4503,
8016
] | Test |
6,196 | 3 | P.T.O.:p.t.o p.t.o pacific theater operations released japan console strategy video game released koei originally released pc-8801 1989 ported various platforms x68000 1990 msx2 1991 fm towns sega genesis super nes three 1992 players could assume one side pacific theater operations world war ii acting naval commander organizing fleets building new ships appropriating supplies fuel even engaging diplomacy countries player choose one several world war two battles simulate could control entire pacific campaign well japanese attack pearl harbor sequel p.t.o ii released koei 1993 teitoku ketsudan iii never released outside japan p.t.o iv released playstation 2 us europe players must choose one nine scenarios starting game first scenario negotiations breakdown long-term campaign player must win war mid-1941 war declared victory obtained controlling ports eliminating enemy ships scenarios begin midst certain major pacific conflict goal capture defend certain port sink protect number enemy ships scenario goal achieved player continue full campaign player option playing one two major world war ii pacific maritime powers united states allies japan axis countries begin allies two nations whatever point war gameplay begins time non-allied nations convinced ally side significant gifts diplomacy nations also break alliances poor diplomacy lead departure ships loaned navy instance united kingdom breaks allied forces us lose british ships fleet hermes countries behave historically example italy cease member axis 1943 due allied invasion countries available allies power starts control number pacific bases depending scenario begins focus long-term campaign capture enemy territories defending one reducing number ports enemy control zero territories produce fuel materials power controls fuel refers oil ships supplies soldiers materials refer ores metals used base repair ship repair construction new warships money used fund construction aircraft transports fund improvement technologies capturing territories thus increases resources available player denying use enemy power one home port newly manufactured ships aircraft stationed upon completion turn aircraft fuel materials assigned base however depending safety distance trade route resources may arrive certain ports capable 'urgent repair meaning affect small repairs ships docked ports capability control key regions crucial order maintain fighting capabilities one fleet sea less turnaround time ship repair ships damaged combat p.t.o faithfully recreates many actual battleships available pacific war displays ship icon relative ships ships given several attributes fortitude speed anti-air capability anti-ship capability ships also fitted radar search gunnery rockets scouts marines land invasion ships also given overall 'luck rating 1 99 ships survived many conflicts history like enterprise luck rating 99 several types warship available dreadnought battleships battleships cruisers fleet aircraft carriers light carriers destroyers submarines power starts certain number ships type number ships construction usually launching around historical commission date additional ships constructed replace ships previously lost battle either player prior scenario start date ship construction scheduled 6–24 months closer launch date industrial power expended construction materials consumed well dependent type hull built ship ratings chosen design ship class chosen construction cosmetic affect actual ship limitations attributes like actual hull type ships organized fleets comprise 16 ships 16 fleets arranged inactive ships home port one fleet side engage battle one time fleets must attack enemy succession rather fleets rating morale fatigue 0 99 morale goes victories shore leave defeats flagship lost also raised emergency banquet sea fatigue goes every battle crew infected plague ships also individual levels crew experience value starts high japanese low us experience levels gradually increase combat conducting training drills another type ship constructed transports used carrying additional fuel extend fleet range transporting resources territories home ports additional non-controlled shipping fleets constantly active game though displayed tactical maps transport fleets supplying bases protected unlisted destroyers cruisers engage enemy fleet following types aircraft immediately available fighters bombers scouts later game technology levels advanced jet fighters long-range bombers become available aircraft carriers fitted allow jets technology levels sufficient modified carrier carry jet fighters normal fighters long-range bombers launched land bases aircraft deployed bases aircraft carriers although ship types allow scouts launched via catapult aircraft placed bases take defensive role attacking fleet aircraft used scout enemy fleets day enemy fleets found land-based aircraft sortie attack naval fleet begins certain number fictional fleet commanders depending scenario chosen commanders placed command 16 fleets player arranges player creates commanders set rolled scores certain attributes – air command ability sea command ability bravery overall war ability scores range 01 99 total four scores 102 air sea abilities affect actual combat performance ships planes commander control bravery affects commander decision making fleet ai control war overall rating useful comes convincing army military officials agree submissions objectives budgeting industrial production computer gaming world 1993 approved genesis version p.t.o suitable core group strategy wargamers normally play videogames criticizing inadequate documentation reported game randomized campaigns provided 200-300 hours play time—more comparatively priced cartridge magazine favorably concluded p.t.o establishes new trend video gaming | [] | Test |
6,197 | 2 | Time_Sharing_Operating_System:time sharing operating system time sharing operating system tsos discontinued operating system rca mainframe computers spectra 70 series tsos originally designed 1968 spectra 70/46 modified version 70/45 tsos quickly evolved virtual memory operating system vmos 1970 vmos continued supported later rca 3 rca 7 computer systems rca computer business 1971 sold computer business sperry corporation sperry renamed tsos vs/9 continued market early 1980s mid seventies enhanced version tsos called bs2000 offered german company siemens sperry – unisys – discontinued vs/9 bs2000 variant called bs2000/osd still offered fujitsu siemens computers used mainframe customers primarily europe name suggests tsos provided time sharing features beyond provided common user interface time sharing batch big advantage ibm os/360 successors mvs os/390 z/os | [
4566,
1522,
7325,
7605,
280,
785,
2818,
4759,
190,
4670,
5021,
8066,
8167,
4397,
13,
5644,
3271,
5116,
6984,
299,
3626,
7142,
5571,
2300,
5041,
7827,
4786,
578,
7550,
4244,
5232,
1992,
405,
6367,
6922,
8115,
5161,
5865,
7396,
65,
861,
... | Test |
6,198 | 3 | Single-core:single-core single-core processor microprocessor single core chip running single thread one time term became common emergence multi-core processors several independent processors single chip distinguish non-multi-core designs example intel released core 2 solo core 2 duo one would refer former 'single-core variant microprocessors prior multi-core era single-core class many-core processors follows multi-core progression showing increasing parallelism time processors remained single-core impossible achieve performance gains increased clock speed transistor count allowed moore law diminishing returns increasing depth pipeline increasing cpu cache sizes adding execution units | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
2226,
1867,
2248,
6148,
441,
2266,
4047,
5483,
1556,
5487,
1568,
1570,
6922,
7666,
515,
8024,
1592,
5521,
3747,
1237,
6236,
534,
7314,
1252,
1254,
4847,
4479,
895,
... | Test |
6,199 | 7 | CDDLM:cddlm cddlm configuration description deployment lifecycle management specification global grid forum standard management deployment configuration grid service lifecycles inter-organization resources specification based component documents development api done global grid forum open standard model ietf standard development originally edited d. bell t. kojo p. goldsack s. loughran d. milojicic s. schaefer j. tatemura p. toft system administration distributed environment diverse hardware software patch level imposed user requirements makes ability deploy manage describe services software configuration difficult within grid difficulty complicated need similar service end points possibly heterogeneous architectures grid service requests may require configuration changes standard provided framework described language methods ability describe system configuration move system services software towards desired configuration endpoints furthermore served first real attempt address system administration issues within grid cddlm grids cfengine servers | [
5539
] | Test |
6,200 | 3 | PowerBook_Duo:powerbook duo powerbook duo line small subnotebooks manufactured sold apple computer 1992 1997 compact companion powerbook line improving upon powerbook 100 portability immediate predecessor apple third-smallest laptop duo came seven different models duo 210 230 250 270c 280 280c 2300c 210 230 earliest 2300c final incarnation entire line dropped early 1997 weighing mere slightly smaller sheet paper thick lightest smallest apple powerbooks time remains one apple smallest notebooks ever produced macbook air retina macbook pro retina macbook weigh less though wider deeper considerably thinner duo common original macbook air included one usb 2.0 port one video port requiring adapter one speaker port ability expansion powerbook duo line replaced powerbook 2400 slightly larger size duos still fifth-smallest behind 12-inch powerbook g4 succeeded fourth-smallest although featured much onboard functionality lacked docking ability duo line offered ultraportable design light functional travel expandable via unique docking connector however certain compromises made achieve level portability duo series used 88 standard desktop-sized keyboard criticized difficult type likewise trackball reduced size even used powerbook 100 usable port came standard duo dual printer/modem eia-422 serial port slot expensive optional internal 14.4 express modem provision built-in ethernet somewhat limited configuration meant way move data laptop stock configuration without purchasing additional accessories via relatively slow appletalk connection practical event hard drive problems compensating limitations initial duo offering provided considerably higher ram limit 24 mb compared 100 series 14 mb standard 80 mb hard drive versus 100 40 mb drive debut year duo offered passive matrix display mid-level high-end models contrast high end 100-series line duos shared processors powerbook 170 180 crisp active matrix displays already great demand lower-powered models passive matrix displays following year apple replaced earlier models active matrix display color active matrix display latter becoming de facto standard powerbook line respective duo models easily differentiated display method processor features identical 2xx duos powered either motorola 68030 68lc040 processors ranging 25-33 mhz apple debuted next-generation powerpc processors 1994 took nearly two years first powerpc duo 2300c debut original powerpc 601 like original 68040 produced much heat consumed much power apple use laptop end 1995 efficient powerpc 603e developed featured duo 2300c full-size companion powerbook 5300 series powerpc 603e designed 64-bit bus engineered apple run older 32-bit bus maintain compatibility duo docks led poor system video performance powerbook duos lacked common ports featuring one internal printer/modem serial port optional fax/modem card port place docking ability accomplished via unique 156-pin processor direct slot pds giving docks full access duo central processing unit cpu data buses several dock options offered apple third parties largest expensive dock powerbook duo form factor offered exclusively apple unlike docks port replicators plugged back laptops duo dock pulled laptop inside dock metal plastic case via internal sliding mechanism similar vhs player dock turned powerbook duo full-size ac-powered fully functional desktop computer standard ports like desktop computer dock could physically support heavy high-resolution crt display top duo dock included floppy drive side two nubus expansion slots optional floating-point unit fpu level 2 cache slot vram enable colors higher resolutions space second hard drive original duo dock replaced duo dock ii added aaui networking compatibility newer color-screen powerbook duos replacement lid offered allow use thicker color duos original duo dock dock ii followed duo dock plus identical duo dock ii lacked fpu level 2 cache—which compatible 68lc040-processor duo 280 powerpc-processor duo 2300c laptop lcd display obviously could opened inside dock additional nubus video cards could installed drive three monitors mini dock port expander powerbook duo popularly offered many third-party manufacturers apple attached powerbook duo could plugged various standard desktop devices including scsi apple desktop bus adb serial floppy disk external speakers external display type dock also allowed duo internal lcd battery used third-party contributions mini dock added variety specialized custom options including ethernet connectivity ntsc pal video ports significant difference docks full desktop configuration lack custom pds nubus expansion slots included standard desktop macs shortfall made task-specific third-party dock offerings type dock manufactured apple many third parties gave powerbook duo three extra ports minimal configuration examples include floppy scsi video ethernet docks typically included one adb port well least expensive basic docks type dock allowed duo internal lcd used well could run duo internal battery reduced amount time popular due minimal impact accessories must carried duo offered practical alternative emergency hard disk software situations task-specific needs 2300 last apple product carry vestige snow white design language apple phasing since 1990 drawing heavily upon improvements made original powerbook 140 design duo series continues many styling traits powerbook 100 approximately equivalent size weight addition snow white features duo takes 100 radius curves step along display top front sides also heavily mirrored various docks penlite early tablet computer prototyped apple computer 1993 around time apple newton pda rather complete computer project canceled 1994 due similarity newton penlite based powerbook duo meant tablet-style addition stylus input device designed compatible powerbook duo docks accessories ran standard classic mac os one stylish iconic laptops available time duo widely used advertising film television | [
7890,
5732,
722,
1094,
2926,
5037,
5752,
405,
2954,
7572,
6482,
6142,
4373,
3674,
7226,
2978,
7601,
4749,
5097,
3346,
5100,
6165,
4389,
5463,
102,
2995,
5469,
4768,
3008,
5477,
6202,
3387,
3390,
1216,
2331,
4820,
4453,
1234,
1237,
7311,
... | Validation |
6,201 | 2 | CSR_Classics:csr classics csr classics free-to-play drag-racing game boss alien collaboration mad atom games published naturalmotion games game player takes role new racer looking make name city resembling las vegas ruled five racing crews story line consists racer agent trying prove seemingly corrupt mr. baladin guilt worked way business magnate behind scenes csr classics follow-up title successful csr racing released october 2013 ios end march 2014 gradually released android via google play csr classics features game mechanics similar sister title features classic race cars ranging 1950s 1980s late march 2018 announced online features csr classics would discontinued may 1 2018 online features later discontinued update may 21 2018 player starts found agent recruits player player goes tutorial game player receives sum money sufficient purchase first vehicle afterwards meeting race official csr classics universe player guided various events throughout game starts challenging first crew authentics led marco player starts challenge marco personally defeating crew members agent approaches player explains suspicion mr. baledin recently became top crew leader purchased valentine massive casino agent suspicion mr. baledin corrupt crew leaders involvement reign power agent reveals marco tearaway child thief also romantic affair another crew leader kandy however ties mr. baledin yet known player proceeds defeat marco authentics progressing tier 2 tier 2 player proceeds challenge thrillers commandeered olivia player continues challenge olivia agent tells player olivia background olivia runs car show name experienced severe financial troubles came mr. baledin loan however loan little help financial situation olivia car show became debt mr. baledin olivia associates agreed race mr. baledin make loss player defeats olivia thrillers moving onto tier 3 player starts challenging lord aziz high rollers tier 3 crew beaten lord aziz crew starting challenge lord aziz agent informs player lord aziz lord aziz inherited wealth father recently passed large gambler lord aziz lost father wealth playing baccarat blamed mr. baledin rigged baccarat games despite working mr. baledin rule lord aziz highly despises mr. baledin player defeats lord aziz high rollers made tier 4 player next crew defeat tier 4 crew lucky 7 kandy ringleader player defeats kandy crew members proceeds challenge agent shines light upon kandy despite romantic relationship marco kandy seen multiple times flirting mr. baledin later revealed marco kandy performed heist valentine mr. baledin caught duo instead alerting authorities mr. baledin blackmailed kandy marco working player defeats kandy last time proceeds tier 5 tier 5 player starts challenging house mr. baledin rule player defeats mr. baledin crew starts challenge leader csr classics universe agent informs player plan arrest mr. baledin player would distract baledin continuously racing allowing authorities prepare trap valentine mr. baledin allowing easy arrest defeating mr. baledin third final time mr. baledin shown custody agent talks player informing csr classics league unanimously elected marco become new leader league vowing ameliorate player also congratulated former crew leaders victory secretly despised mr. baledin however player shown discussion jailed mr. baledin formerly unknown client discuss plan executed perfectly revealed marco end line actually behind business csr classics single-player component split five tiers tier introducing progressively faster opposition vehicles player gets challenge boss level player must first beat boss crew move new tier player must race beat crew boss level beating boss level three times player challenged high-stakes rematch player wins race awarded boss car car one tier tier however player loses must give back prize gold previous boss race unlike traditional racing game csr classics feature steering braking acceleration controls instead game focuses timing gear changes use nitrous upgrade tapping screen similar fashion rhythm game player comes buy car choose unloved loved cars unloved cars upgrades usually able purchased via main form in-game currency whereas loved cars come equipped several upgrades always mandate usage valuable in-game currency loved cars also multiplayer via prize cars building car pieces purchasing loved version reduced price races take place across track extending quarter mile events split several categories | [] | Test |
6,202 | 3 | Macintosh_Color_Classic:macintosh color classic macintosh color classic sold macintosh colour classic markets personal computer designed manufactured sold apple computer inc. february 1993 may 1995 all-in-one design integrated 10″ sony trinitron display supporting thousands colors video memory upgrade 512×384 pixel resolution color classic final model original compact family macintosh computers replaced larger-display macintosh lc 500 series power macintosh 5200 lc color classic motorola 68030 cpu running 16 mhz logic board similar macintosh lc ii like macintosh se se/30 color classic single expansion slot lc-type processor direct slot pds incompatible se slots primarily intended apple iie card primary reason color classic switchable 560x384 display essentially quadruple iie 280x192 high-resolution graphics offered education models lcs card allowed lcs emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition apple ii models macintoshes cards cpu accelerators ethernet video cards also made available color classic pds slot color classic shipped apple keyboard known apple keyboard ii m0487 featured soft power switch keyboard mouse supplied apple mouse known apple desktop bus mouse ii m2706 slightly updated model color classic ii featuring macintosh lc 550 logicboard 33 mhz processor released japan canada international markets 1993 sometimes performa 275 versions color classic 256 kb onboard vram expandable 512 kb plugging 256 kb vram simm onboard 68-pin vram slot name color classic printed directly front panel separate plastic insert enabled alternative spelling colour classic colour classic ii used appropriate markets color classic users upgraded machines motherboards performa/lc 575 units mystic upgrade others put entire performa/lc/quadra 630 successor innards takky upgrade based takky way upgrade color classic g3 cpu another common modification unit change display allow 640 × 480 resolution common requirement many programs especially games run introduced february 1 1993 introduced february 10 1993 introduced october 1 1993 introduced october 21 1993 | [
7890,
5732,
722,
1094,
2926,
5037,
5752,
2954,
7572,
6482,
6142,
4373,
7226,
2978,
7601,
4749,
5097,
3346,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
6200,
3387,
3390,
1216,
2331,
4820,
4453,
1234,
1237,
7311,
7327,
889,
550,
552,
5... | Test |
6,203 | 3 | Canon_Cat:canon cat canon cat task-dedicated desktop computer released canon inc. 1987 price surface unlike dedicated word processors popular late 1970s early 1980s far powerful incorporates many unique ideas data manipulation canon cat primarily creation jef raskin originator macintosh project apple leaving company 1982 began designing new computer closer original vision inexpensive utilitarian people computer byte 1987 described cat spiritual heir macintosh features text user interface making use mouse icons graphics data seen long stream text broken several pages instead using traditional command line interface menu system cat makes use special keyboard commands activated holding use front key pressing another key cat also uses special leap keys held allows user incrementally search strings characters machine hardware consists 9-inch 229 mm black-and-white monitor single 3½-inch 256 kb floppy disk drive ibm selectric–compatible keyboard uses motorola 68000 cpu like macintosh lisa atari st amiga running 5 mhz 256 kb ram internal 300/1200 bit/s modem setup user preference data stored 8 kb non-volatile battery backed-up ram cat array i/o interfaces encompasses one centronics parallel port one rs-232c serial port db-25 two rj11 telephone jacks modem loop total weight system 17 pounds 7.7 kg extensive range application software built 256 kb rom standard office suite programs communications 90,000 word spelling dictionary user programming toolchains forth assembly language text-only machine cat includes graphics routines rom well connectors mouse pointing device never used defunct software project called archy initiated raskin develop similar yet even capable system current computing systems project designed eventually replace current software user interfaces | [
768,
4922,
5079,
1670,
1237,
5571,
2012,
336
] | Test |
6,204 | 3 | PowerPC_applications:powerpc applications microprocessors belonging powerpc architecture family used numerous applications apple computer dominant player market personal computers based powerpc processors 2006 switched intel-based processors apple used powerpc processors power mac imac emac powerbook ibook mac mini xserve classic macintosh accelerator boards using powerpcs made daystar digital newer technology sonnet technologies totalimpact several attempts create powerpc reference platforms computers ibm others ibm prep powerpc reference platform system standard intended ensure compatibility among powerpc-based systems built different companies ibm pop powerpc open platform open free standard design powerpc motherboards pegasos open desktop workstation odw open free standard design powerpc motherboards based marvell discovery ii mv64361 chipset prep standard specifies pci bus also support isa microchannel pcmcia prep-compliant systems able run os/2 aix solaris taligent windows nt chrp common hardware reference platform open platform agreed apple ibm motorola chrp systems able run mac os os/2-ppc windows nt aix solaris novell netware chrp superset prep powermac platforms power.org defined power architecture platform reference papr provides foundation development computers based linux operating system list computers based powerpc ibm apple cray sony ibm released personal digital assistant pda reference platform arctic based powerpc 405lp low power project discontinued ibm sold powerpc 4xx design amcc three major seventh-generation game consoles contain powerpc-based processors sony playstation 3 console released november 2006 contains cell processor including 3.2 ghz powerpc control processor eight closely threaded dsp-like accelerator processors seven active one spare microsoft xbox 360 console released 2005 includes 3.2 ghz custom ibm powerpc chip three symmetrical cores core smp-capable two threads nintendo wii console also released november 2006 contains extension powerpc architecture found previous system gamecube ibm sony zarlink semiconductor released several set top box stb reference platforms based ibm powerpc 405 cores ibm set top box stb system-on-chip soc | [
203,
3348,
3012,
3764,
3936,
3734,
2458,
4783,
6474,
578,
2601
] | Validation |
6,205 | 7 | MOSIX:mosix mosix proprietary distributed operating system although early versions based older unix systems since 1999 focuses linux clusters grids mosix cluster/grid need modify link applications library copy files login remote nodes even assign processes different nodes – done automatically like smp mosix researched developed since 1977 hebrew university jerusalem research team prof. amnon barak far ten major versions developed first version called mos multicomputer os 1981–83 based bell lab seventh edition unix ran cluster pdp-11 computers later versions based unix system v release 2 1987–89 ran cluster vax ns32332-based computers followed bsd/os-derived version 1991–93 cluster 486/pentium computers since 1999 mosix tuned linux x86 platforms second version mosix called mosix2 compatible linux-2.6 3.0 kernels mosix2 implemented os virtualization layer provides users applications single system image linux run-time environment allows applications run remote nodes run locally users run regular sequential parallel applications mosix transparently automatically seek resources migrate processes among nodes improve overall performance mosix2 manage cluster multicluster grid well workstations shared resources flexible management grid allows owners clusters share computational resources still preserving autonomy clusters ability disconnect nodes grid time without disrupting already running programs mosix grid extend indefinitely long trust cluster owners must include guarantees guest applications modified running remote clusters hostile computers connected local network nowadays requirements standard within clusters organizational grids mosix2 run native mode virtual machine vm native mode performance better requires modifications base linux kernel whereas vm run top unmodified operating system supports virtualization including microsoft windows linux mac os x. mosix2 suitable running compute intensive applications low moderate amount input/output i/o tests mosix2 show performance several applications 1 gbit/s campus grid nearly identical single cluster mosix suitable running hpc applications low moderate amount i/o tests mosix show performance several applications 1 gbit/s campus grid nearly identical single cluster particularly suitable examples mosix4 released july 2014 version 4 mosix n't require kernel patching mosix became proprietary software late 2001 moshe bar forked last free version started openmosix project february 10 2002 july 15 2007 bar decided end openmosix project effective march 1 2008 claiming increasing power availability low cost multi-core processors rapidly making single-system image ssi clustering less factor computing plans reconfirmed march 2008 linuxpmi project continuing development former openmosix code | [
6268,
3838,
4159,
4759,
5571,
352,
8117,
83,
578,
1586
] | Test |
6,206 | 2 | Data_General_RDOS:data general rdos data general rdos real-time disk operating system real-time operating system released 1970 software sold bundled company popular nova eclipse minicomputers rdos capable multitasking ability run 32 called tasks similar current term threads simultaneously two grounds foreground background within 64 kb memory space later versions rdos compatible data general 16-bit eclipse minicomputer line cut-down version rdos without real-time background foreground capability still capable running multiple threads multi-user data general business basic called data general diskette operating system dg-dos somewhat confusingly simply dos another related operating system rtos real-time operating system diskless environments rdos micronova-based micro products micro-minicomputers sometimes called dg/rdos rdos superseded early 1980s data general aos family operating systems including aos/vs mp/aos mp/os smaller systems following list commands supported rdos/dos cli late 1970s data general sued sherman clayton antitrust acts competitors practice bundling rdos data general nova eclipse minicomputer data general introduced data general nova company called digidyne wanted use rdos operating system hardware clone data general refused license software claimed bundling rights 1985 courts including united states court appeals ninth circuit ruled data general case called digidyne v. data general supreme court united states declined hear data general appeal although justices white blackmun would heard precedent set lower courts eventually forced data general license operating system restricting software data general hardware illegal tying arrangement 1999 data general taken emc corporation | [
1522,
4670,
6088,
5571,
3541,
5232,
4336,
336,
64,
3748,
3751,
2803
] | Train |
6,207 | 8 | Keyword_Tool_(software):keyword tool software keyword tool free saas product uses google autocomplete search engines generate relevant long-tail keywords related keywords topic keyword tool launched middle 2014. created artem galimov leow kah thong started providing keywords 83 languages autocomplete 194 google domains 2015 keyword tool participated startup chile 13th generation program keywordtool helps user locate long-tail related keywords relies google autocomplete feature giving quick access popular search terms scrapes keyword suggest ideas google youtube bing amazon ebay app store | [
330,
6312
] | Train |
6,208 | 4 | Common_Criteria:common criteria common criteria information technology security evaluation referred common criteria cc international standard iso/iec 15408 computer security certification currently version 3.1 revision 5 common criteria framework computer system users specify security functional assurance requirements sfrs sars respectively security target st may taken protection profiles pps vendors implement make claims security attributes products testing laboratories evaluate products determine actually meet claims words common criteria provides assurance process specification implementation evaluation computer security product conducted rigorous standard repeatable manner level commensurate target environment use common criteria evaluations performed computer security products systems evaluation process also tries establish level confidence may placed product security features quality assurance processes far pps evaluated sts/certified products components e.g. firewalls operating systems smart cards common criteria certification sometimes specified procurement standards containing e.g. interoperation system management user training supplement cc product standards examples include iso/iec 17799 properly bs 7799-1 iso/iec 27002 german details cryptographic implementation within toe outside scope cc instead national standards like fips 140-2 give specifications cryptographic modules various standards specify cryptographic algorithms use recently pp authors including cryptographic requirements cc evaluations would typically covered fips 140-2 evaluations broadening bounds cc scheme-specific interpretations national evaluation schemes phasing eal-based evaluations accept products evaluation claim strict conformance approved pp united states currently allows pp-based evaluations canada process phasing eal-based evaluations cc originated three standards cc produced unifying pre-existing standards predominantly companies selling computer products government market mainly defence intelligence use would need evaluated one set standards cc developed governments canada france germany netherlands uk u.s. testing laboratories must comply iso/iec 17025 certification bodies normally approved iso/iec 17065 compliance iso/iec 17025 typically demonstrated national approval authority characteristics organizations examined presented iccc 10 well common criteria standard also sub-treaty level common criteria mra mutual recognition arrangement whereby party thereto recognizes evaluations common criteria standard done parties originally signed 1998 canada france germany united kingdom united states australia new zealand joined 1999 followed finland greece israel italy netherlands norway spain 2000 arrangement since renamed common criteria recognition arrangement ccra membership continues expand within ccra evaluations eal 2 mutually recognized including augmentation flaw remediation european countries within former itsec agreement typically recognize higher eals well evaluations eal5 tend involve security requirements host nation government september 2012 majority members ccra produced vision statement whereby mutual recognition cc evaluated products lowered eal 2 including augmentation flaw remediation vision indicates move away assurance levels altogether evaluations confined conformance protection profiles stated assurance level achieved technical working groups developing worldwide pps yet transition period fully determined july 2 2014 new ccra ratified per goals outlined within 2012 vision statement major changes arrangement include common criteria generic directly provide list product security requirements features specific classes products follows approach taken itsec source debate used prescriptive approach earlier standards tcsec fips 140-2 common criteria certification guarantee security ensure claims security attributes evaluated product independently verified words products evaluated common criteria standard exhibit clear chain evidence process specification implementation evaluation conducted rigorous standard manner various microsoft windows versions including windows server 2003 windows xp certified security patches address security vulnerabilities still getting published microsoft windows systems possible process obtaining common criteria certification allows vendor restrict analysis certain security features make certain assumptions operating environment strength threats faced product environment additionally cc recognizes need limit scope evaluation order provide cost-effective useful security certifications evaluated products examined level detail specified assurance level pp evaluations activities therefore performed certain depth use time resources offer reasonable assurance intended environment microsoft case assumptions include a.peer systems toe communicates assumed management control operate security policy constraints toe applicable networked distributed environments entire network operates constraints resides within single management domain security requirements address need trust external systems communications links systems assumption contained controlled access protection profile capp products adhere based assumptions may realistic common use general-purpose operating systems claimed security functions windows products evaluated thus considered secure assumed specified circumstances also known evaluated configuration whether run microsoft windows precise evaluated configuration apply microsoft security patches vulnerabilities windows continue appear security vulnerabilities exploitable product evaluated configuration product common criteria certification voluntarily withdrawn vendor alternatively vendor re-evaluate product include application patches fix security vulnerabilities within evaluated configuration failure vendor take either steps would result involuntary withdrawal product certification certification body country product evaluated certified microsoft windows versions remain eal4+ without including application microsoft security vulnerability patches evaluated configuration shows limitation strength evaluated configuration august 2007 government computing news gcn columnist william jackson critically examined common criteria methodology us implementation common criteria evaluation validation scheme ccevs column executives security industry researchers representatives national information assurance partnership niap interviewed objections outlined article include 2006 research paper computer specialist david a. wheeler suggested common criteria process discriminates free open-source software foss -centric organizations development models common criteria assurance requirements tend inspired traditional waterfall software development methodology contrast much foss software produced using modern agile paradigms although argued paradigms align well others attempted reconcile paradigms political scientist jan kallberg raised concerns lack control actual production products certified absence permanently staffed organizational body monitors compliance idea trust common criteria it-security certifications maintained across geopolitical boundaries throughout lifetime cc universally adopted even creator nations particular cryptographic approvals handled separately canadian us implementation fips-140 cesg assisted products scheme caps uk uk also produced number alternative schemes timescales costs overheads mutual recognition found impeding operation market early 2011 nsa/css published paper chris salter proposed protection profile oriented approach towards evaluation approach communities interest form around technology types turn develop protection profiles define evaluation methodology technology type objective robust evaluation concern may negative impact mutual recognition sept 2012 common criteria published vision statement implementing large extent chris salter thoughts previous year key elements vision included | [
3611,
6085,
3620,
6428,
3963,
2214,
737,
7554,
38,
1805,
1114,
1486,
2598,
6842,
1882,
2251,
5785,
3678,
3682,
7239,
6172,
7626,
3003,
1543,
3697,
1959,
142,
504,
3037,
4440,
7301,
4095,
7721,
5571,
7732,
3794,
4884,
5948,
2054,
2057,
7... | Test |
6,209 | 2 | Remix_OS:remix os remix os now-discontinued computer operating system personal computers x86 arm architectures prior discontinuation development shipped number 1st- 3rd-party devices remix os allowed pc users run android mobile apps compatible intel-based pc january 2016 jide announced beta version operating system called remix os pc based android-x86 — x86-port android operating system — available download free website beta version remix os pc brings hard drive installation 32-bit support uefi support ota updates except free software licensed parts available github unlike android-x86 source code remix os available public google mobile services gms removed remix mini remix os update 3.0.207 jide claimed ensure consistent experience across android devices later comments suggest compatibility issue apps resulted google requesting gms pre-loaded july 17 2017 jide announced development remix os pc well related consumer products development discontinued stating company would restructuring approach remix os transitioning away consumer space april 2019 os succeeded continued numerous forks intending continue improve project prominently phoenixos primeos three versions remix os remix os pc remix os remix ultratablet remix os remix mini remix os pc remix ultratablet remix mini remix os 3.0 device remix pro 2-in-1 tablet announced 2016 however longer made due popularity affordability os asia numerous forks/clones project made various firms notably phoenixos chinese-based chaozhuo technology primeos indian-based floydwiz technologies private limited like remixos pre-dominantly closed source lot improved features intended improve optimise os newer applications pc projects like openthos blissos intend release project open source mind openthos restricted chinese markets moment blissos based slightly modified version android | [
3933,
2179,
2187,
2909,
5724,
5372,
6086,
6427,
7894,
1095,
2935,
6453,
4340,
42,
2585,
2228,
1487,
3310,
2591,
5771,
58,
3996,
5775,
7587,
4008,
1893,
7954,
7956,
1522,
1909,
6884,
7969,
6175,
5473,
7251,
4400,
7253,
3696,
474,
1179,
6... | Test |
6,210 | 9 | Mocl:mocl mocl programming language dialect implementation language lisp named common lisp focused mobile device platforms includes compiler runtime system currently runs ios android macos mocl first announced november 14 2012 first release timed occur lisp universal time 3581000000 june 23 2013 recent release mocl named paren mage released may 6 2014 adding support macos application creation remote read–eval–print loop repl runs mobile device | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
4332,
2218,
4704,
5757,
6116,
1116,
6471,
7573,
2600,
5077,
1885,
2249,
1889,
1890,
6507,
795,
6876,
6888,
3370,
1557,
6191,
5494,
5501,
144,
4074,
4085,
7298,
5515,
8025,
3749,
6949,
... | Test |
6,211 | 2 | Comparison_of_open-source_wireless_drivers:comparison open-source wireless drivers wireless network cards computers require control software make function firmware device drivers list status open-source drivers 802.11 wireless network cards following incomplete list supported wireless devices | [
3256,
2182,
4667,
7159,
6428,
3955,
7532,
5740,
5744,
5047,
3636,
4705,
2942,
6117,
4341,
2585,
3981,
5760,
5762,
412,
753,
7201,
415,
5065,
7207,
6477,
7209,
7581,
1133,
3666,
6489,
1139,
2970,
6149,
4012,
6860,
6505,
7956,
5460,
7242,
... | Test |
6,212 | 9 | FOCAL-69:focal-69 focal-69 landmark version focal programming language widely publicized original version language created 1968 focal-69 created richard merrill important variable names may start letter except f f reserved functions may contain sequence letters numbers however first two characters significant instance following code sample focal new conversational language refers variable destination des variable may treated array taking subscripts -2048 2047 focal-69 contained five mathematical operators focal-69 unusual mathematical expressions could use interchangeably matched pairs establish precedence language support relative operators e.g. greater .gt. etc. language contained following built-in functions every line focal-69 program must start line number joss unlike basic line numbers real numbers focal-69 integers allowed line numbers may range 1.01 31.99 whole number referred group number group number 1 31 used command editor also allows programmer print statements group e.g. write 2 delete group e.g. erase 2 multiple statements placed single line usually behavior different statements separate lines except case loops ask command abbreviation take list strings variables echo strings store user input variables user n't enter number enters text system convert initial character unique number comment command abbreviation c creates remark command abbreviation branches execution subroutine subroutine referenced either group number line number execution resumed next statement return encountered command abbreviation f provides loop three arguments specified first initial value loop variable second increment assumed 1 omitted third value terminating value loop sample loop go command abbreviation g jumps program execution specified line number editor go command also used start program beginning specified line number command abbreviation provides conditional branch based sign expression numeric expression command take one three line numbers expression less zero execution branches first line number equal zero second line number greater zero third line number language lacked relative operators greater equal less branch x 5 one must compare x 5 quit command abbreviation q terminates execution program returns control editing environment return command abbreviation r branches execution subroutine back calling location following sample subroutine converting yes/no prompt value set command abbreviation assigns results expression specified variable type command abbreviation provides output displaying item series item consists exclamation mark group exclamation marks output carriage return line feed item consists hash mark output carriage return without line feed new lines entered program simply beginning command line number editing commands erase abbreviation e modify abbreviation write abbreviation w file command open abbreviation unusual interactive system size focal-69 supported ability chain programs use library commands program names could six characters long library command abbreviation l focal-71 added since interpreter lacked sufficient memory space store error messages richard merrill used work-around focal reported address error-detecting code pseudo floating-point number example division zero error detected code address 4333 error message 28.73 01.10 01.10 referred line number merrill clearly derived focal-69 joss focal-69 concise simplification joss simplicity required pdp-8 minicomputer opposed mainframe joss developed | [
4946,
724
] | Test |
6,213 | 2 | Basic_direct_access_method:basic direct access method basic direct access method bdam access method ibm os/360 successors computer operating systems system/360 later mainframes bdam consists routines used retrieving data storing data onto direct access devices bdam available os/360 os/vs2 mvs z/os related high-end operating systems basic ibm terminology indicates lower-level access method deals data sets terms physical blocks provide either read-ahead called anticipatory buffering synchronization — user program explicitly wait completion input/output event bdam programmer directly store retrieve block specifying either actual device address relative position within data set relative block number relative track within data set system begin search bdam provides index structure file except programmed application many applications hashing randomizing function may used assign block address based key data physical keys used key last record within block must written key block bdam application program interface compared interface offered open read write close calls using file handles operating systems unix windows bdam still supported ibm 2012 dependence physical device geometry new ibm direct-access devices used z/os emulate ibm 3390 devices regardless real physical characteristics programmer specifies codice_1 data control block dcb indicate use bdam space 16 extents volume data set equivalent file reside 255 extents across multiple volumes application dependency space contiguous tracks allocate space direct data set contiguous tracks coding codice_2 dd statement direct data sets must preformatted use opening output writing blocks sequentially load dummy records load initial data basic access method bdam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_3 macro bdam uses standard system macros codice_4 codice_5 codice_6 codice_7 codice_3 codice_6 codice_7 macro instructions must provide block address key desired record codice_3 macro used wait completion specific operation data accessed data buffer reused possible start multiple input/output operations run concurrently records direct data set contain user-specified recorded keys 255 bytes—all keys file must length reads writes specify key addition disk address bdam search starting requested block entire area file record matching key allows multiple keys hashing track handled automatically i/o subsystem bdam accepts disk addresses either actual device addresses relative track addresses relative block numbers device addresses eight byte fields form mbbcchhr subfields binary numbers specifying device addresses makes dataset unmovable relative track addresses three byte fields form ttr subfields binary numbers relative block numbers four byte fullword binary numbers indicating block number file first block block 0 form addressing used fixed length blocks codice_12 | [
7331,
4759,
4494,
3278,
1851,
7003,
839,
5502,
5852,
7661,
5764,
2596,
607,
5081,
3233,
7040,
7783
] | Validation |
6,214 | 8 | Pageview:pageview pageview page view abbreviated business pv occasionally called page impression request load single html file web page internet site world wide web page request would result web surfer clicking link another page pointing page question contrast hit refers request file web server therefore may many hits per page view since html page contain multiple files—images css etc balance page views refer number pages viewed clicked site given time page views may counted part web analytics owner site information useful see change page information way presented results visits advertisements page publishers would also interested number page views determine expected revenue ads reason term used widely internet marketing advertising page impression long measure user activity website however activity necessarily associated loading complete html page modern programming techniques serve pages means n't show http requests since page views help estimate popularity sites helps determine value advertising revenue common metric cpm stands 'cost per thousand roman numeral 1,000 commonly used metrics measure page views divided thousands cost per 1000 views used ad rates thus less cpm better deal offers advertisers however growing concern cpm trustworthy looks advertising market although cpm arrangement everyone visits site makes publishers ’ money advertiser ’ view cpm challenged comparison cpc cpa terms adverts ’ efficiency visiting mean clicking ads preferred way count page views using web analytics software measure number pages site therefore helps people receive rough estimate page views web sites also many page view measurement tools available including open source ones well licensed products despite wide range use page view come criticisms page view manipulated boosted specific purposes example recent incident called 'page view fraud compromised accuracy measurement page view boosting page view perpetrators used tool called bot buy fake page-views attention recognition feedback increasing site value result people already started building alternatives measure audiences ophan saying page view becoming passe fake page views reflect bots instead humans wikipedia provides tools allow one see many people visited wikipedia article given time period used tools instance display popular articles day wikipedia pageviews certain types articles correlate changes stock market prices box office success movies spread disease among applications datamining since search engines directly influence popular wikipedia statistics may provide unfiltered real-time view people searching web societal interests instance used gain insights public anxiety information seeking events identification concepts significant increase interest public 2015 study examines influence reddit posts wikipedia pageviews | [
1710,
4570,
2946,
6296,
3706,
4600,
84,
8101
] | Test |
6,215 | 9 | Linotte:linotte linotte interpreted 4th generation programming language linotte syntax french language goal allow french-speaking children francophones little computer science experience easily learn programming slogan french know read book write computer program linotte uses non-technical vocabulary entirely french terms closer used film literature program book variable actor screen cloth instead executing book read function body starts début french start keywords languages might named things print log linotte named things like affiche french display similarly program demande ask prompt user enter value linotte also supports things like networking graphics even contains web templating engine allows mixing html linotte file much like php jsp | [
6507,
6029
] | Test |
6,216 | 5 | Stellar_(payment_network):stellar payment network stellar open source decentralized protocol digital currency fiat money transfers allows cross-border transactions pair currencies stellar protocol supported 501 c 3 nonprofit stellar development foundation 2014 jed mccaleb founder mt gox co-founder ripple launched network system stellar former lawyer joyce kim official launch mccaleb formed website called secret bitcoin project seeking alpha testers nonprofit stellar development foundation created collaboration stripe ceo patrick collison project officially launched july stellar received 3 million seed funding stripe stellar released decentralized payment network protocol native currency stellar launch network 100 billion stellars 25 percent would given non-profits working toward financial inclusion stripe received 2 percent 2 billion initial stellars return seed investment cryptocurrency originally known stellar later called lumens xlm august 2014 mercado bitcoin first brazilian bitcoin exchange announced would using stellar network january 2015 stellar approximately 3 million registered user accounts platform market cap almost 15 million stellar development foundation released upgraded protocol new consensus algorithm april 2015 went live november 2015 new algorithm used scp cryptocurrency protocol created stanford professor david mazières lightyear.io for-profit entity stellar launched may 2017 commercial arm company september 2017 stellar announced benefits program part stellar partnership grant program would award partners 2 million worth lumens project development september 2018 lightyear corporation acquired chain inc combined company named interstellar 2015 announced stellar releasing integration vumi open-sourced messaging platform praekelt foundation vumi uses cellphone talk time currency using stellar protocol stellar partnered cloud-based banking software company oradian april 2015 integrate stellar oradian banking platform add microfinance institutions mfis nigeria deloitte announced integration stellar 2016 build cross-border payments application deloitte digital bank december 2016 announced stellar payment network expanded include coins.ph mobile payments startup philippines icici bank india african mobile payments firm flutterwave french remittances company tempo money transfer october 2017 stellar partnered ibm klickex facilitate cross-border transactions south pacific region cross-border payment system developed ibm includes partnerships banks area december 2017 techcrunch announced stellar partnership sureremit nigerian based non-cash remittances platform stellar open-source protocol exchanging money tokens using stellar consensus protocol platform source code hosted github servers run software implementation protocol use internet connect communicate stellar servers server stores ledger accounts network transactions among accounts occur mining rather consensus process among accounts quorum slice | [
6069,
2451,
993,
6428,
6430,
5571,
3024,
744,
7916,
3401,
8124,
5965,
3915,
1329,
538
] | Test |
6,217 | 3 | Philips_CD-i:philips cd-i philips cd-i abbreviation compact disc interactive interactive multimedia cd player developed marketed dutch company philips supported december 1991 late 1998 created provide functionality audio cd player game console lower price personal computer cd-rom drive cost savings due lack floppy drive keyboard mouse monitor standard television used less operating system software cd-i also refers multimedia compact disc standard used cd-i console also known green book co-developed philips sony addition games educational multimedia reference titles produced interactive encyclopedias museum tours popular public internet access widespread cd-i also one earliest game systems implement internet features including subscriptions web browsing downloading e-mail online play facilitated use additional hardware modem cd-online disc renamed web-i us philips initially released britain 1995 150 us development cd-i format began 1984 first publicly announced 1986 first philips cd-i player released 1991 initially priced around us 1,000 capable playing interactive cd-i discs audio cds cd+g cd+graphics karaoke cds photo cds video cds vcds though latter required optional digital video card provide mpeg-1 decoding philips also licensed cd-i format manufacturers use also cd-i players sony intelligent discman brand philips marketed cd-i home entertainment system europe games educational machine u.s cd-i abandoned 1996 commercial failure estimated lost philips much one billion u.s. dollars american market philips first marketed cd-i family entertainment product avoided mentioning video games compete game consoles early software releases focused heavily educational music self-improvement titles games many adaptations board games connect four however system handily beaten market multimedia devices cheap low-end pcs games best-selling software 1993 philips encouraged ms-dos console developers create games introduced 250 peripheral memory support full-motion video added new consoles second controller port multiplayer games attempts develop foothold games market unsuccessful system designed strictly multimedia player thus under-powered compared gaming platforms market respects earlier cd-i games included entries popular nintendo franchises although games developed nintendo specifically mario game titled hotel mario three legend zelda games released zelda adventure nintendo philips established agreement co-develop cd-rom enhancement super nintendo entertainment system due licensing disagreements nintendo previous partner sony agreement produced prototype console called snes-cd philips nintendo never released cd-rom add-on philips still contractually allowed continue using nintendo characters applications developed using authoring software produced optimage included optimage balboa runtime libraries mediamogul second company produced authoring software script systems produced abcd-i philips also released several versions popular tv game shows cd-i including versions jeopardy hosted alex trebek name tune hosted bob goen two versions joker wild one adults hosted wink martindale one kids hosted marc summers cd-i games north america exception name tune charlie o'donnell announcer netherlands also released version lingo cd-i 1994 1993 american musician todd rundgren created first music-only fully interactive cd world order cd-i application allows user completely arrange whole album personal way 15,000 points customization cd-i series learning games edutainment targeted children infancy adolescence intended younger audience included busytown berenstain bears various others usually vivid cartoon-like settings accompanied music logic puzzles although extensively marketed philips notably via infomercial consumer interest cd-i titles remained low 1994 sales cd-i systems begun slow 1998 product line dropped plans cd-i 2 certainly present argonaut software even designated design chip sets successor cd-i however president con boonstra saw interest media area philips philips sold everything including media subsidiary polygram dutch half philips media sold softmachine released lost ride cd-i last product philips also sold french half gaming subsidiary philips media bv french publisher infogrames 1997 dutch eurodance duo 2 unlimited released cd-i compilation album 1994 called beyond limits contains standard cd tracks well cd-i-exclusive media disc large number full motion video titles dragon lair mad dog mccree appeared system one considered one stronger cd-i titles later ported pc february 1994 issue electronic gaming monthly remarked cd-i full motion video capabilities strongest point nearly best software required mpeg upgrade card mid-1996 u.s. market cd-i software dried philips given releasing titles continued publish cd-i games europe console still held popularity home market exhausted philips tried success position technology solution kiosk applications industrial multimedia addition consumer models professional development players sold philips interactive media systems vars philips marketed several cd-i player models also exist number hard-to-categorize models fw380i integrated mini-stereo cd-i player 21tcdi30 television built-in cd-i device cd-i 180/181/182 modular system first cd-i system produced collaboration kyocera 1988 actual debut cd-i addition philips several manufacturers produced cd-i players including philips subsidiary magnavox goldstar lg electronics digital video systems memorex grundig saab electric sony intelligent discman hybrid home/portable cd-i player kyocera nbs highscreen bang olufsen produced television built-in cd-i device beocenter av5 recognizing growing need among marketers networked multimedia philips partnered 1992 amsterdam-based cdmatics develop telecd-i also telecd concept cd-i player connected network pstn internet enabling data-communication rich media presentation dutch grocery chain albert heijn mail-order company early adopters introduced award-winning telecd-i applications home-shopping home-delivery services cdmatics also developed special philips telecd-i assistant set software tools help worldwide multimedia industry develop implement telecd-i telecd-i world first networked multimedia application time introduction 1996 philips acquired source code rights cdmatics 1995 philips introduced cd-online service provided cd-i full internet access 14.4k modem including online shopping email support networked multiplayer gaming select cd-i games service required cd-i player dv cartridge internet starter kit initially retailed £99.99 andy stout writer official cd-i magazine explained cd-online cd-online service went live uk october 25 1995 march 1996 netherlands 399 guilders system reportedly scheduled launch us web-i august 1996 although philips aggressively promoted cd-i august 1993 computer gaming world reported skepticism persists long-term prospects compared platforms like ibm pc compatibles apple macintosh sega genesis magazine stated january 1994 despite philips new emphasis games cd-i still answer hardcore gamers console may yet surprise us future recommended cd-i video cartridge needing buy new console price right software support 3do probably better could wait months early 1995 review system gamepro stated inconsistent game quality puts cd-i disadvantage high-powered game producers late 1995 review next generation criticized philips approach marketing cd-i hardware unit excels practically nothing except fmv addition 200 digital video cartridge magazine noted philips yet officially discontinued cd-i dead intents purposes citing evidence fact though philips large booth 1995 electronic entertainment expo cd-i hardware software display next generation scored console one five stars discontinuation retrospectively cd-i overwhelmingly panned critics blasted graphics games controls microsoft ceo bill gates admitted initially worried cd-i due philips heavy support device two-pronged attack games console pc markets retrospect device kind basically got caught middle terrible game machine terrible pc cd-i various controllers ranked fifth worst video game controller ign editor craig harris pc world ranked fourth list 10 worst video game systems time gamepro.com listed number four list 10 worst-selling consoles time 2008 cnet listed system list worst game console ever 2007 gametrailers ranked philips cd-i fourth worst console time top 10 worst console lineup games heavily criticized include hotel mario zelda adventure egm seanbaby rated wand gamelon one worst video games time however positively received critics often held standout title cd-i october 1994 philips claimed installed base one million units cd-i 1996 wall street journal reported total us sales amounted 400,000 units | [
768,
5822,
6330,
4006,
5526,
348,
1867,
1237,
2868,
4277,
5571,
2379,
638,
291
] | Test |
6,218 | 4 | Laplink:laplink laplink proprietary piece software used synchronize laptops desktops using parallel port serial port laplink cable laplink typically shipped serial parallel cables serial cables much lower data transfer rate parallel cables later laplink iterations shipped ethernet cables port port traffic | [] | Test |
6,219 | 7 | Amazon_(company):amazon company amazon.com inc. american multinational technology company based seattle washington focuses e-commerce cloud computing digital streaming artificial intelligence considered one big four technology companies along google apple facebook amazon known disruption well-established industries technological innovation mass scale world largest e-commerce marketplace ai assistant provider cloud computing platform measured revenue market capitalization amazon largest internet company revenue world second largest private employer united states one world valuable companies amazon second largest technology company revenue amazon founded jeff bezos july 5 1994 bellevue washington company initially started online marketplace books later expanded sell electronics software video games apparel furniture food toys jewelry 2015 amazon surpassed walmart valuable retailer united states market capitalization 2017 amazon acquired whole foods market 13.4 billion vastly increased amazon presence brick-and-mortar retailer 2018 bezos announced two-day delivery service amazon prime surpassed 100 million subscribers worldwide amazon distributes downloads streaming video music audiobook amazon prime video amazon music audible subsidiaries amazon also publishing arm amazon publishing film television studio amazon studios cloud computing subsidiary amazon web services produces consumer electronics including kindle e-readers fire tablets fire tv echo devices addition amazon subsidiaries also include ring twitch.tv whole foods market imdb among various controversies company criticized technological surveillance overreach hyper-competitive demanding work culture tax avoidance anti-competitive practices 1994 jeff bezos incorporated amazon chose location seattle technical talent microsoft located may 1997 organization went public company began selling music videos 1998 time began operations internationally acquiring online sellers books united kingdom germany following year organization also sold video games consumer electronics home-improvement items software games toys addition items 2002 corporation started amazon web services aws provided data web site popularity internet traffic patterns statistics marketers developers 2006 organization grew aws portfolio elastic compute cloud ec2 rents computer processing power well simple storage service s3 rents data storage via internet made available year company started fulfillment amazon managed inventory individuals small companies selling belongings company internet site 2012 amazon bought kiva systems automate inventory-management business purchasing whole foods market supermarket chain five years later 2017. board directors 2000 u.s. toy retailer toys r us entered 10-year agreement amazon valued 50 million per year plus cut sales toys r us would exclusive supplier toys baby products service chain website would redirect amazon toys games category 2004 toys r us sued amazon claiming perceived lack variety toys r us stock amazon knowingly allowed third-party sellers offer items service categories toys r us granted exclusivity 2006 court ruled favor toys r us giving right unwind agreement amazon establish independent e-commerce website company later awarded 51 million damages 2001 amazon entered similar agreement borders group amazon would co-manage borders.com co-branded service borders pulled arrangement 2007 plans also launch online store october 18 2011 amazon.com announced partnership dc comics exclusive digital rights many popular comics including superman batman green lantern sandman watchmen partnership caused well-known bookstores like barnes noble remove titles shelves november 2013 amazon announced partnership united states postal service begin delivering orders sundays service included amazon standard shipping rates initiated metropolitan areas los angeles new york high-volume inability deliver timely way plans expand dallas houston new orleans phoenix 2014 june 2017 nike confirmed pilot partnership amazon sell goods directly platform amazonfresh sold range booths branded products home delivery selected areas september 2017 amazon ventured one sellers jv appario retail owned patni group recorded total income us 104.44 million ₹ 759 crore financial year 2017–18 november 2018 amazon reached agreement apple inc. sell selected products service via company selected apple authorized resellers result partnership apple authorized resellers may sell apple products amazon effective january 4 2019 amazon.com product lines available website include several media books dvds music cds videotapes software apparel baby products consumer electronics beauty products gourmet food groceries health personal-care items industrial scientific supplies kitchen items jewelry watches lawn garden items musical instruments sporting goods tools automotive items toys games amazon separate retail websites countries also offers international shipping products certain countries amazon.com number products services available including amazon owns 40 subsidiaries including zappos shopbop diapers.com kiva systems amazon robotics audible goodreads teachstreet twitch imdb a9.com company focused researching building innovative technology subsidiary since 2003 amazon maritime inc. holds federal maritime commission license operate non-vessel-owning common carrier nvocc enables company manage shipments china united states audible.com seller producer spoken audio entertainment information educational programming internet audible sells digital audiobooks radio tv programs audio versions magazines newspapers production arm audible studios audible also become world largest producer downloadable audiobooks january 31 2008 amazon announced would buy audible 300 million deal closed march 2008 audible became subsidiary amazon beijing century joyo courier services subsidiary amazon applied freight forwarding license us maritime commission amazon also building logistics trucking air freight potentially compete ups fedex brilliance audio audiobook publisher founded 1984 michael snodgrass grand michigan company produced first 8 audio titles 1985 company purchased amazon 2007 undisclosed amount time acquisition brilliance producing 12–15 new titles month operates independent company within amazon 1984 brilliance audio invented technique recording twice much cassette technique involved recording two channels stereo track credited revolutionizing burgeoning audiobook market mid-1980s since made unabridged books affordable comixology cloud-based digital comics platform 200 million comic downloads offers selection 40,000 comic books graphic novels across android ios fire os windows 8 devices web browser amazon bought company april 2014 createspace offers self-publishing services independent content creators publishers film studios music labels became subsidiary 2009 eero company manufactures mesh-capable routers company founded 2015 based san francisco amazon announced would buy eero 2019 goodreads social cataloging website founded december 2006 launched january 2007 otis chandler software engineer entrepreneur elizabeth chandler website allows individuals freely search goodreads extensive user-populated database books annotations reviews users sign register books generate library catalogs reading lists also create groups book suggestions discussions december 2007 site 650,000 members 10 million books added amazon bought company march 2013 lab126 developers integrated consumer electronics kindle became subsidiary 2004 amazon announced would fund deploy large broadband satellite internet constellation called project kuiper april 2019 expected take decade fully deploy 3,236 satellites planned full constellation order provide internet tens millions people lack basic access broadband internet amazon announced intend sell broadband service directly consumers offer broadband service partnerships companies satellites use orbit height kuiper work concert amazon previously announced large network 12 satellite ground station facilities aws ground station unit announced november 2018 amazon filed communications license documents us regulatory authorities july 2019 included information wholly owned amazon subsidiary intended deploy satellite constellation kuiper systems llc based seattle washington kuiper system consist 3,236 satellites operating 98 orbital planes altitudes kuiper system includes high-performance satellites terrestrial gateways internetworking technologies range customer terminals president kuiper systems rajeev badyal former vice president spacex satellite internet constellation business unit ring home automation company founded jamie siminoff 2013 primarily known wifi powered smart doorbells manufactures devices security cameras amazon bought ring 1 billion usd 2018 shelfari social cataloging website books shelfari users built virtual bookshelves titles owned read could rate review tag discuss books users could also create groups members could join create discussions talk books topics recommendations could sent friends site books read amazon bought company august 2008 shelfari continued function independent book social network within amazon january 2016 amazon announced would merging shelfari goodreads closing shelfari souq.com largest e-commerce platform middle east based dubai united arab emirates march 28 2017 amazon confirmed would acquiring souq.com 580 million souq.com subsidiary amazon acts amazon arm middle east region twitch live streaming platform video primarily oriented towards video gaming content service first established spin-off general-interest streaming service known justin.tv prominence eclipsed twitch justin.tv eventually shut parent company august 2014 order focus exclusively twitch later month twitch acquired amazon 970 million twitch amazon also owns curse inc. operator video gaming communities provider voip services gaming since acquisition twitch began sell games directly platform began offering special features amazon prime subscribers site rapid growth boosted primarily prominence major esports competitions service leading gamespot senior esports editor rod breslau described service espn esports service 1.5 million broadcasters 100 million monthly viewers whole foods market american supermarket chain exclusively featuring foods without artificial preservatives colors flavors sweeteners hydrogenated fats august 23 2017 reported federal trade commission approved merger amazon.com whole foods market following day announced deal would closed august 28 2017 junglee former online shopping service provided amazon enabled customers search products online offline retailers india junglee started virtual database used extract information internet deliver enterprise applications progressed junglee started use database technology create single window marketplace internet making every item every supplier available purchase web shoppers could locate compare transact millions products across internet shopping mall one window amazon acquired junglee 1998 website junglee.com launched india february 2012 comparison-shopping website curated enabled searching diverse variety products clothing electronics toys jewelry video games among others across thousands online offline sellers millions products browse-able whereby client selects price directed seller november 2017 amazon closed junglee.com former domain currently redirects amazon india amazon first launched distribution network 1997 two fulfillment centers seattle new castle delaware amazon several types distribution facilities consisting crossdock centers fulfillment centers sortation centers delivery stations prime hubs prime air hubs 75 fulfillment centers 25 sortation centers 125,000 employees employees responsible five basic tasks unpacking inspecting incoming goods placing goods storage recording location picking goods computer recorded locations make individual shipment sorting packing orders shipping computer records location goods maps routes pickers plays key role employees carry hand-held computers communicate central computer monitor rate progress domain amazon.com attracted least 615 million visitors annually 2008 amazon attracts 130 million customers us website per month start 2016 company also invested heavily massive amount server capacity website especially handle excessive traffic december christmas holiday season results generated amazon search engine partly determined promotional fees amazon localized storefronts differ selection prices differentiated top-level domain country code amazon allows users submit reviews web page product reviewers must rate product rating scale one five stars amazon provides badging option reviewers indicate real name reviewer based confirmation credit card account indicate reviewer one top reviewers popularity customers may comment vote reviews indicating whether found review helpful review given enough helpful hits appears front page product 2010 amazon reported largest single source internet consumer reviews publishers asked bezos amazon would publish negative reviews defended practice claiming amazon.com taking different approach ... want make every book available—the good bad ugly ... let truth loose cases positive reviews written posted public relations companies behalf clients instances writers using pseudonyms leave negative reviews rivals works search inside book feature allows customers search keywords full text many books catalog feature started 120,000 titles 33 million pages text october 23 2003 300,000 books program amazon cooperated around 130 publishers allow users perform searches avoid copyright violations amazon return computer-readable text book instead returns picture matching page instructs web browser disable printing puts limits number pages book single user access additionally customers purchase online access books via amazon upgrade program amazon derives many sales around 40 2008 third-party sellers sell products amazon associates receive commission referring customers amazon placing links amazon websites referral results sale worldwide amazon 900,000 members affiliate programs middle 2014 amazon affiliate program used 1.2 websites second popular advertising network google ads frequently used websites non-profits provide way supporters earn commission amazon reported 1.3 million sellers sold products amazon websites 2007 unlike ebay amazon sellers maintain separate payment accounts payments handled amazon associates access amazon catalog directly websites using amazon web services aws xml service new affiliate product astore allows associates embed subset amazon products within another website linked another website june 2010 amazon seller product suggestions launched rumored internally called project genesis provide transparency sellers recommending specific products third-party sellers sell amazon products suggested based customers browsing history amazon sales rank asr provides indication popularity product sold amazon locale relative indicator popularity updated hourly effectively best sellers list millions products stocked amazon asr direct effect sales product used amazon determine products include bestsellers lists products appear lists enjoy additional exposure amazon website may lead increase sales particular products experience large jumps sales ranks may included within amazon lists movers shakers listing provides additional exposure might lead increase sales competitive reasons amazon release actual sales figures public however amazon begun release point sale data via nielsen bookscan service verified authors asr source much speculation publishers manufacturers marketers amazon release details sales rank calculation algorithm companies analyzed amazon sales data generate sales estimates based asr though amazon states amazon employs multi-level e-commerce strategy amazon started focusing business-to-consumer relationships customers business-to-business relationships suppliers moved facilitate customer-to-customer amazon marketplace acts intermediary facilitate transactions company lets anyone sell nearly anything using platform addition affiliate program lets anyone post-amazon links earn commission click-through sales program lets affiliates build entire websites based amazon platform large e-commerce sellers use amazon sell products addition selling websites sales processed amazon.com end individual sellers processing order fulfillment amazon leases space retailers small sellers used new goods go amazon marketplace offer goods fixed price amazon also employs use drop shippers meta sellers members entities advertise goods amazon order goods direct competing websites usually amazon members meta sellers may millions products listed large transaction numbers grouped alongside less prolific members giving credibility someone business long time markup anywhere 50 100 sometimes sellers maintain items stock opposite true amazon increases dominance marketplace drop shippers become commonplace recent years november 2015 amazon opened physical amazon books store university village seattle store 5,500 square feet prices products match website amazon open tenth physical book store 2017 media speculation suggests amazon plans eventually roll 300 400 bookstores around country amazon plans open brick mortar bookstores germany amazon.com primarily retail site sales revenue model amazon takes small percentage sale price item sold website also allowing companies advertise products paying listed featured products amazon.com ranked 8th fortune 500 rankings largest united states corporations total revenue fiscal year 2018 amazon reported earnings us 10.07 billion annual revenue us 232.887 billion increase 30.9 previous fiscal cycle since 2007 sales increased 14.835 billion 232.887 billion thanks continued business expansion amazon market capitalization valued us 803 billion early november 2018 since founding company attracted criticism controversy actions including supplying law enforcement facial recognition surveillance tools forming cloud computing partnerships cia leading customers away bookshops adversely impacting environment placing low priority warehouse conditions workers actively opposing unionization efforts remotely deleting content purchased amazon kindle users taking public subsidies seeking patent 1-click technology engaging anti-competitive actions price discrimination reclassifying lgbt books adult content criticism also concerned various decisions whether censor publish content wikileaks website works containing libel material facilitating dogfight cockfight pedophile activities december 2011 amazon faced backlash small businesses running one-day deal promote new price check app shoppers used app check prices brick-and-mortar store offered 5 discount purchase item amazon companies like groupon ebay taap.it countered amazon promotion offering 10 products company also faced accusations putting undue pressure suppliers maintain extend profitability one effort squeeze vulnerable book publishers known within company gazelle project bezos suggested according brad stone amazon approach small publishers way cheetah would pursue sickly gazelle july 2014 federal trade commission launched lawsuit company alleging promoting in-app purchases children transacted without parental consent november 2018 community action group opposed construction permit delivered goodman group construction logisitics platform amazon operate lyon–saint-exupéry airport february 2019 filed request behalf second regional community action group asking administrative court decide whether platform served sufficiently important public interest justify environmental impact construction suspended matters decided october 16 2016 apple filed trademark infringement case mobile star llc selling counterfeit apple products amazon suit apple provided evidence amazon selling counterfeit apple products advertising genuine purchasing apple found able identify counterfeit products success rate 90 amazon sourcing selling items without properly determining genuine mobile star llc settled apple undisclosed amount april 27 2017 amazon state sales tax collection policy changed years since collect sales taxes early years u.s. state local sales taxes levied state local governments federal level countries amazon operates sales tax value added tax uniform throughout country amazon obliged collect customers proponents forcing amazon.com collect sales tax—at least states maintains physical presence—argue corporation wields anti-competitive advantage storefront businesses forced collect sales tax. ref name= bloomberg/businessweek /ref many u.s. states 21st century passed online shopping sales tax laws designed compel amazon.com e-commerce retailers collect state local sales taxes customers amazon.com originally collected sales tax five states amazon collects sales taxes customers 45 states state sales tax washington d.c. amazon paid federal income taxes u.s. 2017 2018 actually got tax refunds worth millions dollars despite recording several billion dollars profits year cnn reported amazon tax bill zero took advantage provisions years losing money allowed offset future taxes profits well various tax credits amazon criticized political figures paying federal income taxes early 2018 president donald trump repeatedly criticized amazon use united states postal service prices delivery packages stating right amazon costing united states post office massive amounts money delivery boy trump tweeted amazon pay costs plus bourne sic american taxpayer amazon shares fell 6 percent result trump comments shepard smith fox news disputed trump claims pointed evidence usps offering below-market prices customers advantage amazon however analyst tom forte pointed fact amazon payments usps made public contract reputation sweetheart deal throughout summer 2018 vermont senator bernie sanders criticized amazon wages working conditions series youtube videos media appearances also pointed fact amazon paid federal income tax previous year sanders solicited stories amazon warehouse workers felt exploited company one story james bloodworth described environment akin low-security prison stated company culture used orwellian newspeak reports cited finding new food economy one third fulfilment center workers arizona supplemental nutrition assistance program snap responses amazon included incentives employees tweet positive stories statement called salary figures used sanders inaccurate misleading statement also charged inappropriate refer snap food stamps september 5 2018 sanders along ro khanna introduced stop bad employers zeroing subsidies stop bezos act aimed amazon alleged beneficiaries corporate welfare walmart mcdonald uber among bill supporters tucker carlson fox news matt taibbi criticized journalists covering amazon contribution wealth inequality earlier october 2 amazon announced minimum wage american employees would raised 15 per hour sanders congratulated company making decision former employees current employees media politicians criticized amazon poor working conditions company 2011 publicized workers carry tasks heat breinigsville pennsylvania warehouse result inhumane conditions employees became extremely uncomfortable suffered dehydration collapse loading-bay doors opened allow fresh air concerns theft amazon initial response pay ambulance sit outside call cart away overheated employees company eventually installed air conditioning warehouse workers pickers travel building trolley handheld scanner picking customer orders walk 15 miles workday fall behind targets reprimanded handheld scanners give real-time information employee quickly slowly working scanners also serve allow team leads area managers track specific locations employees much idle time gain working german television report broadcast february 2013 journalists diana löbl peter onneken conducted covert investigation distribution center amazon town bad hersfeld german state hessen report highlights behavior security guards employed third party company apparently either neo-nazi background deliberately dressed neo-nazi apparel intimidating foreign temporary female workers distribution centers third party security company involved delisted amazon business contact shortly report march 2015 reported verge amazon removing non-compete clauses 18 months length us employment contracts hourly-paid workers criticism acting unreasonably preventing employees finding work even short-term temporary workers sign contracts prohibit working company would directly indirectly support good service competes helped support amazon 18 months leaving amazon even fired made redundant 2015 front-page article new york times profiled several former amazon employees together described bruising workplace culture workers illness personal crises pushed unfairly evaluated bezos responded writing sunday memo employees disputed times account shockingly callous management practices said would never tolerated company effort boost employee morale november 2 2015 amazon announced would extending six weeks paid leave new mothers fathers change includes birth parents adoptive parents applied conjunction existing maternity leave medical leave new mothers mid-2018 investigations journalists media outlets guardian reported poor working conditions amazon fulfillment centers later 2018 another article exposed poor working conditions amazon delivery drivers response criticism amazon n't pay workers livable wage jeff bezos announced beginning november 1 2018 us uk amazon employees earn 15 hour minimum wage amazon also lobby make 15 hour federal minimum wage time amazon also eliminated stock awards bonuses hourly employees black friday 2018 amazon warehouse workers several european countries including italy germany spain united kingdom went strike protest inhumane working conditions low pay daily beast reported march 2019 emergency services responded 189 calls 46 amazon warehouses 17 states years 2013 2018 relating suicidal employees workers attributed mental breakdowns employer-imposed social isolation aggressive surveillance hurried dangerous working conditions fulfillment centers one former employee told daily beast isolating colony hell people breakdowns regular occurrence july 15 2019 onset amazon prime day sale event amazon employees working united states germany went strike protest unfair wages poor working conditions 2013 amazon secured contract cia poses potential conflict interest involving bezos-owned washington post newspaper coverage cia kate martin director center national security studies said serious potential conflict interest major newspaper like washington post contractual relationship government secret part government later followed contract department defence may 2018 amazon threatened seattle city council employee head tax proposal would funded houselessness services low-income housing tax would cost amazon 800 per employee 0.7 average salary retaliation amazon paused construction new building threatened limit investment city funded repeal campaign although originally passed measure soon repealed expensive repeal campaign spearheaded amazon incentives given metropolitan council nashville davidson county amazon new operations center excellence nashville yards site owned developer southwest value partners controversial including decision tennessee department economic community development keep full extent agreement secret incentives include 102 million combined grants tax credits scaled-down amazon office building well 65 million cash grant capital expenditures exchange creation 5,000 jobs seven years tennessee coalition open government called transparency another local organization known people alliance transit housing employment pathe suggested public money given amazon instead spent building public housing working poor homeless investing public transportation nashvillians others suggested incentives big corporations n't improve local economy november 2018 proposal give amazon 15 million incentives criticized nashville firefighters union nashville chapter fraternal order police called corporate welfare february 2019 another 15.2 million infrastructure approved council although voted three council members including councilwoman angie henderson dismissed cronyism amazon publicly opposed secret government surveillance revealed freedom information act requests supplied facial recognition support law enforcement form rekognition technology consulting services initial testing included city orlando florida washington county oregon amazon offered connect washington county amazon government customers interested rekognition body camera manufacturer ventures opposed coalition civil rights groups concern could lead expansion surveillance prone abuse specifically could automate identification tracking anyone particularly context potential police body camera integration backlash city orlando publicly stated longer use technology amazon lobbies united states federal government state governments issues enforcement sales taxes online sales transportation safety privacy data protection intellectual property according regulatory filings amazon.com focuses lobbying united states congress federal communications commission federal reserve amazon.com spent roughly 3.5 million 5 million 9.5 million lobbying 2013 2014 2015 respectively amazon.com corporate member american legislative exchange council alec dropped membership following protests shareholders meeting may 24 2012 2014 amazon expanded lobbying practices prepared lobby federal aviation administration approve drone delivery program hiring akin gump strauss hauer feld lobbying firm june amazon lobbyists visited federal aviation administration officials aviation committees washington d.c. explain plans deliver packages | [
1998,
5894,
6788,
6874,
4217,
4575,
5459,
8161,
3773,
291,
3953,
5473,
4133,
7068,
7169,
6179,
7722,
3009,
8083,
1550,
3706,
4783,
6015,
740,
7189,
7838,
136,
4163,
3888,
7102,
7749,
5064,
1585,
6219,
6132,
7482,
6043,
518,
2961,
2700,
... | Test |
6,220 | 4 | Kismet_(software):kismet software kismet network detector packet sniffer intrusion detection system 802.11 wireless lans kismet work wireless card supports raw monitoring mode sniff 802.11a 802.11b 802.11g 802.11n traffic program runs linux freebsd netbsd openbsd mac os x client also run microsoft windows although aside external drones see one supported wireless hardware available packet source distributed gnu general public license kismet free software kismet differs wireless network detectors working passively namely without sending loggable packets able detect presence wireless access points wireless clients associate also widely used date open source wireless monitoring tool kismet also includes basic wireless ids features detecting active wireless sniffing programs including netstumbler well number wireless network attacks kismet features ability log sniffed packets save tcpdump/wireshark airsnort compatible file format kismet also capture per-packet information headers kismet also features ability detect default configured networks probe requests determine level wireless encryption used given access point order find many networks possible kismet supports channel hopping means constantly changes channel channel non-sequentially user-defined sequence default value leaves big holes channels example 1-6-11-2-7-12-3-8-13-4-9-14-5-10 advantage method capture packets adjacent channels overlap kismet also supports logging geographical coordinates network input gps receiver additionally available kismet three separate parts drone used collect packets pass server interpretation server either used conjunction drone interpreting packet data extrapolating wireless information organizing client communicates server displays information server collects updating kismet -ng kismet supports wide variety scanning plugins including dect bluetooth others kismet used number commercial open source projects distributed kali linux used wireless reconnaissance used packages inexpensive wireless intrusion detection system used number peer reviewed studies detecting rogue access points using kismet | [
4759,
4590,
7534,
726,
5571,
5929,
1942,
5046,
578,
37,
588,
848,
1403,
6220,
6574,
3915,
3680,
1708
] | Test |
6,221 | 9 | Cascading_Style_Sheets:cascading style sheets cascading style sheets css style sheet language used describing presentation document written markup language like html css cornerstone technology world wide web alongside html javascript css designed enable separation presentation content including layout colors fonts separation improve content accessibility provide flexibility control specification presentation characteristics enable multiple web pages share formatting specifying relevant css separate .css file reduce complexity repetition structural content separation formatting content also makes feasible present markup page different styles different rendering methods on-screen print voice via speech-based browser screen reader braille-based tactile devices css also rules alternate formatting content accessed mobile device name cascading comes specified priority scheme determine style rule applies one rule matches particular element cascading priority scheme predictable css specifications maintained world wide web consortium w3c internet media type mime type codice_1 registered use css rfc 2318 march 1998 w3c operates free css validation service css documents addition html markup languages support use css including xhtml plain xml svg xul css simple syntax uses number english keywords specify names various style properties style sheet consists list rules rule rule-set consists one selectors declaration block css selectors declare part markup style applies matching tags attributes markup selectors may apply following classes ids case-sensitive start letters include alphanumeric characters hyphens underscores class may apply number instances elements id may applied single element pseudo-classes used css selectors permit formatting based information contained document tree one example widely used pseudo-class identifies content user points visible element usually holding mouse cursor appended selector pseudo-class classifies document elements whereas pseudo-element makes selection may consist partial elements selectors may combined many ways achieve great specificity flexibility multiple selectors may joined spaced list specify elements location element type id class combination thereof order selectors important example applies elements class myclass inside div elements whereas applies div elements elements class myclass following table provides summary selector syntax indicating usage version css introduced declaration block consists list declarations braces declaration consists property colon codice_2 value multiple declarations block semi-colon codice_3 must inserted separate declaration properties specified css standard property set possible values properties affect type element others apply particular groups elements values may keywords center inherit numerical values 200 pixels 50 percent viewport width 80 percent parent element width color values specified keywords e.g hexadecimal values e.g also abbreviated rgb values 0 255 scale e.g codice_4 rgba values specify color alpha transparency e.g hsl hsla values e.g non-zero numeric values representing linear measures must include length unit either alphabetic code abbreviation codice_5 codice_6 percentage sign codice_7 units – codice_8 centimetre codice_9 inch codice_10 millimetre codice_11 pica codice_12 point – absolute means rendered dimension depend upon structure page others – codice_13 em codice_14 ex codice_15 pixel – relative means factors font size parent element affect rendered measurement eight units feature css 1 retained subsequent revisions proposed css values units module level 3 adopted w3c recommendation provide seven length units codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 css nearly presentational attributes html documents contained within html markup font colors background styles element alignments borders sizes explicitly described often repeatedly within html css lets authors move much information another file style sheet resulting considerably simpler html example headings codice_23 elements sub-headings codice_24 sub-sub-headings codice_25 etc. defined structurally using html print screen choice font size color emphasis elements presentational css document authors wanted assign typographic characteristics say codice_24 headings repeat html presentational markup occurrence heading type made documents complex larger error-prone difficult maintain css allows separation presentation structure css define color font text alignment size borders spacing layout many typographic characteristics independently on-screen printed views css also defines non-visual styles reading speed emphasis aural text readers w3c deprecated use presentational html markup example pre-css html heading element defined red text would written using css element coded using style properties instead html presentational attributes advantages may immediately clear since second form actually verbose power css becomes apparent style properties placed internal style element even better external css file example suppose document contains style element codice_23 elements document automatically become red without requiring explicit code author later wanted make codice_23 elements blue instead could done changing style element rather laboriously going document changing color individual codice_23 element styles also placed external css file described loaded using syntax similar decouples styling html document makes possible restyle multiple documents simply editing shared external css file css information provided various sources sources web browser user author information author classified inline media type importance selector specificity rule order inheritance property definition css style information separate document embedded html document multiple style sheets imported different styles applied depending output device used example screen version quite different printed version authors tailor presentation appropriately medium style sheet highest priority controls content display declarations set highest priority source passed source lower priority user agent style process called cascading one goals css allow users greater control presentation someone finds red italic headings difficult read may apply different style sheet depending browser web site user may choose various style sheets provided designers may remove added styles view site using browser default styling may override red italic heading style without altering attributes specificity refers relative weights various rules determines styles apply element one rule could apply based specification simple selector e.g h1 specificity 1 class selectors specificity 1,0 id selectors specificity 1,0,0 specificity values carry decimal system commas used separate digits css rule 11 elements 11 classes would specificity 11,11 121 thus following rules selectors result indicated specificity consider html fragment example declaration codice_30 attribute overrides one codice_31 element higher specificity thus paragraph appears green inheritance key feature css relies ancestor-descendant relationship operate inheritance mechanism properties applied specified element also descendants inheritance relies document tree hierarchy xhtml elements page based nesting descendant elements may inherit css property values ancestor element enclosing general descendant elements inherit text-related properties box-related properties inherited properties inherited color font letter-spacing line-height list-style text-align text-indent text-transform visibility white-space word-spacing properties inherited background border display float clear height width margin min- max-height -width outline overflow padding position text-decoration vertical-align z-index inheritance used avoid declaring certain properties style sheet allowing shorter css inheritance css inheritance class-based programming languages possible define class b like class modifications css possible style element class modifications however possible define css class b like could used style multiple elements without repeat modifications given following style sheet suppose h1 element emphasizing element em inside color assigned em element emphasized word illustrate inherits color parent element h1 style sheet h1 color pink hence em element likewise pink whitespace properties selectors ignored code snippet functionally equivalent one one common way format css readability indent property give line addition formatting css readability shorthand properties used write code faster also gets processed quickly rendered css 2.1 defines three positioning schemes four possible values position property item positioned way static properties top bottom left right used specify offsets positions codice_32 property may one three values absolutely positioned fixed items floated elements normally flow around floated items unless prevented codice_33 property css first proposed håkon wium lie october 10 1994 time lie working tim berners-lee cern several style sheet languages web proposed around time discussions public mailing lists inside world wide web consortium resulted first w3c css recommendation css1 released 1996 particular proposal bert bos influential became co-author css1 regarded co-creator css style sheets existed one form another since beginnings standard generalized markup language sgml 1980s css developed provide style sheets web one requirement web style sheet language style sheets come different sources web therefore existing style sheet languages like dsssl fosi suitable css hand let document style influenced multiple style sheets way cascading styles html grew came encompass wider variety stylistic capabilities meet demands web developers evolution gave designer control site appearance cost complex html variations web browser implementations violawww worldwideweb made consistent site appearance difficult users less control web content displayed browser/editor developed tim berners-lee style sheets hard-coded program style sheets could therefore linked documents web robert cailliau also cern wanted separate structure presentation different style sheets could describe different presentation printing screen-based presentations editors improving web presentation capabilities topic interest many web community nine different style sheet languages proposed www-style mailing list nine proposals two especially influential became css cascading html style sheets stream-based style sheet proposal ssp two browsers served testbeds initial proposals lie worked yves lafon implement css dave raggett arena browser bert bos implemented ssp proposal argo browser thereafter lie bos worked together develop css standard h removed name style sheets could also applied markup languages besides html lie proposal presented mosaic web conference later called www2 chicago illinois 1994 bert bos 1995 around time w3c already established took interest development css organized workshop toward end chaired steven pemberton resulted w3c adding work css deliverables html editorial review board erb lie bos primary technical staff aspect project additional members including thomas reardon microsoft participating well august 1996 netscape communication corporation presented alternative style sheet language called javascript style sheets jsss spec never finished deprecated end 1996 css ready become official css level 1 recommendation published december development html css dom taking place one group html editorial review board erb early 1997 erb split three working groups html working group chaired dan connolly w3c dom working group chaired lauren wood softquad css working group chaired chris lilley w3c css working group began tackling issues addressed css level 1 resulting creation css level 2 november 4 1997 published w3c recommendation may 12 1998 css level 3 started 1998 still development 2014 2005 css working groups decided enforce requirements standards strictly meant already published standards like css 2.1 css 3 selectors css 3 text pulled back candidate recommendation working draft level css 1 specification completed 1996 microsoft internet explorer 3 released year featuring limited support css ie 4 netscape 4.x added support typically incomplete many bugs prevented css usefully adopted three years web browser achieved near-full implementation specification internet explorer 5.0 macintosh shipped march 2000 first browser full better 99 percent css 1 support surpassing opera leader since introduction css support fifteen months earlier browsers followed soon afterwards many additionally implemented parts css 2 however even later 'version 5 web browsers began offer fairly full implementation css still incorrect certain areas fraught inconsistencies bugs quirks microsoft internet explorer 5.x windows opposed different ie macintosh flawed implementation 'css box model compared css standards inconsistencies variation feature support made difficult designers achieve consistent appearance across browsers platforms without use workarounds termed css hacks filters ie/windows box model bugs serious internet explorer 6 released microsoft introduced backwards-compatible mode css interpretation 'quirks mode alongside alternative corrected 'standards mode non-microsoft browsers also provided 'mode'-switch behavior capability therefore became necessary authors html files ensure contained special distinctive 'standards-compliant css intended marker show authors intended css interpreted correctly compliance standards opposed intended long-obsolete ie5/windows browser without marker web browsers 'quirks mode'-switching capability size objects web pages ie5/windows would rather following css standards problems patchy adoption css along errata original specification led w3c revise css 2 standard css 2.1 moved nearer working snapshot current css support html browsers css 2 properties browser successfully implemented dropped cases defined behaviors changed bring standard line predominant existing implementations css 2.1 became candidate recommendation february 25 2004 css 2.1 pulled back working draft status june 13 2005 returned candidate recommendation status july 19 2007 addition problems codice_34 extension used software product used convert powerpoint files compact slide show files web servers served codice_34 mime type codice_36 rather codice_1 css various levels profiles level css builds upon last typically adding new features typically denoted css 1 css 2 css 3 css 4 profiles typically subset one levels css built particular device user interface currently profiles mobile devices printers television sets profiles confused media types added css 2 first css specification become official w3c recommendation css level 1 published december 17 1996 håkon wium lie bert bos credited original developers among capabilities support w3c longer maintains css 1 recommendation css level 2 specification developed w3c published recommendation may 1998 superset css 1 css 2 includes number new capabilities like absolute relative fixed positioning elements z-index concept media types support aural style sheets later replaced css 3 speech modules bidirectional text new font properties shadows w3c longer maintains css 2 recommendation css level 2 revision 1 often referred css 2.1 fixes errors css 2 removes poorly supported fully interoperable features adds already implemented browser extensions specification comply w3c process standardizing technical specifications css 2.1 went back forth working draft status candidate recommendation status many years css 2.1 first became candidate recommendation february 25 2004 reverted working draft june 13 2005 review returned candidate recommendation 19 july 2007 updated twice 2009 however changes clarifications made went back last call working draft 7 december 2010 css 2.1 went proposed recommendation 12 april 2011 reviewed w3c advisory committee finally published w3c recommendation 7 june 2011 css 2.1 planned first final revision level 2—but low priority work css 2.2 began 2015 unlike css 2 large single specification defining various features css 3 divided several separate documents called modules module adds new capabilities extends features defined css 2 preserving backward compatibility work css level 3 started around time publication original css 2 recommendation earliest css 3 drafts published june 1999 due modularization different modules different stability statuses modules candidate recommendation cr status considered moderately stable cr stage implementations advised drop vendor prefixes single integrated css4 specification split separate level 4 modules css3 split css language definition modules modules allowed level independently modules level 3—they build things css 2.1 level-4 modules exist image values backgrounds borders selectors build functionality preceding level-3 module modules defining entirely new functionality flexbox designated level 1 css working group sometimes publishes snapshots collection whole modules parts drafts considered stable interoperably implemented hence ready use far five best current practices documents published notes 2007 2010 2015 2017 2018 web browser uses layout engine render web pages support css functionality consistent browsers parse css perfectly multiple coding techniques developed target specific browsers workarounds commonly known css hacks css filters adoption new functionality css hindered lack support major browsers example internet explorer slow add support many css 3 features slowed adoption features damaged browser reputation among developers order ensure consistent experience users web developers often test sites across multiple operating systems browsers browser versions increasing development time complexity tools browserstack built reduce complexity maintaining environments addition testing tools many sites maintain lists browser support specific css properties including caniuse mozilla developer network additionally css 3 defines feature queries provide codice_38 directive allow developers target browsers support certain functionality directly within css css supported older browsers also sometimes patched using javascript polyfills pieces javascript code designed make browsers behave consistently workarounds—and need support fallback functionality—can add complexity development projects consequently companies frequently define list browser versions support websites adopt newer code standards incompatible older browsers browsers cut accessing many resources web sometimes intentionally many popular sites internet visually degraded older browsers due poor css support work large part due evolution javascript web technologies noted limitations current capabilities css include additionally several issues present prior versions css standard alleviated css frameworks pre-prepared libraries meant allow easier standards-compliant styling web pages using cascading style sheets language css frameworks include foundation blueprint bootstrap cascade framework materialize like programming scripting language libraries css frameworks usually incorporated external .css sheets referenced html provide number ready-made options designing laying web page although many frameworks published authors use mostly rapid prototyping learning prefer 'handcraft css appropriate published site without design maintenance download overhead many unused features site styling size css resources used project increases development team often needs decide common design methodology keep organized goals ease development ease collaboration development performance deployed stylesheets browser popular methodologies include oocss object oriented css acss atomic css ocss organic cascade style sheet smacss scalable modular architecture css bem block element modifier | [
4655,
6788,
4296,
6425,
6802,
5378,
7537,
2564,
6809,
393,
2211,
1847,
3291,
2574,
6818,
2577,
6452,
40,
4352,
1496,
4725,
1136,
6858,
2973,
84,
4743,
87,
445,
1152,
1525,
4755,
7975,
7628,
5821,
3363,
1177,
5127,
6540,
831,
3383,
6551,... | Test |
6,222 | 3 | Robowarrior:robowarrior robowarrior known japan english language action/puzzle video game developed hudson soft co-developed aicom making first nes game worked published jaleco nintendo entertainment system msx robowarrior takes place alien planet called altile created scientists solution overpopulation problem earth peaceful period altitle robowarriors decommissioned earth xantho empire invades altitle try transform personal gain player operates cyborg named zed z-type earth defence game zed raids altile fight xantho empire destroy leader xur zed deploys bombs clear path rocks walls forests killing enemies collecting items gameplay elements resemble bomberman 1983 robowarrior comprises five level formats 27 levels game one player must obtain key time limit expires another key unavailable player acquires crystal chalice levels cast darkness rendering obstructions invisible unless player lit lamp still levels mazes player must find blast-through weak points walls proceed periodically player engages boss level multiple bombs required bomb certain unconventional areas robowarrior also features water stages enemies respawn stage allowing player stock bombs zed controlled via overhead viewpoint player move four directions like hudson soft games hudson bee game lot stage work robowarrior features 4 11 horizontal hudson bees 1991 sunsoft published sequel bomber king game boy titled bomber king scenario 2 | [
6979
] | Test |
6,223 | 9 | Curry–Howard_correspondence:curry–howard correspondence programming language theory proof theory curry–howard correspondence also known curry–howard isomorphism equivalence proofs-as-programs propositions- formulae-as-types interpretation direct relationship computer programs mathematical proofs generalization syntactic analogy systems formal logic computational calculi first discovered american mathematician haskell curry logician william alvin howard link logic computation usually attributed curry howard although idea related operational interpretation intuitionistic logic given various formulations l. e. j. brouwer arend heyting andrey kolmogorov see brouwer–heyting–kolmogorov interpretation stephen kleene see realizability relationship extended include category theory three-way curry–howard–lambek correspondence beginnings curry–howard correspondence lie several observations words curry–howard correspondence observation two families seemingly unrelated formalisms—namely proof systems one hand models computation other—are fact kind mathematical objects one abstracts peculiarities either formalism following generalization arises proof program formula proves type program informally seen analogy states return type function i.e. type values returned function analogous logical theorem subject hypotheses corresponding types argument values passed function program compute function analogous proof theorem sets form logic programming rigorous foundation proofs represented programs especially lambda terms proofs run correspondence starting point large spectrum new research discovery leading particular new class formal systems designed act proof system typed functional programming language includes martin-löf intuitionistic type theory coquand calculus constructions two calculi proofs regular objects discourse one state properties proofs way program field research usually referred modern type theory typed lambda calculi derived curry–howard paradigm led software like coq proofs seen programs formalized checked run converse direction use program extract proof given correctness—an area research closely related proof-carrying code feasible programming language program written richly typed development type systems partly motivated wish make curry–howard correspondence practically relevant curry–howard correspondence also raised new questions regarding computational content proof concepts covered original works curry howard particular classical logic shown correspond ability manipulate continuation programs symmetry sequent calculus express duality two evaluation strategies known call-by-name call-by-value speculatively curry–howard correspondence might expected lead substantial unification mathematical logic foundational computer science hilbert-style logic natural deduction two kinds proof systems among large family formalisms alternative syntaxes include sequent calculus proof nets calculus structures etc one admits curry–howard correspondence general principle proof system hides model computation theory underlying untyped computational structure kinds proof system possible natural question whether something mathematically interesting said underlying computational calculi conversely combinatory logic simply typed lambda calculus models computation either girard linear logic developed fine analysis use resources models lambda calculus typed version turing machine would behave proof system typed assembly languages instance low-level models computation carry types possibility writing non-terminating programs turing-complete models computation languages arbitrary recursive functions must interpreted care naive application correspondence leads inconsistent logic best way dealing arbitrary computation logical point view still actively debated research question one popular approach based using monads segregate provably terminating potentially non-terminating code approach also generalizes much richer models computation related modal logic natural extension curry–howard isomorphism radical approach advocated total functional programming eliminate unrestricted recursion forgo turing completeness although still retaining high computational complexity using controlled corecursion wherever non-terminating behavior actually desired general formulation curry–howard correspondence correspondence formal proof calculi type systems models computation particular splits two correspondences one level formulas types independent particular proof system model computation considered one level proofs programs time specific particular choice proof system model computation considered level formulas types correspondence says implication behaves function type conjunction product type may called tuple struct list term depending language disjunction sum type type may called union false formula empty type true formula singleton type whose sole member null object quantifiers correspond dependent function space products appropriate summarized following table level proof systems models computations correspondence mainly shows identity structure first particular formulations systems known hilbert-style deduction system combinatory logic secondly particular formulations systems known natural deduction lambda calculus natural deduction system lambda calculus following correspondences beginning simple remark curry feys 1958 book combinatory logic simplest types basic combinators k combinatory logic surprisingly corresponded respective axiom schemes α → β → α α → β → γ → α → β → α → γ used hilbert-style deduction systems reason schemes often called axioms k s. examples programs seen proofs hilbert-style logic given one restricts implicational intuitionistic fragment simple way formalize logic hilbert style follows let γ finite collection formulas considered hypotheses δ derivable γ denoted γ ⊢ δ following cases formalized using inference rules left column following table typed combinatory logic formulated using similar syntax let γ finite collection variables annotated types term also annotated type depend variables γ ⊢ δ generation rules defined given right-column curry remark simply states columns one-to-one correspondence restriction correspondence intuitionistic logic means classical tautologies peirce law α → β → α → α excluded correspondence seen abstract level correspondence restated shown following table especially deduction theorem specific hilbert-style logic matches process abstraction elimination combinatory logic thanks correspondence results combinatory logic transferred hilbert-style logic vice versa instance notion reduction terms combinatory logic transferred hilbert-style logic provides way canonically transform proofs proofs statement one also transfer notion normal terms notion normal proofs expressing hypotheses axioms never need detached since otherwise simplification happen conversely non provability intuitionistic logic peirce law transferred back combinatory logic typed term combinatory logic typable type results completeness sets combinators axioms also transferred instance fact combinator x constitutes one-point basis extensional combinatory logic implies single axiom scheme principal type x adequate replacement combination axiom schemes curry emphasized syntactic correspondence hilbert-style deduction combinatory logic howard made explicit 1969 syntactic analogy programs simply typed lambda calculus proofs natural deduction left-hand side formalizes intuitionistic implicational natural deduction calculus sequents use sequents standard discussions curry–howard isomorphism allows deduction rules stated cleanly implicit weakening right-hand side shows typing rules lambda calculus left-hand side γ γ γ denote ordered sequences formulas right-hand side denote sequences named i.e. typed formulas names different paraphrase correspondence proving γ ⊢ α means program given values types listed γ manufactures object type α axiom corresponds introduction new variable new unconstrained type rule corresponds function abstraction rule corresponds function application observe correspondence exact context γ taken set formulas e.g. λ -terms λx λy x λx λy type would distinguished correspondence examples given howard showed correspondence extends connectives logic constructions simply typed lambda calculus seen abstract level correspondence summarized shown following table especially also shows notion normal forms lambda calculus matches prawitz notion normal deduction natural deduction follows algorithms type inhabitation problem turned algorithms deciding intuitionistic provability howard correspondence naturally extends extensions natural deduction simply typed lambda calculus non-exhaustive list time curry also time howard proofs-as-programs correspondence concerned intuitionistic logic i.e logic particular peirce law deducible extension correspondence peirce law hence classical logic became clear work griffin typing operators capture evaluation context given program execution evaluation context later reinstalled basic curry–howard-style correspondence classical logic given note correspondence double-negation translation used map classical proofs intuitionistic logic continuation-passing-style translation used map lambda terms involving control pure lambda terms particularly call-by-name continuation-passing-style translations relates kolmogorov double negation translation call-by-value continuation-passing-style translations relates kind double-negation translation due kuroda finer curry–howard correspondence exists classical logic one defines classical logic adding axiom peirce law allowing several conclusions sequents case classical natural deduction exists proofs-as-programs correspondence typed programs parigot λμ-calculus proofs-as-programs correspondence settled formalism known gentzen sequent calculus correspondence well-defined pre-existing model computation hilbert-style natural deductions sequent calculus characterized presence left introduction rules right introduction rule cut rule eliminated structure sequent calculus relates calculus whose structure close one abstract machines informal correspondence follows n. g. de bruijn used lambda notation representing proofs theorem checker automath represented propositions categories proofs late 1960s period time howard wrote manuscript de bruijn likely unaware howard work stated correspondence independently sørensen urzyczyn 1998 2006 pp 98–99 researchers tend use term curry–howard–de bruijn correspondence place curry–howard correspondence bhk interpretation interprets intuitionistic proofs functions specify class functions relevant interpretation one takes lambda calculus class function bhk interpretation tells howard correspondence natural deduction lambda calculus kleene recursive realizability splits proofs intuitionistic arithmetic pair recursive function proof formula expressing recursive function realizes i.e correctly instantiates disjunctions existential quantifiers initial formula formula gets true kreisel modified realizability applies intuitionistic higher-order predicate logic shows simply typed lambda term inductively extracted proof realizes initial formula case propositional logic coincides howard statement extracted lambda term proof seen untyped lambda term realizability statement paraphrase fact extracted lambda term type formula means seen type gödel dialectica interpretation realizes extension intuitionistic arithmetic computable functions connection lambda calculus unclear even case natural deduction joachim lambek showed early 1970s proofs intuitionistic propositional logic combinators typed combinatory logic share common equational theory one cartesian closed categories expression curry–howard–lambek correspondence used people refer three way isomorphism intuitionistic logic typed lambda calculus cartesian closed categories objects interpreted types propositions morphisms terms proofs correspondence works equational level expression syntactic identity structures case curry howard correspondences i.e structure well-defined morphism cartesian-closed category comparable structure proof corresponding judgment either hilbert-style logic natural deduction clarify distinction underlying syntactic structure cartesian closed categories rephrased objects types defined morphisms terms defined well-defined morphisms typed terms defined following typing rules usual categorical morphism notation formula_13 replaced sequent calculus notation formula_14 identity composition unit type terminal object cartesian product left right projection currying application finally equations category equations imply following formula_34-laws exists formula_37 iff formula_38 provable implicational intuitionistic logic thanks curry–howard correspondence typed expression whose type corresponds logical formula analogous proof formula examples example consider proof theorem lambda calculus type identity function λ x x combinatory logic identity function obtained applying λ fgx fx gx twice k λ xy x k k description proof says following steps used prove general procedure whenever program contains application form p q steps followed complicated example let look theorem corresponds b function type b β → α → γ → β → γ → α b equivalent k k roadmap proof theorem β → α → γ → β → γ → α first step construct k make antecedent k axiom look like axiom set α equal equal avoid variable collisions since antecedent consequent detached using modus ponens theorem corresponds type k apply expression taking follows put yielding detach consequent formula type k special case theorem last formula must applied k. specialize k time replacing antecedent prior formula detaching consequent switching names variables gives us remained prove diagram gives proof natural deduction shows interpreted λ -expression λ λ b λ g b g type recently isomorphism proposed way define search space partition genetic programming method indexes sets genotypes program trees evolved gp system curry–howard isomorphic proof referred species correspondences listed go much farther deeper example cartesian closed categories generalized closed monoidal categories internal language categories linear type system corresponding linear logic generalizes simply-typed lambda calculus internal language cartesian closed categories moreover shown correspond cobordisms play vital role string theory extended set equivalences also explored homotopy type theory became active area research around 2013 still type theory extended univalence axiom equivalence equivalent equality permits homotopy type theory used foundation mathematics including set theory classical logic providing new ways discuss axiom choice many things curry–howard correspondence proofs elements inhabited types generalized notion homotopic equivalence proofs paths space identity type equality type type theory interpreted path | [
7005,
7071,
3149,
6313,
7658,
7,
4322,
3895,
703,
4359
] | Validation |
6,224 | 7 | Messaging_pattern:messaging pattern software architecture messaging pattern network-oriented architectural pattern describes two different parts message passing system connect communicate telecommunications message exchange pattern mep describes pattern messages required communications protocol establish use communication channel two major message exchange patterns — request–response pattern one-way pattern example http request–response pattern protocol udp one-way pattern term message exchange pattern specific meaning within simple object access protocol soap soap mep types include ømq message queueing library provides so-called sockets kind generalization traditional ip unix sockets require indicating messaging pattern used optimized pattern basic ømq patterns pattern defines particular network topology request-reply defines so-called service bus publish-subscribe defines data distribution tree push-pull defines parallelised pipeline patterns deliberately designed way infinitely scalable thus usable internet scale | [
3531,
5014,
6415,
231,
1554,
235,
2827,
7315,
1407,
1224,
3383
] | Test |
6,225 | 4 | Billion_laughs_attack:billion laughs attack computer security billion laughs attack type denial-of-service dos attack aimed parsers xml documents also referred xml bomb exponential entity expansion attack example attack consists defining 10 entities defined consisting 10 previous entity document consisting single instance largest entity expands one billion copies first entity frequently cited example first entity string lol hence name billion laughs amount computer memory used would likely exceed available process parsing xml certainly would time vulnerability first reported original form attack aimed specifically xml parsers term may applicable similar subjects well problem first reported early 2002 began widely addressed 2008 defenses kind attack include capping memory allocated individual parser loss document acceptable treating entities symbolically expanding lazily extent content used xml version= 1.0 doctype lolz lolz lol9 /lolz xml parser loads document sees includes one root element lolz contains text lol9 however lol9 defined entity expands string containing ten lol8 strings lol8 string defined entity expands ten lol7 strings entity expansions processed small 1 kb block xml actually contain 10 billion lol taking almost 3 gigabytes memory billion laughs attack described takes exponential amount space quadratic blowup variation causes quadratic growth storage requirements simply repeating large entity avoid countermeasures detect heavily nested entities see computational complexity theory comparisons different growth classes billion laughs attack exist file format contain references example yaml bomb lol lol lol lol lol lol lol lol lol b b *a *a *a *a *a *a *a *a *a c c *b *b *b *b *b *b *b *b *b *c *c *c *c *c *c *c *c *c e e *d *d *d *d *d *d *d *d *d f f *e *e *e *e *e *e *e *e *e g g *f *f *f *f *f *f *f *f *f h h *g *g *g *g *g *g *g *g *g *h *h *h *h *h *h *h *h *h reason file formats allow references often preferred data arriving untrusted sources | [
1019,
1956,
1691,
4665,
4958,
598,
1805
] | Test |
6,226 | 3 | List_of_PowerPC_processors:list powerpc processors following list powerpc processors 32-bit 64-bit powerpc processors favorite embedded computer designers keep costs low high-volume competitive products cpu core usually bundled system-on-chip soc integrated circuit socs contain processor core cache processor local data on-chip along clocking timers memory sdram peripheral network serial i/o bus pci pci-x rom/flash bus i2c controllers ibm also offers open bus architecture called coreconnect facilitate connection processor core memory peripherals soc design ibm motorola competed along parallel development lines overlapping markets later development book e powerpc specification implemented ibm freescale semiconductor defines embedded extensions powerpc programming model northbridge host bridge powerpc cpu integrated circuit ic interfacing powerpc cpu memory southbridge ic northbridge also provide interface accelerated graphics ports agp bus peripheral component interconnect pci pci-x pci express hypertransport bus specific northbridge ic must used powerpc cpu impossible use northbridge intel amd x86 cpu powerpc cpu however possible use certain types x86 southbridge powerpc based motherboards example via 686b amd geode cs5536 list northbridge powerpc | [
7327,
2719,
3348,
3936,
1075,
2458,
3439,
1083,
4408,
2744,
7361,
2845,
3708,
5042,
7905,
5665,
4702,
1199,
1386,
1388,
2501,
239,
6474,
4815,
1131,
2257,
3674,
5622
] | Validation |
6,227 | 4 | CA_Anti-Spyware:ca anti-spyware ca anti-spyware spyware detection program distributed ca inc. 2007 known pestpatrol product offered total defense inc. named total defense anti-virus pestpatrol inc. carlisle pa based software company founded dr. david stang robert bales developed pestpatrol released first version 2000 originally called safersite company changed name 2002 better reflect focus company pestpatrol anti-malware product designed protect computer system threats adware spyware viruses performed automated scans system hard disks windows registry crucial system areas enabled manual scans specific threats selected long list known malicious software among unique features cookiepatrol purges spyware cookies keypatrol detects keyloggers unlike anti-spyware programs designed home use single desktop pestpatrol also provided solution network environments found enterprises among features made appealing enterprise security administrators ability manage networked desktops remotely early versions product criticized poor user interface described alternatively something looks like application ported os/2 unclear buttons clunky text-based ui reviewers praised malware detection removal capabilities stating pestpatrol effective anti-spyware system short switch linux 've ever used described infoworld one established brands anti-spyware 2002 selected security product year network world cited ability detect remove 60,000 types malware defenses remote administration tools rats billing authority spyware protection licensed signature files use yahoo companion others 2003 along anti-spyware anti-malware companies webroot lavasoft aluria formed industry consortium fight malware called consortium antispyware technology coast computer associates ca technologies bought pestpatrol 2004 made part etrust computer security line includes virus scanner firewall using newly acquired technology ca created bundle named ca integrated threat management itm consisted anti-virus solution pestpatrol anti-spyware renamed ca anti-spyware 2007 program bought separately part ca internet security 2007 ca anti-spyware team instrumental exposing fact facebook collecting personal information users without knowledge even users opted facebook ill-fated beacon program even users logged facebook | [
4759,
4456,
5571,
6777,
578,
6092
] | Validation |
6,228 | 7 | Cloud_communications:cloud communications cloud communications internet-based voice data communications telecommunications applications switching storage hosted third-party outside organization using accessed public internet cloud services broad term referring primarily data-center-hosted services run accessed internet infrastructure recently services data-centric evolution voip voice internet protocol voice become part cloud phenomenon cloud telephony also known hosted telephony refers specifically voice services specifically replacement conventional business telephone equipment private branch exchange pbx third-party voip service cloud communications providers deliver voice data communications applications services hosting servers providers maintain giving customers access “ cloud. ” pay services applications use customers cost-effective reliable secure communications environment without headaches associated conventional pbx system deployment companies cut costs cloud communications services without sacrificing features success google others cloud-based providers demonstrated cloud-based platform effective software-based platform much lower cost voice services delivered cloud increases value hosted telephony users equally well turn cloud-based offering instead relying facilities-based service provider hosted voip expands options beyond local regional carriers past businesses able services telecommunication cloud communications attractive cloud become platform voice data video hosted services built around voice usually referred hosted voip cloud communications environment serves platform upon modes seamlessly work well integrate three trends enterprise communications pushing users access cloud allowing device choose development traditional communications infrastructure designed handle first trend increasingly distributed company operations branches home offices making wide area networks cumbersome inefficient costly second communications devices need access enterprise networks – iphones printers voip handsets example third data centers housing enterprise assets applications consolidating often located managed remotely cloud telephony services predominantly used business processes advertising e-commerce human resources payments processing services include distributed call centers economical teleworking scale services features functionality expected evolve even coming years embrace mobilisation facilitate direct collaboration streamline communications small medium-sized business capital investment set voip infrastructure in-house could high compared potential return cloud telephony could offer services lower-cost subscription basis cloud telephony provider also expert technology whereas small business unlikely employee level expertise justify expense full-time telecommunication infrastructure position traditional telephony applications required on-premises maintenance pbx great deal wiring main distribution frame mdf cloud communications promoted help businesses collaboration scalability supporting access via multiple locations devices cloud technology still must exist physical servers physical location servers important many nation laws cloud telephony companies provide hosted off-site software versions services previously constructed on-site hardware also allow users geographically distributed since voice traffic moves internet examples include | [
2961,
6788,
1664,
5793
] | Test |
6,229 | 4 | Jim_Geovedi:jim geovedi jim geovedi born 28 june 1979 security expert indonesia focuses discovery computer network security vulnerabilities bbc news described guy n't look like bond villain ... possesses secrets might kill geovedi co-founded ran several security consulting companies 2001 co-founded c2pro consulting providing general consulting mostly government agencies 2004 co-founded bellua asia pacific renamed xynexis international later 2010 noosc global managed security services company part hackers group began 1996 called w00w00 met future co-founder bellua anthony zboralski currently based london interviewed issues including satellite security system banking security law enforcement geovedi also professional dj music producer currently signed elektrax recordings sydney-based techno label geovedi born bandarlampung lampung indonesia graduating high school 1998-1999 found living street without steady work later managed teach computer security programming despite lacking formal education field media often use example people become successful industry relying empirical knowledge acumen even without holding university degrees arsenal fan also fan death metal grindcore music interview beritagar 2013 geovedi revealed fan napalm death brutal truth cannibal corpse deicide | [
651,
1748,
1805
] | Test |
6,230 | 1 | FloraNT:florant florant public access web-based database flora northern territory provides authoritative scientific information 4300 native taxa including descriptions maps images conservation status nomenclatural details together names used various aboriginal groups alien taxa 470 species also recorded users access fact sheets species details specimens held northern territory herbarium herbaria codes nt dna together keys regional factsheets distribution guides florant uses ibra version 5.1 botanical regions conservation act nt flora fauna territory parks wildlife conservation act 1976 twpca uses iucn criteria categories | [] | Test |
6,231 | 6 | Cramfs:cramfs compressed rom file system cramfs free gpl'ed read-only linux file system designed simplicity space-efficiency mainly used embedded small-footprint systems unlike compressed image conventional file system cramfs image used i.e without first decompressing reason linux distributions use cramfs initrd images debian 3.1 particular installation images suse linux particular constraints memory image size 2013 linux maintainers indicated cramfs made obsolete squashfs file system got rehabilitated 2017 use low-memory devices using squashfs may viable files cramfs file systems zlib-compressed one page time allow random read access metadata compressed expressed terse representation space-efficient conventional file systems file system intentionally read-only simplify design random write access compressed files difficult implement cramfs ships utility codice_1 pack files new cramfs images file sizes limited less 16mb maximum file system size little 272mb last file file system must begin 256mb block extend past | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2680,
2683,
5859,
7667,
5865,
4444,
5518,
869,
2704,
1605,
174,
2710,
1624,
59... | Test |
6,232 | 2 | Android_application_package:android application package android package apk package file format used android operating system distribution installation mobile apps middleware apk analogous software packages appx microsoft windows debian package debian-based operating systems make apk file program android first compiled parts packaged one container file apk file contains program code .dex files resources assets certificates manifest file case many file formats apk files name needed provided file name ends file extension .apk apk files used downgrade apps older file version i.e downgrade app version 78.9 55.1 uninstalling upgraded app installing older version via unknown sources setting settings see information done various reasons upgrade causing app repeatedly freeze and/or crash upgrade changing app drastically e.g background dark bright preferred features present changed hidden restoring/removing something upgrade removed installed apk file also solution installing apps/games limited restricted countries apk files type archive file specifically zip format-type packages based jar file format codice_1 filename extension mime type associated apk files codice_2 apk files installed android-powered devices like installing software pc user downloads android application using android device official source google play store automatically installed apk files also downloaded google play store without installation using non-android device either chrome firefox extension directly unofficial sites several android apps used process moving apk files different devices known also called apk sideloading apps include android file manager apps app orientation apps ... installation apk files outside google play disabled default users install unknown apk files enabling unknown sources accounts security settings user developer also install apk file directly device via download network desktop computer using communication program adb apk file archive usually contains following files directories | [
3933,
5372,
6427,
1095,
1471,
740,
7555,
5055,
4340,
42,
2589,
3310,
7201,
2591,
5771,
5775,
65,
7584,
7956,
4759,
5473,
474,
6183,
822,
136,
6209,
510,
6937,
169,
4116,
5195,
2003,
195,
2732,
6978,
7346,
561,
201,
2017,
5919,
7357,
2... | Validation |
6,233 | 8 | AWStats:awstats awstats open source web analytics reporting tool suitable analyzing data internet services web streaming media mail ftp servers awstats parses analyzes server log files producing html reports data visually presented within reports tables bar graphs static reports created command line interface on-demand reporting supported web browser cgi program awstats supports major web server log file formats including apache ncsa combined/xlf/elf log format common log format clf webstar iis w3c log format many common web server log formats development moved sourceforge github 2014 written perl awstats deployed almost operating system server administration tool packages available linux distributions awstats installed workstation microsoft windows local use situations log files downloaded remote server awstats licensed gnu general public license gpl proper web log analysis tool configuration report interpretation requires bit technical business knowledge awstats support resources include documentation user community forums on-demand cgi program object security exploits case many cgi programs organizations wishing provide public access web analytics reports consider generating static html reports on-demand facility still used restricting use internal users precautions taken referrer spam referrer spam filtering functionality added version 6.5 | [
3683,
4570,
5983,
4759,
7169,
5560,
1277,
3106,
5571,
4600,
7838,
3031,
5416,
7848,
3135,
8122,
5248,
8029,
1598,
3915,
87,
2713
] | Validation |
6,234 | 3 | Warp_&_Warp:warp amp warp player must take control monster fighter must shoot tongue-sticking aliens named berobero space world without letting touch kills three berobero colour row mystery alien appear killed extra points warp zone centre screen flashes katakana text japanese version english text warp us versions possible monster fighter warp maze world berobero must killed time-delay bombs delay controlled long player holds button every time kills one bombs get stronger making easier monster fighter blow bombs returns space world powerups may appear levels allow player shoot exploding bullets attach bombs directly onto enemy aliens however exploding bullets present space world obtained maze world powerup attach bombs onto enemies maze world appears space world players must alternate turns controls arcade version multiplayer mode two players play simultaneously famicom version first player controls white warpman second player controls orange warpman shooting player warpman multiplayer game causes become unable move fire certain period time three aliens called arcade version famicom version killing three aliens color causes mystery alien appear three four famicom version types mystery aliens three original types worth 500 1000 2000 points respectively fourth type mystery alien leaves one letter word extra killed extra life awarded player obtains five letters points awarded killing generic aliens differ depending area screen killed color changes three areas aliens killed near center screen yield highest number points 120 killed near edges yield lowest number points 60 killed near area worth 90 points killing multiple aliens single bomb maze world also worth 500 bonus points arcade version high score erased whenever cabinet reset turned famicom version high score kept even game reset erased console turned round number indicated flags bottom-right corner screen stop updating 48th round like namco galaxian king balloon number flags shown subsequent levels similarly indicator showing number lives remaining bottom-left corner stops updating four lives player still gain extra lives five lives remaining game reaches 1,000,000 points score roll | [
6626,
7179,
1237
] | Validation |
6,235 | 4 | Little_Snitch:little snitch little snitch host-based application firewall macos used monitor applications preventing permitting connect attached networks advanced rules produced maintained austrian firm objective development software gmbh unlike stateful firewall designed primarily protect system external attacks restricting inbound traffic little snitch designed protect privacy limiting outbound traffic little snitch controls network traffic registering kernel extensions standard application programming interface api provided apple application process attempts establish network connection little snitch prevents connection dialog presented user allows one deny permit connection one-time permanent basis dialog allows one restrict parameters connection restricting specific port protocol domain little snitch integral network monitor allows one see ongoing traffic real time domain names traffic direction displayed application version 4 received positive 4.5/5 review macworld | [
1249,
3165,
1809,
4759,
806,
994,
3185,
4492,
7351,
4138,
385,
7536,
2296,
2746,
5571,
6107,
578,
3637,
8100,
6456,
405,
3551,
1291,
7275,
7744,
3394,
6560,
4977,
7289,
7478,
3223,
3484,
4091,
2790,
7683,
6149,
6951,
7597,
875,
6962
] | Test |
6,236 | 3 | PA-RISC:pa-risc pa-risc instruction set architecture isa developed hewlett-packard name implies reduced instruction set computer risc architecture pa stands precision architecture design also referred hp/pa hewlett packard precision architecture architecture introduced 26 february 1986 hp 3000 series 930 hp 9000 model 840 computers launched featuring first implementation ts1 pa-risc succeeded itanium originally ia-64 isa jointly developed hp intel hp stopped selling pa-risc-based hp 9000 systems end 2008 supported servers running pa-risc chips 2013 late 1980s hp building four series computers based cisc cpus one line ibm pc compatible intel i286-based vectra series started 1986 others non-intel systems one hp series 300 motorola 68000-based workstations another series 200 line technical workstations based custom silicon sapphire sos chip design sos based 16-bit hp 3000 classic series finally hp 9000 series 500 minicomputers based 16 32-bit focus microprocessor precision architecture result known inside hewlett-packard spectrum program hp planned use spectrum move non-pc compatible machines single risc cpu family first processors introduced 1986 thirty-two 32-bit integer registers sixteen 64-bit floating-point registers number floating-point registers doubled 1.1 version 32 became apparent 16 inadequate restricted performance architects included allen baum hans jeans michael j. mahon ruby bei-loh lee russel kao steve muchnick terrence c. miller david fotland william s. worley first implementation ts1 central processing unit built discrete transistor–transistor logic 74f ttl devices later implementations multi-chip vlsi designs fabricated nmos processes ns1 ns2 cmos cs1 pcx first used new series hp 3000 machines late 1980s – 930 950 commonly known time spectrum systems name given development labs machines ran mpe-xl hp 9000 machines soon upgraded pa-risc processor well running hp-ux version unix operating systems ported pa-risc architecture include linux openbsd netbsd nextstep interesting aspect pa-risc line generations level 2 cache instead large level 1 caches used formerly separate chips connected bus integrated on-chip pa-7100lc pa-7300lc l2 caches another innovation pa-risc addition vectorized instructions simd form max first introduced pa-7100lc precision risc organization industry group led hp founded 1992 promote pa-risc architecture members included convex hitachi hughes aircraft mitsubishi nec oki prime stratus yokogawa red brick software allegro consultants inc.. isa extended 1996 64 bits revision named pa-risc 2.0 pa-risc 2.0 also added fused multiply–add instructions help certain floating-point intensive algorithms max-2 simd extension provides instructions accelerating multimedia applications first pa-risc 2.0 implementation pa-8000 introduced january 1996 | [
5012,
1447,
2549,
5371,
3948,
7527,
7529,
5737,
726,
1465,
4321,
7541,
2567,
2929,
4694,
5042,
742,
1481,
5055,
1112,
2226,
1867,
6133,
1881,
1882,
7581,
1502,
5079,
2248,
5431,
6148,
2266,
5450,
5101,
2989,
99,
6523,
6177,
1176,
4047,
... | Test |
6,237 | 3 | Ad_Lib,_Inc.:ad lib inc ad lib inc. canadian manufacturer sound cards computer equipment founded martin prevel former professor music vice-dean music department université laval company best known product adlib music synthesizer card almsc simply adlib called first add-on sound card ibm compatibles achieve widespread acceptance developers adoption games becoming first de facto standard audio reproduction today adlib functionality recreated emulators adplug vdmsound latter deprecated source code incorporated dosbox emulating adlib gold 1000 proves challenge due surround sound module 2x oversampling effect development work almsc adlib music synthesizer card concluded prevel struggled engage development community company new product example handed development kits trade shows hopes reach development staff software companies attendees simply used handouts personal entertainment discarded outright subsequently prevel engaged assistance top star computer services inc. also known tscs new jersey company provided quality assurance services game developers top star president rich heimlich sufficiently impressed product demonstration quebec 1987 endorse product top customers sierra on-line king quest iv became first game title support adlib game high audio production values including hired professional composer riding already popular game franchise catapulted adlib card mainstream media coverage soon game developers embraced adlib hoping give software competitive edge retail channel side retail stores chains wholesale distributor selling adlib sound cards 1990 adlib used yamaha ym3812 sound chip produces sound via fm synthesis adlib card consisted ym3812 chip off-the-shelf external glue logic plug standard pc compatible isa 8-bit slot pc software generated multitimbral music sound effects adlib card although acoustic quality distinctly synthesized digital audio pcm supported would become key missing feature competitor creative labs implemented sound blaster cards still possible however output pcm sound card software modulating playback volume audio rate done example microprose game f-15 strike eagle ii multi-channel music editor sound club ms-dos engineers developed sound cards software libraries adlib worked lyrtech notable sound designer worked adlib henri chalifour designed sound demos instrumental showing adlib products could including scoring music adlib commercial two separate revisions original adlib sound card original design 1987 provided mono output via ¼ inch jack aimed composers musicians second design 1990 used 3.5 mm miniature mono output quickly becoming new standard computer game industry adlib release microchannel version original sound card adlib mca used mca p82c611 interface ic notable updates mca version use volume wheel original potentiometer made card thick mca standard ad lib planned wholly new proprietary standard releasing 12-bit stereo sound card called adlib gold gold 1000 used later generation yamaha ymf262 opl3 12-bit digital pcm capability retaining backward compatibility opl2 opl3 chip albeit opl3 responds slightly differently ym3812/opl2 commands sound 100 exactly alike onboard yamaha ymz263-f also performs 2x oversampling would affect opl3 output slightly surround sound module developed optional attachment allowed chorus surround effect enabled opl3 outputs however games supported one unique aspect could initialized certain sounds affect entire output default optional attachments scsi support modem support development well evidence anti-competitive behavior creative failure card yamaha made parts creative adlib creative yamaha biggest customer time chip yamaha created adlib card continually failed pass testing creative yamaha chip passed enabled creative come market first shortly adlib chip passed testing late sustain despite adlib efforts gold 1000 failed capture market company eventually went bankrupt cheaper alternatives creative labs sound blaster 16 adlib designed gold 1000 mainly in-house gold 1000 layout lot discrete circuitry many surface mount components grid array creative labs able integrate sound cards tightly reduce cost gold 1000 finally released sound blaster series entrenched de facto pc sound card standard priced significantly cheaper adlib gold however sound blaster 16 suffered noisier output cheaper components contain unique 2x oversampling effect pc game developers supported gold directly however adlib gold support still found way small number mainstream games descent rayman dune police quest 3 bought games adlib gold 1000 planned ibm microchannel architecture bus named adlib gold mc2000 however adlib went bankrupt card could produced known prototypes confirmed success adlib music card soon attracted competitors long introduction creative labs introduced competing sound blaster card sound blaster fully compatible adlib hardware meaning would play past present future game written adlib card also added two key features absent adlib pcm audio channel game port pcm audio could record play digital audio recordings included dialogue sound effects short musical performances although pcm audio fidelity scarcely better radio allowed game developers include realistic sound effects speech could reproduced yamaha fm synthesis proved popular among game developers finally sound blaster inclusion game port made single-card gaming system superior product better marketing sound blaster quickly overshadowed adlib de facto standard pc gaming audio adlib slow response adlib gold sell well enough sustain company 1992 ad lib filed bankruptcy sound blaster family continued dominate pc game industry year binnenalster gmbh germany purchased assets ad lib government quebec acquired prevent creative labs buying company renamed adlib multimedia relaunched adlib gold sound card many products binnenalster sold adlib multimedia softworld taiwan 1994 | [
4970,
2023,
285,
3516,
3689,
4277,
5970,
6237,
7228,
3319
] | Test |
6,238 | 9 | JSyn:jsyn jsyn java synthesis free api developing interactive sound applications java developed phil burk others distributed burk company mobileer inc. jsyn flexible unit generator-based synthesis dsp architecture allows developers create synthesizers audio playback routines effects processing algorithms within java framework allows easy integration java routines e.g graphics user interface etc. plugin available web browsers run jsyn-enabled applets distributed world wide web although fundamentally synthesis language imitative directly inspired csound music-n languages jsyn number powerful extensions ancillary libraries including jmsl java update hmsl music specification language jscore staff notation editor library adds significantly higher level musical informatics package would normally supplied set synthesis routines wire graphical editor jsyn routines also allows developers create dsp chains using simple gui gives api ease use programs max/msp commercial though inexpensive developer license allows jsyn incorporated commercial applications | [
6408,
6245,
5266,
6287
] | Test |
6,239 | 3 | Paul_Horn_(computer_scientist):paul horn computer scientist paul m. horn born august 16 1946 american computer scientist solid state physicist made contributions pervasive computing pioneered use copper self-assembly chip manufacturing helped manage development deep computing important tool provides business decision makers ability analyze develop solutions complex difficult problems horn born august 16 1946 graduated clarkson college 1968 bachelor science degree obtained phd university rochester physics 1973 horn various times senior vice president ibm corporation executive director research ibm initiated project develop watson computer competed successfully quiz show jeopardy currently new york university nyu distinguished scientist residence nyu stern executive residence also professor nyu tandon school engineering 2009 appointed senior vice provost research nyu | [] | Test |
6,240 | 4 | Caller_ID_spoofing:caller id spoofing caller id spoofing practice causing telephone network indicate receiver call originator call station true originating station example caller id display might display phone number different telephone call placed term commonly used describe situations motivation considered malicious originator caller id spoofing available years people specialized digital connection telephone company called isdn pri circuit collection agencies law-enforcement officials private investigators used practice varying degrees legality first mainstream caller id spoofing service star38.com launched september 2004 star38.com first service allow spoofed calls placed web interface stopped offering service 2005 handful similar sites launched august 2006 paris hilton accused using caller id spoofing break voicemail system used caller id authentication caller id spoofing also used purchase scams web sites craigslist ebay scamming caller claims calling canada u.s. legitimate interest purchasing advertised items often sellers asked personal information copy registration title etc. scammer purchaser invests time effort come see for-sale items 2010 election fake caller ids ambulance companies hospitals used missouri get potential voters answer phone 2009 vindictive brooklyn wife spoofed doctor ’ office husband ’ lover attempt trick woman taking medication would make miscarry frequently caller id spoofing used prank calls example someone might call friend arrange white house appear recipient caller display december 2007 hacker used caller id spoofing service arrested sending swat team house unsuspecting victim february 2008 collegeville pennsylvania man arrested making threatening phone calls women home numbers appear caller id make look like call coming inside house march 2008 several residents wilmington delaware reported receiving telemarketing calls early morning hours caller apparently spoofed caller id evoke tommy tutone ’ 1981 hit 867-5309/jenny “ 2014 increase illegal telemarketers displaying victim number either verbatim digits randomised observed attempt evade caller id-based blacklists canadian federal election may 2 2011 live calls robocalls alleged placed false caller id either replace caller identity fictitious person pierre poutine joliette quebec disguise calls ohio call centre peterborough ontario domestic calls see robocall scandal june 2012 search google returned nearly 50,000 consumer complaints individuals receiving multiple continuing spoofed voice ip voip calls lines leased originating “ pacific telecom communications group ” located los angeles ca mailbox store apparent violation fcc rules companies lease thousands phone numbers anonymous voice-mail providers combination dubious companies like “ phone broadcast club ” actual spoofing allow phone spam become increasingly widespread pervasive problem 2013 misleading caller name teachers phone reported large quantity robocalls advertising credit card services ruse trick students families answering unwanted calls mistaken belief local schools january 7 2013 internet crime complaint center issued scam alert various telephony denial service attacks fraudsters using spoofed caller id impersonate police attempt collect bogus payday loans placing repeated harassing calls police victim number displayed impersonation police common scams involved impersonating utility companies threaten businesses householders disconnection means extort money impersonating immigration officials impersonating medical insurers obtain personal data use theft identity bogus caller id also used grandparent scams target elderly impersonating family members requesting wire transfer money caller id spoofed variety methods different technology popular ways spoofing caller id use voip pri lines past caller id spoofing required advanced knowledge telephony equipment could quite expensive however open source software asterisk freeswitch almost voip company one spoof calls minimal costs effort voip providers allow user configure displayed number part configuration page provider web interface additional software required caller name sent call instead generated number database lookup destination may configured part settings client-owned analog telephone adapter sip phone level flexibility provider-dependent provider allows users bring device unbundles service direct inward dial numbers may purchased separately outbound calling minutes flexible carrier n't follow established hardware standards skype locks subscribers configuration settings hardware subscriber owns outright vonage restrictive providers market wholesale voip typically intended allow displayed number sent resellers want end user numbers appear rare cases destination number served voice-over-ip reachable directly known sip address may published enum telephone number mapping .tel dns record located using intermediary sip broker google voice users directly reachable sip inum initiative numbers country codes +883 5100 +888 federated voip scheme provides direct internet connection pass signaling gateway public switched telephone network shares advantages nearly free unlimited access worldwide disadvantages ernet applications spoofing services work similarly prepaid calling card customers pay advance personal identification number pin customers dial number given company pin destination number number wish appear caller id call bridged transferred arrives spoofed number chosen caller—thus tricking called party many providers also provide web-based interface mobile application user creates account logs supplies source number destination number bogus caller id information displayed server places call two endpoint numbers bridges calls together providers offer ability record calls change voice send text messages another method spoofing emulating bell 202 fsk signal method informally called orange boxing uses software generates audio signal coupled telephone line call object deceive called party thinking incoming call waiting call spoofed number fact new incoming call technique often also involves accomplice may provide secondary voice complete illusion call-waiting call orange box truly spoof incoming caller id prior answering relies certain extent guile caller considered much social engineering technique technical hack methods include switch access signaling system 7 network social engineering telephone company operators place calls desired phone number telephone exchange equipment manufacturers vary handling caller name display much equipment manufactured bell system companies united states sends caller number distant exchange switch must use database lookup find name display calling number canadian landline exchanges often run nortel equipment sends name along number mobile clec internet independent exchanges also vary handling caller name depending switching equipment manufacturer calls numbers differing country codes represent complication caller id often displays local portion calling number without indicating country origin format mistaken domestic invalid number results multiple possible outcomes caller id spoofing remains legal canada recently become prevalent canadian anti-fraud centre add ed automated message practice fraud-reporting hotline crtc estimates 40 complaints receive regarding unsolicited calls involve spoofing agency advises canadians file complaints regarding calls provides list protection options dealing website july december 2015 held public consultation identify technical solutions address issue regulators set march 31 2019 target date implementation cid authentication system december 19 2018 crtc announced beginning december 19 2019 phone providers must block calls ids purport originate telephone numbers conform established numbering plans according report india department telecommunications government india taken following steps cli spoofing service providers per dot using spoofed call service illegal per indian telegraph act sec 25 c using service may lead fine three years imprisonment uk spoofed number called presentation number must either allocated caller allocated third party used third party explicit permission starting 2016 direct marketing companies obliged display phone numbers offending companies hit fines £2 million ofcom caller id spoofing generally legal united states unless done intent defraud cause harm wrongfully obtain anything value relevant federal statute truth caller id act 2009 make exceptions certain law-enforcement purposes callers also still allowed preserve anonymity choosing block outgoing caller id information phone lines act also targets voip services illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value ... forfeiture penalties criminal fines 10,000 per violation exceed 1,000,000 could imposed law maintains exemption blocking one outgoing caller id information law enforcement n't affected new york times sent number 111-111-1111 calls made offices august 15 2011 fake number intended prevent extensions reporters appearing call logs thus protect reporters divulge calls made anonymous sources times abandoned practice proposed changes caller id law many companies blocking calls well-known number starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir shaken/stir acronyms signature-based handling asserted information using tokens shaken secure telephone identity revisited stir standards august 1 2019 fcc voted extend truth caller id act international calls text messaging | [
7813,
2944,
1691,
1321,
5393,
8171,
1334,
7168
] | Test |
6,241 | 6 | Sector_slipping:sector slipping sector slipping technique used deal defective sectors hard disk drives due volatility hard disks moving parts low tolerances sectors become defective defective sectors even come hard disks factory disks incorporate bad-block recovery system cope issues low-level format defect lists populated store sectors bad bad sectors mapped sector slipping algorithm utilized using sector slipping bad sectors disk access time largely affected drive skip sectors takes time would read sector spare sectors located disk aid sectors “ slip ” sectors allowing preservation sequential ordering data accuracy programs reliant static knowledge cylinders block positions compromised though bad sectors found normal usage disk capable sector slipping algorithm applied instead linear reallocation sector forwarding used bad sector replaced sector spare area affect access times disk need seek spare sector since lookups bad sector redirect new sector example physical sectors 3 5 found bad sectors slipped allow logical sectors placed sequential order good sectors sector 3 slipped 4 sector 4 slipped 6 rest sectors slipped remaining spare sectors sector 4 6 sector 5 7 | [
2717,
2350
] | Test |
6,242 | 4 | Sudo:sudo sudo program unix-like computer operating systems allows users run programs security privileges another user default superuser originally stood superuser older versions codice_1 designed run commands superuser however later versions added support running commands superuser also restricted users thus also commonly expanded substitute user although latter case reflects current functionality accurately codice_1 still often called superuser since often used administrative tasks unlike similar command su users must default supply password authentication rather password target user authentication configuration file typically located codice_3 permits user access system invokes requested command configuration file offers detailed access permissions including enabling commands invoking terminal requiring password per user group requiring re-entry password every time never requiring password particular command line also configured permit passing arguments multiple commands robert coggeshall cliff spencer wrote original subsystem around 1980 department computer science suny/buffalo robert coggeshall brought sudo university colorado boulder 1986 1993 code features substantially modified staff university colorado boulder computer science department college engineering applied science including todd c. miller current version publicly maintained openbsd developer todd c. miller since 1994 distributed isc-style license since 1999 november 2009 thomas claburn response concerns microsoft patented sudo characterized suspicions overblown claims narrowly framed particular gui rather sudo concept unlike command su users supply personal password sudo necessary authentication configuration file permits user access system invokes requested command sudo retains user invocation rights grace period 5 minutes per pseudo terminal default see https //www.sudo.ws/man/1.8.27/sudo.man.html allowing user execute several successive commands requested user without provide password sudo may configured log command run user attempts invoke sudo without listed configuration file exception indication presented user indicating attempt recorded root user alerted via mail entry recorded system log file /etc/sudoers contains list users user groups permission execute subset commands privileges root user another specified user program may configured require password system distributions sudo largely supplanted default use distinct superuser login administrative tasks notably linux distributions well apple macos allows secure logging admin commands prevents exploits association selinux sudo used transition roles role-based access control rbac visudo command-line utility allows editing sudo configuration file fail-safe manner prevents multiple simultaneous edits locks performs sanity syntax checks program runas provides similar functionality microsoft windows pass current directories environment variables long command lines child supports running child another user support simple elevation true su sudo windows pass state information start child either elevated another user included hamilton c shell graphical user interfaces exist sudo notably kdesudo gksudo deprecated debian longer included ubuntu release 18.04 user interfaces directly built sudo provide similar temporary privilege elevation administrative purposes user account control microsoft windows mac os x authorization services doas available since openbsd 5.8 october 2015 written order replace sudo openbsd base system latter still made available port | [
361,
6414,
2817,
2001,
2453,
6789,
4759,
191,
1630,
1537,
5373,
5480,
3106,
5571,
6630,
7000,
923,
3638,
5138,
667,
1572,
1394,
5946,
2589,
7752,
7570,
3572,
4990,
1133,
2883,
3417,
6404,
1245,
4283,
5449,
1435,
4020
] | Validation |
6,243 | 4 | Access_level:access level computer science computer programming access level denotes set permissions restrictions provided data type reducing access level effective method limiting failure modes debugging time overall system complexity restricts variable modification methods defined within interface class thus incorporated many fundamental software design patterns general given object created read updated deleted function without sufficient access level two common access levels public private denote respectively permission across entire program scope permission within corresponding class third protected extends permissions subclasses corresponding class access levels modifiers commonly used java well c provides internal level c++ difference struct class default access level private classes public structs illustrate benefit consider public variable accessed part program error occurs culprit could within portion program including various sub-dependencies large code base leads thousands potential sources alternatively consider private variable due access restrictions modifications value must occur via functions defined within class therefore error structurally contained within class often single source file class means debugging requires evaluation single file sufficient modularity minimal access level large code bases avoid many challenges associated complexity retrieved java coffee break q imperative variable balance defined private int ensures classes methods functions accidentally overwrite variable balance instead must access interface class bank_balance whose methods ensure balance drop 0 | [
7071,
1803
] | Test |
6,244 | 2 | NimbleX:nimblex nimblex small slackware-based linux distribution optimized run cd usb drive network environment nimblex praised fast boots well small disk footprint considered surprising distribution using kde desktop environment nimblex also remarked web site allows users generate custom bootable images using web browser also covered mainstream romanian press first linux distribution put together romanian nimblex reported boot fast important factor user experience running optical media usb drives review 2007 nimblex edition noted expect boot less half time live cd fedora ubuntu knoppix takes recent review 2008 edition also noted nimblex speed easily one fastest bootups 've seen even tried hinder cripple boot time even dog slow pendrive old dirt test machine still booted amazingly fast desktop applications also fast nimblex also compact distribution review 2007 edition wondered managed include kde mention applications included size 200 mb window-based graphical user interface slimmed kde fit firefox web browser office documents editor koffice pdf reader media player play almost file formats without need install codec photo editing software gimp anti-virus bluetooth support integrated name applications included 2008 installation process major linux distributions customized creating custom installation disks usually called spins creating spin requires certain amount expertise creating spin run installation media requires customization nimblex makes process user-friendly providing web interface process similar embedded linux distributions e.g freewrt features made distribution popular early judge forums nimblex attracted surprisingly large number users relatively unknown distribution nimblex uses 2.6 kernel default gui kde slower computers default desktop environment exchanged one lower resource usage like fluxbox xfce typical office web browsing messaging components included nimblex hardly offers graphical administration tools — administration tasks like adding new user performed command line tradeoff allows nimblex small installation footprint — typical installation 400 megabytes additional applications installed using graphical installer gslapt codice_1 command line brings automatic resolution dependencies slackware packages text-mode hard driver installer available codice_2 considered beta quality 2008 edition 2008 edition comes three standard install images 200mb two smaller even ones 100 69mb installers allow customizations packets installation however nimblex 2008 uses kde 3.5.9 nimblex 2010 beta version also present site based kde 4 support new hardware user also enable compiz fusion via link desktop openoffice.org included instead koffice provided office suite nimblex included 200 mb package useful applications like firefox web browser koffice pdf reader kopete instant messenger klamav anti-virus gimp photo editor bluetooth support remote connection pc important software supported bigger nimblex package openoffice.org java python samba wine windows applications emulator many applications compiled community included distribution nimblex 2008 criticized irresponsible lacking common security features box even though clamav anti-virus guarddog firewall installed default non-root user account created installation root password required log desktop default root password displayed nimblex web site nimblex 2010 also fixed applications removed another problem nimblex packages created repackaging slackware packages since nimblex installs fewer libraries sometimes results uninstallable unusable packages reviews | [
2179,
2187,
2909,
5724,
6086,
7894,
2935,
6453,
2585,
2228,
1487,
58,
3996,
1128,
7587,
4008,
1893,
7954,
1909,
6884,
7969,
6175,
7251,
4400,
7253,
3696,
474,
1179,
7635,
6902,
2297,
1941,
1561,
3023,
6549,
1960,
6209,
2680,
4435,
5163,
... | Test |
6,245 | 9 | Hierarchical_Music_Specification_Language:hierarchical music specification language hierarchical music specification language hmsl music programming language written 1980s larry polansky phil burk david rosenboom mills college written top forth allowed creation real-time interactive music performance systems algorithmic composition software kind program requires high degree musical informatics distributed frog peak music runs light memory footprint ~1 megabyte macintosh amiga systems unlike csound languages audio synthesis hmsl primarily language making music interfaces sound-making devices built-in midi classes however high degree built-in understanding music performance practice tuning systems score reading main interface manipulation musical parameters metaphor shapes created altered combined create musical texture either response real-time scheduled events score hmsl widely used composers working algorithmic composition twenty years addition authors also composers hmsl used pieces nick didkovsky hub james tenney tom erbe pauline oliveros java port hmsl developed nick didkovsky name jmsl designed interface jsyn api | [
6408,
3534,
5260,
2592,
5282,
6238,
4853,
5420,
5266
] | Test |
6,246 | 4 | Mark_Rasch:mark rasch mark d. rasch attorney author working areas corporate government cybersecurity privacy incident response former chief security evangelist verizon communications vice president deputy general counsel chief privacy data security officer saic 1983 1992 rasch worked u.s. department justice within criminal division fraud section rasch earned j.d 1983 state university new york buffalo 1976 graduate bronx high school science prosecuted robert tappan morris case united states v. morris 1991 also drafted amicus brief related data encryption doj v bernstein prosecuted presidential candidate lyndon larouche organized crime figures new york associated gambino crime family also helped uncover individual responsible so-called craigslist murder boston assisted investigation lead arrest chelsea manning rasch regular contributor securitycurrent securityfocus security boulevard issues related law technology regular contributor wired magazine also longtime columnist storefrontbacktalk now-defunct publication tracked global retail technology appeared quoted msnbc fox news cnn new york times forbes pbs washington post npr national international media | [
218
] | Test |
6,247 | 6 | GNU_fcrypt:gnu fcrypt gnu fcrypt disk encryption software project intended offer multiple hidden partitions fly encryption automatic transparent encryption plausible deniability disbanded project part gnu project november 2012 richard stallman dubbed fcrypt official gnu project program called gnu fcrypt software encryption intended prove resistant cracked quantum computers | [
2529,
5571,
578
] | Test |
6,248 | 7 | Appserver.io:appserver.io appserver.io application server php based web environments project consists middleware delivers classical php web applications provides additional services basic idea wildfly equivalent php present within techdivision well july 2013 development project began due technical shortcomings php language time possibility non-blocking socket-based php middleware given using asynchronous event driven workflow forked processes parallel august 2012 threading extension php joe watkins enabled true posix compatible multithreading controversially threads used allow programmer account hardware usage instead relying used runtime environment enable easier communication parallel working batches deciding technical blueprint development began github platform project consisted 36 separate repositories around 80,000 lines code estimated effort 18 years cocomo model appserver.io open-source software osl version 3.0 downloaded either installable package project page source github project aims freemium marketing approach splitting software community professional enterprise edition community edition contained base features open source free charge professional edition could used within microsoft azure cloud service offers additional developer support appserver.io includes runtime environment containing php extended external libraries php extensions service daemons out-of-the-box runtime environment php development use multithreading environment considered break so-called shared nothing concept php allows inter-process communication object level together bundled runtime appserver.io bundles administration version 0.6.0 application management implemented file-based application deployment appserver.io offers servlets objects persist client requests eliminate repeated bootstrapping applications require wrapping bootstrap parts appserver.io offers enterprise bean implementation similar enterprise java beans functionality appserver.io offers modular services used individually internal external applications features appserver.io allows component-based scalability services servers e.g http webserver adjustable size number based xml configuration file additional components configured remote access allowing distributed systems component replication appserver.io early stage development project provided tested pre-release versions github development releases regularly published homepage appserver.io follows naming convention based major minor version numbers major digit specifies context minor version names exist 1.* major version named iron stands mythological view medieval age every minor version 1.x within major release consist noun describing something common major context | [
6029,
3236,
4759,
5571,
3396,
7542,
7848,
578,
5666,
1435
] | Test |
6,249 | 3 | Loader_(computing):loader computing computer systems loader part operating system responsible loading programs libraries one essential stages process starting program places programs memory prepares execution loading program involves reading contents executable file containing program instructions memory carrying required preparatory tasks prepare executable running loading complete operating system starts program passing control loaded program code operating systems support program loading loaders apart highly specialized computer systems fixed set specialized programs embedded systems typically loaders instead code executes directly rom order load operating system part booting specialized boot loader used many operating systems loader resides permanently memory though operating systems support virtual memory may allow loader located region memory pageable case operating systems support virtual memory loader may actually copy contents executable files memory rather may simply declare virtual memory subsystem mapping region memory allocated contain running program code contents associated executable file see memory-mapped file virtual memory subsystem made aware pages region memory need filled demand program execution actually hits areas unfilled memory may mean parts program code actually copied memory actually used unused code may never loaded memory unix loader handler system call codice_1 unix loader tasks include microsoft windows 7 loader codice_3 function contained ntdll.dll following operating systems need relocating loaders adjust addresses pointers executable compensate variations address loading starts operating systems need relocating loaders program always loaded location address space pointers absolute addresses rather offsets program base address well-known examples ibm os/360 system/360 mainframes descendants including z/os z/architecture mainframes os/360 descendant systems privileged operating system facility called iewfetch internal component os supervisor whereas non-privileged loader application perform many functions plus linkage editor entirely external os supervisor although certainly uses many supervisor services iewfetch utilizes highly specialized channel programs theoretically possible load relocate entire executable within one revolution dasd media 16.6 ms maximum 8.3 ms average legacy 3,600 rpm drives load modules exceed track size also possible load relocate entire module without losing revolution media iewfetch also incorporates facilities so-called overlay structures facilitates running potentially large executables minimum memory model small 44 kb versions os 88 kb 128 kb common os nucleus always resident portion supervisor formatted way compatible stripped-down version iewfetch unlike normal executables os nucleus scatter loaded parts nucleus loaded different portions memory particular certain system tables required reside initial 64 kb tables code may reside elsewhere system linkage editor application named iewl iewl main function associate load modules executable programs object modules output say assemblers compilers including automatic calls libraries high-level language built-in functions format may efficiently loaded iewfetch large number editing options conventional application commonly employed load module format includes initial text record followed immediately relocation and/or control record text record followed instances text record relocation and/or control record pairs end module text records usually large relocation and/or control records small iewfetch three relocation and/or control record buffers fixed 260 bytes smaller relocation and/or control records certainly possible 260 bytes maximum possible iewl ensures limitation complied inserting additional relocation records required next text record necessary special case sequence records may ... text record relocation record ... control record text record ... special byte within relocation and/or control record buffer used disabled bit spin communication area initialized unique value read ccw relocation and/or control record program controlled interrupt bit set processor thereby notified ccw accessed channel via special ios exit point processor enters disabled bit spin loop sometimes called shortest loop world byte changes initialized value cpu exits bit spin relocation occurs gap within media relocation and/or control record next text record relocation finished next record nop ccw following read changed tic loading relocating proceed using next buffer channel stop nop ccw restarted iewfetch via another special ios exit three buffers continuous circular queue pointing next last pointing first three buffers constantly reused loading relocating proceeds iewfetch thereby load relocate load module practical size minimum possible time dynamic linking loaders another type loader load link shared libraries like .so files .dll files already loaded running programs | [
1339,
3509,
4662,
4843,
8159,
4759,
8066,
4942,
4864,
4779,
5571,
3793,
2403,
1198,
7096,
839,
3557,
3889,
5591,
757,
5190,
1495,
336,
1975,
5606,
1236,
8142,
3751,
1989,
6498,
1992,
1435
] | Test |
6,250 | 8 | Composite_application:composite application computing composite application software application built combining multiple existing functions new application technical concept compared mashups however composite applications use business sources e.g. existing modules even web services information mashups usually rely web-based often free sources wrong assume composite applications definition part service-oriented architecture soa composite applications built using technology architecture composite application consists functionality drawn several different sources components may individual selected functions within applications entire systems whose outputs packaged business functions modules web services composite applications often incorporate orchestration local application logic control composed functions interact produce new derived functionality composite applications based soa ws-caf web services standard composite applications | [
345
] | Test |
6,251 | 4 | Host_Based_Security_System:host based security system host based security system hbss official name given united states department defense dod commercial-off-the-shelf cots suite software applications used within dod monitor detect defend dod computer networks systems enterprise-wide information assurance computer network defense solutions steering group essg sponsored acquisition hbss system use within dod enterprise network hbss deployed non-classified internet protocol routed network niprnet secret internet protocol routed network siprnet networks priority given installing niprnet hbss based mcafee inc epolicy orchestrator epo mcafee point product security applications host intrusion prevention system hips seeing need supply comprehensive department-wide security suite tools dod system administrators essg started gather requirements formation host-based security system summer 2005 march 2006 bae systems mcafee awarded contract supply automated host-based security system department award 22 pilot sites identified receive first deployments hbss pilot roll dod system administrators around world identified trained using hbss software preparation software deployment across dod october 9 2007 joint task force global network operations jtf-gno released communications tasking order cto 07-12 deployment host based security system hbss mandating deployment hbss combatant command service agency cc/s/a networks within dod completion date 3rd quarter 2008 release cto brought hbss attention major department heads cc/s/a providing essg necessary authority enforce deployment agencies willing comply cto risked disconnected dod global information grid gig lack compliance lessons learned pilot deployments provided valuable insight hbss program eventually leading defense information systems agency disa supplying pre-loaded hbss hardware well providing hbss software image could loaded compliant hardware platforms proved invaluable easing deployment task newly trained hbss system administrators provided consistent department-wide software baseline disa provided step-by-step documentation completing hbss baseline creation freshly installed operating system lessons learned niprnet deployments simplified process deploying hbss siprnet throughout lifetime hbss undergone several major baseline updates well minor maintenance releases first major release hbss known baseline 1.0 contained mcafee epolicy orchestrator engine hips software compliance profiler scp rogue system detection rsd asset baseline manager abm assets software new releases introduced software products evolved new products added cases completely replaced different products january 2011 hbss currently baseline 4.5 maintenance release 2.0 mr2 mr2 contains following software heart mcafee epolicy orchestrator epo management engine hbss mcafee tools responsible mcafee considers point product individual software applications controlled epo server hbss point products consist following host intrusion prevention system hips consists host-based firewall application-level blocking consolidated single product hips component one significant components hbss provides capability block known intrusion signatures restrict unauthorized services applications running host machines policy auditor pa introduced hbss baseline 2.0 policy auditor responsible ensuring compliance mandates payment card industry data security standard pci dss sarbanes–oxley act 2002 sox gramm–leach–bliley act 1999 glba health insurance portability accountability act 1996 hipaa federal information security management act 2002 fisma well best practice frameworks control objectives information related technology cobit pa maps controls predefined policy content mcafee policy auditor helps report consistently accurately key industry mandates internal policies across infrastructure specific targeted systems policy auditor agent-based audit solution leverages security content automation protocol scap automate processes required internal external audits assets baseline module released baseline 1.0 government off-the-shelf gots product used address system baseline configurations changes order respond information operations condition infocon infocon changes necessary times heightened security threats system initial deployment stages hbss assets module juvenile lacked much products intended capabilities however application fully evolved robust feature packed version capable handling original software design goals abm originally known assets 1.0 upgraded assets 2.0 hbss baseline 2.0 later called assets 3000 hbss baseline 3.0 rogue system detector rsd component hbss used provide real-time detection new hosts attaching network rsd monitors network segments reports hosts seen network epo server epo server determines whether system connected epo server mcafee agent installed identified exception considered rogue epo server take appropriate action concerning rogue host specified rsd policy hbss baseline 1.0 introduced rsd 1.0 rsd updated 2.0 hbss baseline 2.0 dcm component hbss introduced hbss baseline 2.0 specifically address use usb devices dod networks jtf-gno cto 09-xxx removable flash media device implementation within department defense dod networks released march 2009 allowed use usb removable media provided meets conditions stated within cto one conditions requires use hbss dcm module installed configured manage usb devices attached system dcm renamed data loss prevention dlp hbss baseline 3.0 mr3 assets publishing service aps hbss introduced hbss baseline 4.0 allow enclaves report asset information third-party dod entity standards-compliant format adds contextual information hbss assets allows improved reporting features systems relying hbss data according jtf-gno cto 07-12 dod agencies required deploy hbss networks disa made hbss software available download pki protected patch server users attempting download software required common access card cac .mil network disa provides software updates free charge dod entities additionally hbss administrators require satisfactory completion hbss training commonly appointed unit section commander writing order receive administer hbss system system administrators must satisfactorily complete online class hbss training well identified hbss administrator online training takes 30 hours complete class training requires four days excluding travel advanced hbss class also available hbss administrators wishing acquire in-depth knowledge system hbss online class training managed disa information pertaining training classes obtained disa information assurance support environment iase website disa risk management executive office formerly field security office fso provides free technical support hbss administrators help desk disa three tiers support tier tier iii tier tier ii support provided disa fso tier iii support provided mcafee disa fso support available using one following methods current pace hbss updated several times original baseline 1.0 current baseline 3.0 mr3 version within baseline 3.0 maintenance releases introduced every two four months bringing better stability security release hbss follows mcafee epo version updates closely expected continue trend epo continuously developed | [
496,
7567,
4036,
5908,
5166
] | Test |
6,252 | 1 | Tibero:tibero tibero relational databases database management system utility developed tmaxsoft tmaxsoft developing tibero since 2003 2008 second company world deliver shared-disk-based cluster tac main products tibero tibero mmdb tibero prosync tibero infinidata tibero datahub tibero relational database management system rdbms considered alternative oracle databases due complete compatibility oracle products including sql tibero guarantees reliable database transactions logical sets sql statements supporting acid atomicity consistency isolation durability providing enhanced synchronization databases tibero 5 enables reliable database service operation multi node environment tibero implemented unique tibero thread architecture address disadvantages previous dbms result tibero make efficient use system resources cpu memory fewer server processes ensures tibero offers combination performance stability expandability facilitating development administration functions additionally provides users developers various standard development interface easily integrate dbms 3rd party tools addition block transfer technology applied improve ‘ tibero active cluster ’ shared db clustering technology similar oracle rac tibero supports self-tuning based performance optimization reliable database monitoring performance management korea tibero adopted 450 companies across range industries finance manufacturing communication public sector globally 14 companies july 2011 tibero uses multiple working processes working process uses multiple threads number processes threads changed user requests handled thread pool removes overhead dispatcher handles input/output processing memory usage number os processes reduced using thread pool number simultaneous processes changed tibero following three processes listener receives requests new connections clients assigns available working thread listener plays intermediate role clients working threads using independent executable file tblistener background processes independent processes primarily perform time-consuming disk operations specified intervals request working thread another background process following processes belong background process group tibero rdbms provides distributed database links data replication database clustering tibero active cluster tac similar oracle rac. parallel query processing query optimizer conforms sql standard specifications development interfaces guarantees high compatibility types databases features include row-level locking multi-version concurrency control parallel query processing partition table support tibero rdbms enables stable efficient management dbmss guarantees high-performance transaction processing using tibero active cluster hereafter tac technology failover operation based shared disk clustering system environment tac allows instances different nodes share data via shared disk supports stable system operation 24x365 fail-over function optimal transaction processing guaranteeing integrity data instance ’ memory tac main feature tibero providing high scalability availability instances executed tac environment execute transactions using shared database access shared database mutually controlled data consistency conformity processing time reduced larger job divided smaller jobs jobs performed several nodes multiple systems share data files based shared disks nodes act use single shared cache sending receiving data blocks necessary organize tac high speed private network connects nodes even node stops operating nodes continue services transition happens quickly transparently tac cluster system application level provides high availability scalability types applications recommended apply replication architecture servers also hardware storage devices helps improve high availability virtual ip vip assigned node tac cluster node tac cluster failed public ip accessed virtual ip used connections connection failover following main components tac | [
7788,
6252,
3915,
4759,
5571,
7427,
7248,
578,
900
] | Validation |
6,253 | 7 | GGPO:ggpo ggpo short good game peace middleware designed help create near-lagless online experience various emulated arcade games fighting games program created tony cannon co-founder fighting game community site shoryuken popular evolution championship series creation ggpo creator tony cannon completely dissatisfied 2006 xbox 360 re-release experiencing criticized online capabilities reaction service cannon began development ggpo released first ever version late 2006 cannon later demonstrated ggpo capcom positively received downloadable ggpo client supported many games capcom snk including super street fighter ii turbo king fighters 2002 metal slug x use built-in emulator video game companies also implemented licensed version ggpo games using include skullgirls killer instinct 2013 video game ggpo uses netcode technique called “ rollback ” rather waiting input received players simulating next frame ggpo predicts inputs send simulates next frame without delay using assumption players ’ inputs arrive input ’ match prediction ggpo rolls back state game last correct state replays players ’ revised inputs back current frame hope predictions correct time allowing smooth play minimal sudden changes game state system highly similar client-side prediction applied peer-to-peer setup client program allow players manually adjust latency high-ping situations either creating possibly-jerky yet accurate representation smoother game input delay ggpo originally bundled client enabled users play supported games online players matchmaking system allowed players request challenges users non-participants could spectate match chat challenge initiated match ran rom prepackaged emulator finalburn alpha client discontinued superseded clients make use ggpo networking middleware | [
5666,
4759,
5571
] | Train |
6,254 | 4 | RunScanner:runscanner runscanner freeware microsoft windows system utility scans windows system configured running programs autostart locations program created best worlds effort combine positive features similar programs like hijackthis autoruns silentrunners unlike similar programs runscanner connects online database rate good bad items main purpose database whitelisting instead blacklisting runscanner scans windows autostart locations gives user possibility delete misconfigured malware items inexperienced users post log files forums specialist helpers help solve malware problems advanced users use features modern malware fighters come expect unlike similar software runscanner also exchange binary files users | [
3932,
7964,
4759,
5571,
5182
] | Validation |
6,255 | 2 | Virtual_machine_introspection:virtual machine introspection computing virtual machine introspection vmi technique monitoring runtime state system-level virtual machine vm helpful debugging forensic analysis term introspection application virtual machines introduced garfinkel rosenblum invented approach protecting security application attack malicious software called vmi vmi common term different virtual machine forensics analysis methods vmi-based approaches widely used security applications software debugging systems management vmi tools may located inside outside virtual machine act tracking events interrupts memory writes sending requests virtual machine virtual machine monitor usually provides low-level information like raw bytes memory converting low-level view something meaningful user known semantic gap problem solving problem requires analysis understanding systems monitored programs running inside vm may provide information processes information may sent network interface virtual devices like serial port examples vivo introspection programs windbg gdb servers interact remote debugger drawback approach requires functioning os within vm os hangs n't loaded yet introspection agent could n't work vmi tools may implemented within virtual machine monitor separate programs capture information e.g. contents memory virtual machine monitor data interpreted understand processes system one popular tools interpretation volatility framework framework contains profiles many popular operating systems may extract different information like process tree list kernel objects | [] | Test |
6,256 | 3 | Windows_NT:windows nt windows nt family operating systems produced microsoft first version released july 27 1993 processor-independent multiprocessing multi-user operating system first version windows nt windows nt 3.1 produced workstations server computers intended complement consumer versions windows based ms-dos including windows 1.0 windows 3.1x gradually windows nt family expanded microsoft general-purpose operating system product line personal computers deprecating windows 9x family nt formerly expanded new technology longer carries specific meaning starting windows 2000 nt removed product name included product version string nt first purely 32-bit version windows whereas consumer-oriented counterparts windows 3.1x windows 9x 16-bit/32-bit hybrids multi-architecture operating system initially supported several instruction set architectures including ia-32 mips dec alpha support powerpc itanium x64 arm added later latest versions support x86 specifically ia-32 x64 arm major features windows nt family include windows shell windows api native api active directory group policy hardware abstraction layer ntfs bitlocker windows store windows update hyper-v suggested dave cutler intended initialism wnt play vms incrementing letter one however project originally intended follow-on os/2 referred nt os/2 receiving windows brand one original nt developers mark lucovsky states name taken original target processor—the intel i860 code-named n10 n-ten 1998 question-and-answer session bill gates revealed letters previously expanded new technology longer carry specific meaning letters dropped names releases windows 2000 later though microsoft described product built nt technology main design goal nt hardware software portability various versions nt family operating systems released variety processor architectures initially ia-32 mips dec alpha powerpc itanium x86-64 arm supported later releases idea common code base custom hardware abstraction layer hal platform however support mips alpha powerpc later dropped windows 2000 broad software compatibility achieved support several api personalities including windows api posix os/2 apis – latter two phased starting windows xp partial ms-dos compatibility achieved via integrated dos virtual machine – although feature phased x86-64 architecture nt supported per-object file function role access control lists allowing rich set security permissions applied systems services nt supported windows network protocols inheriting previous os/2 lan manager networking well tcp/ip networking microsoft would implement tcp/ip stack derived first streams-based stack spider systems later rewritten in-house windows nt 3.1 first version windows use 32-bit flat virtual memory addressing 32-bit processors companion product windows 3.1 used segmented addressing switches 16-bit 32-bit addressing pages windows nt 3.1 featured core kernel providing system api running supervisor mode ring 0 x86 referred windows nt kernel mode platforms set user-space environments apis included new win32 environment os/2 1.3 text-mode environment posix environment full preemptive multitasking kernel could interrupt running tasks schedule tasks without relying user programs voluntarily give control cpu windows 3.1 windows applications although ms-dos applications preemptively multitasked windows starting windows/386 notably windows nt 3.x several i/o driver subsystems video printing user-mode subsystems windows nt 4 video server printer spooler subsystems moved kernel mode windows nt first gui strongly influenced programmatically compatible windows 3.1 windows nt 4 interface redesigned match brand new windows 95 moving program manager windows shell design ntfs journaled secure file system created nt windows nt also allows installable file systems starting versions 3.1 nt could installed fat hpfs file systems windows nt introduced driver model windows nt driver model incompatible older driver frameworks windows 2000 windows nt driver model enhanced become windows driver model first introduced windows 98 based nt driver model windows vista added native support windows driver foundation also available windows xp windows server 2003 extent windows 2000 microsoft decided create portable operating system compatible os/2 posix supporting multiprocessing october 1988 development started november 1989 windows nt known os/2 3.0 third version operating system developed jointly microsoft ibm ensure portability initial development targeted intel i860xr risc processor switching mips r3000 late 1989 intel i386 1990 microsoft also continued parallel development dos-based less resource-demanding windows environment resulting release windows 3.0 may 1990 windows 3 eventually successful microsoft decided change primary application programming interface still unreleased nt os/2 known extended os/2 api extended windows api decision caused tension microsoft ibm collaboration ultimately fell apart ibm continued os/2 development alone microsoft continued work newly renamed windows nt though neither operating system would immediately popular microsoft ms-dos windows products windows nt would eventually far successful os/2 microsoft hired group developers digital equipment corporation led dave cutler build windows nt many elements design reflect earlier dec experience cutler vms rsx-11 also unreleased object-based operating system developed dave cutler dec prism team joined selected members disbanded os/2 team including moshe dunie operating system designed run multiple instruction set architectures multiple hardware platforms within architecture platform dependencies largely hidden rest system kernel mode module called hal hardware abstraction layer windows nt kernel mode code distinguishes kernel whose primary purpose implement processor- architecture-dependent functions executive designed modified microkernel windows nt kernel influenced mach microkernel developed carnegie mellon university meet criteria pure microkernel kernel executive linked together single loaded module ntoskrnl.exe outside module little distinction kernel executive routines directly accessible example kernel-mode device drivers api sets windows nt family implemented subsystems atop publicly undocumented native api allowed late adoption windows api win32 subsystem windows nt one earliest operating systems use unicode internally windows nt 3.1 3.51 incorporated program manager file manager windows 3.1x series windows nt 4.0 onwards replaced programs windows explorer including taskbar start menu originally appeared windows 95 first release given version number 3.1 match contemporary 16-bit windows magazines era claimed number also used make version seem reliable .0 release also novell ipx protocol apparently licensed 3.1 versions windows software nt version number generally used marketing purposes still used internally said reflect degree changes core operating system however application compatibility reasons microsoft kept major version number 6 releases following vista changed later 10 windows 10 build number internal identifier used microsoft developers beta testers windows nt written c c++ small amount written assembly language c mostly used kernel code c++ mostly used user-mode code assembly language avoided possible would impede portability order prevent intel x86-specific code slipping operating system developers used developing x86 chips windows nt 3.1 initially developed using non-x86 development systems ported x86 architecture work initially based intel i860-based dazzle system later mips r4000-based jazz platform systems designed internally microsoft windows nt 3.1 released intel x86 pc compatible pc-98 dec alpha arc-compliant mips platforms windows nt 3.51 added support powerpc processor 1995 specifically prep-compliant systems ibm power series desktops/laptops motorola powerstack series despite meetings michael spindler bill gates power macintosh prep compliant power macintosh project failed ship intergraph corporation ported windows nt clipper architecture later announced intention port windows nt 3.51 sun microsystems sparc architecture neither version sold public retail product two windows nt 4.0 variants ia-32 alpha full set service packs available ports done third parties motorola intergraph etc publicly available updates windows nt 4.0 last major release support alpha mips powerpc though development windows 2000 alpha continued august 1999 compaq stopped support windows nt architecture three days later microsoft also canceled alphant program even though alpha nt 5 windows 2000 release reached rc1 status microsoft announced january 5 2011 next major version windows nt family include support arm architecture microsoft demonstrated preliminary version windows version 6.2.7867 running arm-based computer 2011 consumer electronics show eventually led commercial release windows 8-derived windows rt october 26 2012 implementation nt ce windows phone 8 according microsoft common misconception xbox xbox 360 use modified windows 2000 kernel xbox operating system built scratch implements subset windows apis 64-bit versions windows nt originally intended run itanium dec alpha latter used internally microsoft early development 64-bit windows continued time microsoft publicly announced cancelling plans ship 64-bit windows alpha alpha versions windows nt 32-bit windows 2000 supports intel ia-32 32-bit windows xp server 2003 server 2008 server 2008 r2 one edition dedicated itanium-based systems comparison itanium microsoft adopted x64 greater scale every version windows since windows xp dedicated x64 edition x64 editions minimum hardware specification required run release professional workstation version windows nt fairly slow-moving 6.0 vista release requires minimum 15 gb free disk space 10-fold increase free disk space alone previous version | [
4291,
1452,
7172,
1475,
4341,
7195,
7203,
5781,
4368,
4370,
5784,
4377,
5794,
1522,
1523,
2983,
7239,
1534,
7246,
1536,
4398,
1547,
126,
5842,
3039,
1582,
3042,
151,
3048,
157,
5872,
7304,
7306,
3062,
4468,
187,
206,
4500,
224,
1668,
45... | Test |
6,257 | 4 | HideMyAss!:hidemyass hidemyass hma virtual private network vpn provider founded 2005 united kingdom subsidiary czech cybersecurity company avast since 2016 hidemyass created 2005 norfolk england jack cator time cator sixteen years-old created hma order circumvent restrictions school accessing games music network according cator first hidemyass service created hours using open-source code first product free website users typed url delivered website user browser cator promoted tool online forums featured front page digg attracting one thousand users cator incorporated ads hma take venture capital funding generated 1,000 2,000 per month founder went college pursue degree computer science 2009 cator dropped college focus hma added paid vpn service early hma employees freelancers found odesk.com 2012 one freelancers set-up competing business hma responded hiring contractors full-time employees establishing physical offices london 2012 united kingdom government sent hidemyass court order demanding provide information cody andrew kretsinger use hma service hack sony member lulzsec hacking group hma provided information authorities hma said violation company terms use use software illegal activities 2013 hma added software anonymize internet traffic mobile devices first added 2013 2014 company introduced hidemyphone service allowed mobile phone users make calls appear come different location 2014 service 10 million users 215,000 paying subscribers vpn service made £11 million revenue year hma 100 staff established international offices belgrade kiev 2015 hma became one largest vpn providers may 2015 acquired avg technologies 40 million became part avast 2016 acquisition avg technologies 2017 security vulnerability discovered allowed hackers access user laptop obtain elevated privileges device 2019 reported hma received directive russian authorities join state sponsored registry banned websites would prevent russian hma users circumventing russian state censorship hma reportedly given one month comply face blocking russian authorities hidemyass provides digital software services intended help users remain anonymous online encrypt online traffic software used access websites may blocked user country anonymize information could otherwise used hackers something unscrupulous without identified hma privacy policy terms use prohibit using illegal activity hma hides user ip address identifying information routing user internet traffic remote server however experts note company log connection data including originating ip address duration vpn session amount bandwidth used may 2018 company 830 servers 280 locations across globe provided 3000 ip addresses 2015 review tom hardware said hidemyass easy use good customer service large number server locations choose criticized slowing internet speeds contrast digital trends said hidemyass strong speeds good server selection n't full-proof ensuring anonymity stored user activity logs 2017 pc world noted difficult measure effect vpn service internet speed variables like location internet service speeds hardware 2016 review pc magazine gave hma android app 3 5 stars praised hma server selection user interface criticized price speed lack advanced features 2018 pc magazine gave similar feedback hma vpn service pc world ’ 2017 review also praised hma simple user interface criticized lack advanced features saying software ideal casual users need advanced configuration options | [
5144,
4014,
1805
] | Test |
6,258 | 9 | JSLEE:jslee jslee jain service logic execution environment java programming language api developing deploying network services standardized java specification requests jsr 22 jsr 240 sun microsystems opencloud metaswitch participation 80 operators software vendors technical specification designed implementations meet stringent requirements communications applications like high throughput low latency scalability availability software portability furthermore allows software developers write robust components integrates acid properties transactions programming model jslee environment acts integration point multiple network resources communications protocols | [
5447,
3381
] | Validation |
6,259 | 8 | Microwork:microwork microwork series small tasks together comprise large unified project completed many people internet microwork considered smallest unit work virtual assembly line often used describe tasks efficient algorithm devised require human intelligence complete reliably term developed 2008 leila chirayath janah samasource microtasking process splitting large job small tasks distributed internet many people since inception microwork many online services developed specialize different types microtasking rely large voluntary workforce composed internet users around world typical tasks offered repetitive simple automated good candidates microtasks following characteristics may also known ubiquitous human computing human-based computation focused computational tasks complex distributed computing microtasks distinguished macrotasks typically done independently require fixed amount time require specialized skill wage paid range cents per task hundreds dollars per project amazon mechanical turk allows workers choose perform simple tasks online reporting directly platform receive payments exchange task complex algorithm writing simple labelling photos videos describing products transcribing scanned documents employers submit tasks set payments often pennies task crowdsourcing project initiated amazon way users find duplicate webpages soon became service individuals contract computer programmers individuals finish tasks computers unable accomplish since project expanded original form nowadays people complete various mechanical turk projects extra income side liveops uses distributed network people run cloud call center virtual call center contact center contracted workers answer calls provide call center facilities without need physical building equipment traditional call center red cross utilized system successfully hurricane katrina 2005 process 17,000+ calls without open hire staff call center similar model used text message question-answering services like 63336 researchers connect service home receive questions submitted innocentive allows businesses post problems offer payment answers questions often far less simple tasks posted services like mechanical turk payments accordingly higher example think find way prevent orange juice stored see-through bottles turning brown may 20,000 samasource non-profit organization allows people living poverty opportunity complete microwork living wage service specializes online content moderation digital transcription data gathering promotion galaxy zoo scientific effort use online crowdsourcing classify large number galaxies astronomical images 2010 company internet eyes launched service return potential reward home viewers would watch live cctv streams alert shop owners potential theft progress uses microtasking services involve processing data especially online include driving traffic websites gathering data like email addresses labelling tagging data online also used accurately translate transcribe audio clips pictures since activities better suited humans computers used practical data conversion purposes also improve upon test fidelity machine learning algorithms identification pictures humans used help missing persons searches though little effect manipulation data services also good platform reaching large population social studies surveys since make easy offer monetary incentives companies also outsource projects specialists otherwise would expended resources hiring screening method pay per task attractive employers therefore companies like microsoft yahoo currently crowdsourcing work crowdflower company specializes allocating jobs foreign local crowd workers crowdflower alone completed 450 million completed human intelligence tasks 2007 2012 crowdflower operates differently amazon mechanical turk jobs taken company turn allocated right workers range channels implemented system called virtual play allows users play free games would turn accomplish useful tasks company 2011 estimated 375 million contributed digital crowdsourced labour india united states together make roughly 92 workers amazon mechanical turk u.s. making 56 however percentage indian turkers quadrupled one year 2008 2009 2009 indian turkers much younger educated american counterparts citation needed average age indian workers 26 american workers 35 addition 45 digital workforce india bachelor degrees 21 master degrees contrast 38 american turkers bachelor degree 17 master degree nonetheless majority digital workforce educated young adults major difference american indian workforce lies gender 63 indian turkers male compared 37 makes american turkers microtasking services implemented allow workers work home workers complete tasks voluntary basis time-sensitive jobs like call centers choose jobs complete complete workers work anywhere world receive payment directly internet workers reside anywhere world microwork provide job opportunities large fortune 500 companies many smaller companies people living poverty would otherwise able make living wage services like samasource work wealth distributed companies developed countries large volume families poverty especially women youth would otherwise able generate income services like amazon mechanical turk restrict countries workers connect employers microtasking services provide platform quickly get project online start receiving results many workers time services offer large workforces complete tasks concurrently large volumes small tasks completed quickly furthermore since task discretely contained tasks usually simple nature individual worker fully trained complete knowledge project contribute work united states tax law workers treated independent contractors means employers withhold taxes need file form 1099-misc internal revenue service given worker earns 600 per year workers responsible paying income taxes including self-employment tax would otherwise paid employer microtasking services criticized providing healthcare retirement benefits sick pay minimum wage pay piece treat workers independent contractors rather employees also avoid laws child labor labor rights additionally workers may little idea work used result may workers end contributing project negative impact morally opposed services especially amazon mechanical turk services pay pennies task called digital sweatshops analogy sweatshops manufacturing industry exploit workers maintain poor conditions wages vary considerably depending speed worker per-piece price offered workers choose tasks complete based task price experience employer employers bid higher faster completion higher-quality workers average unskilled turkers earn less 2.00 hour minimum wage united states however india well minimum cities india 1200 minimum wages global services outsource work underdeveloped developing regions competitive pricing task completion could result lower wages possibility also exists true brick mortar sweatshops exploit microtasking services enlisting poor afford computer aggregating work wages also possibility requesters may tell worker reject work cheat worker using anyway avoid paying however dispersed geography microwork used keep wages low networks fragment labour process also used workers organising resistance san francisco-based company crowdflower facilitated outsourcing digital tasks countries poverty stimulate local economies crowdsourcing company partnership samasource non-profit organization brings computer based work developing countries currently outsourced millions repetitive microwork kenyan refugee camps workers make 2 hour locals average refugees asked exploitation lukas biewald crowdflower argues digital sweatshop much better job people developing world opposed working manufacturing sweatshop states treatment received workers far superior categorized sweatshop great thing digital work really hard make sweatshop digital work really hard force someone work ca n't beat someone computer screen | [
6092
] | Validation |
6,260 | 1 | Terminfo:terminfo terminfo library database enables programs use display terminals device-independent manner mark horton implemented first terminfo library 1981–1982 improvement termcap improvements include terminfo included unix system v release 2 soon became preferred form terminal descriptions system v rather termcap bsd continued use imitated pcurses 1982–1984 pavel curtis available unix implementations adapting incorporating fixes mark horton information refer posting comp.sources.unix newsgroup december 1986 terminfo database describe capabilities hundreds different display terminals allows external programs able character-based display output independent type terminal configurations terminfo databases consist one descriptions terminals description must contain canonical name terminal may also contain one aliases name terminal canonical name aliases keys library searches terminfo database description contains one capabilities conventional names capabilities typed boolean numeric string terminfo library predetermined types capability name checks types capability syntax applications use terminfo know types respective capabilities obtain values capabilities terminfo database using library calls return successfully capability name corresponds one predefined typed capabilities like termcap string capabilities represent escape sequences may sent host pressing special keys keyboard capabilities represent strings may sent application terminal latter case terminfo library functions termcap library substituting application parameters string sent functions provide stack-based expression parser primarily used help minimize number characters sent control sequences optional parameters sgr select graphic rendition contrast termcap libraries provide limited set operations useful terminals terminfo descriptions constructed including contents one description another suppressing capabilities included description overriding adding capabilities matter storage model used terminfo library returns terminal description requested description using data compiled using standalone tool e.g. tic terminfo data stored binary file making less simple modify termcap data retrieved terminfo library files stored data organized tables boolean numeric string capabilities respectively scheme devised mark horton except differences regarding available names used terminfo implementations x/open specify format compiled terminal description fact even mention common tic infocmp utilities compiled terminfo entries contain metadata identifying indices within tables capability assigned necessarily compatible implementations however since implementations use overall table structure including sizes header data items possible automatically construct customized terminfo libraries read data given implementation example ncurses built match terminfo data several implementations original common implementation terminfo library retrieves data directory hierarchy using first character name terminal description one component pathname name terminal description name file retrieve terminfo library usually outperforms searching large termcap file implementations terminfo store terminal description hashed database e.g. something like berkeley db version 1.85 store two types records aliases point canonical entry canonical entry contains data terminal capabilities open group documents limits terminfo minimum guaranteed values apply source file two special interest 14-character limit addresses old filesystems could represent filenames longer filesystems generally obsolete limits documented late 1980s unreviewed since 32,767 limit positive values signed two complement 16-bit value terminfo entry may use negative numbers represent cancelled absent values unlike termcap terminfo source compiled representation limits compiled representation unspecified however implementations note documentation tic terminal information compiler compiled entries exceed 4,096 bytes size | [
4341,
2118,
1989,
2054,
1105
] | Test |
6,261 | 3 | Microsoft_Diagnostics:microsoft diagnostics msd microsoft diagnostics software tool developed microsoft assist diagnostics 1990s-era computers users primarily deployed tool provide detailed technical information user software hardware print gathered information usually use support technicians troubleshooting resolving problems assumptions made program valid late 1990s handle plug-and-play usb new technologies appeared around 2000 pc dos 6.1 codice_1 provides similar functionality commercial alternatives include manifest codice_2 quarterdeck qemm codice_3 first shipped microsoft word windows later included windows 3 ms-dos 6 windows 9x cd-roms os/2 windows nt contain code forked dos dos 5 level versions codice_3 included correspond era i.e version 2.0 windows nt 3 4 codice_5 program similar features however dos/windows specific functions replaced similar windows nt concerns codice_6 included resource kits provides print functionality codice_3 codice_5 since nt 5 windows 2000 codice_9 loader codice_10 users generally started program dos command prompt using command codice_11 starting program dos window either windows os/2 shows dos details allocated dos session machine general aspects system codice_3 provided technical information microsoft replaced codice_3 codice_10 similar features targets recent machines first appeared ms-word later distributed plus windows 95 windows 98. codice_10 windows xp stores system history wmi xml files codice_16 interest backward compatibility codice_5 became loader codice_18 | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
6575,
... | Test |
6,262 | 7 | Jelastic:jelastic jelastic cloud services provider combines paas platform service caas container service single package hosting providers telecommunication companies enterprises developers platform available public cloud 60 data centers worldwide private cloud virtual premise hybrid multicloud jelastic provides support java php ruby node.js python .net go environments custom docker containers jelastic founded 2011 public cloud initially paas specifically targeted java hosting 2012 company got java duke choice award 2013-2015 platform added support php ruby python node.js .net support docker containers latest runtime addition 2017 integrating golang 2014 introduced private cloud solution 2015 platform could already used hybrid multi-cloud jelastic closed set funding rounds runa capital almaz capital partners foresight ventures maxfield capital june 2013 jelastic announced hiring mark zbikowski former microsoft architect contributor ms-dos senior adviser july 2013 rasmus lerdorf creator php joined jelastic senior adviser november 2014 creator java programming language james gosling brazilian java man bruno souza joined jelastic team jelastic keeps working improvement java technology user experience thereby 2018 platform proved leading position direction getting duke choice award second time platform installed bare metal iaas public cloud vpc private on-premise hybrid multi-cloud jelastic paas installed fully configured jelastic ops team performed automatically top google cloud ms azure well top bare metal using iso image platform configuration includes integration billing systems like whmcs odin system automation cleverbridge custom billing required jelastic provides pay-as-you-use pricing model within public cloud resources charged hourly base ram cpu cloudlet resource unit disk space external traffic public ip ssl price resource unit depends chosen hosting provider estimated monthly daily hourly base within dev panel cloud hosting expenses tracked optimized using built-in billing details whole account specific application private cloud installation charged monthly license base per physical server two types licensing installation self-administering installation managed services partnership service providers built franchise model revenue sharing jelastic installed wide range hosting providers telcos among datacenter finland telecom italia eapps locaweb primetel layershift elastx innofield others also jelastic used system integrators companies different spheres finance software sport gaming etc like fa solutions international football association board gmv g5 games miele philips lighting others | [
370,
7165,
6428,
3954,
3958,
6806,
22,
3627,
2212,
3309,
754,
5064,
2961,
1514,
2988,
7613,
5108,
1550,
6906,
5135,
3028,
2317,
842,
4081,
1982,
2700,
5889,
5894,
4842,
189,
1634,
3091,
7722,
5927,
7741,
5940,
2430,
5965,
7037,
4211,
42... | Test |
6,263 | 9 | Richard_H._Lathwell:richard h. lathwell richard dick henry lathwell 1973 recipient larry breed roger moore grace murray hopper award association computing machinery | [
6977,
811,
470,
908,
3464,
6285,
2315,
752,
1116,
5322,
851,
1774,
1308,
7758,
6846,
8137,
3060,
1892,
6064,
356
] | Test |
6,264 | 6 | NTFS_junction_point:ntfs junction point ntfs junction point symbolic link directory acts alias directory feature ntfs file system offers benefits windows shell shortcut .lnk file allowing access files within directory via windows explorer command prompt etc unlike ntfs symbolic links junction points link absolute path local volume junction points local volume remote share unsupported junction points type ntfs reparse point internally represented mount point introduced ntfs 3.0 default file system windows 2000 windows 2000 windows 2003 resource kits include program called create junction points mark russinovich winternals released tool called junction provided complete functionality windows xp includes fsutil masatoshi kimura released filter driver soft/symbolic link functionality existing windows xp ntfs version accessible end user windows vista windows server 2008 later operating systems include mklink command-line utility creating junction points setting junction point points directory containing particular version piece software may possible add another version software redirect junction point point version desired contents junction use almost disk space simply point original directory need multiple points entry large directory junction points serve purpose well junction points confused copy something junctions simply point original directories need modified separately junction used provide distinct copy directory files within since reinstalling windows installing new version often requires deleting contents c drive advantageous create multiple partitions one partition needs deleted installation however programs n't let user choose installation directory install files c drive even installed different drive creating junction point program tricked installing different directory list junctions present current directory obtained elevated command prompt admin executing codice_1 list junctions present disk volume executing codice_2 c volume scan junction point created vista later delete vista later use junction point created xp installing server 2003 resource kit delete xp use neither windows nt startup process windows vista startup process support junction points impossible redirect certain system folders however possible redirect non-critical folders creating junctions \users \programdata pointing another drive recommended breaks updates windows store apps creating junctions \users \programdata \program files \program files x86 pointing locations breaks installation resp upgrade windows creating junctions \program files \program files x86 pointing another drive breaks windows component based servicing hardlinks files repository \windows\sxs installation directory | [
7879,
1812,
3937,
3263,
378,
2198,
6096,
3626,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
6857,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
4771,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
... | Validation |
6,265 | 5 | Frame_check_sequence:frame check sequence frame check sequence fcs refers error-detecting code added frame communications protocol frames used send payload data source destination frames bits bytes fields contained within susceptible errors variety sources fcs field contains number calculated source node based data frame number added end frame sent destination node receives frame fcs number recalculated compared fcs number included frame two numbers different error assumed frame discarded fcs provides error detection error recovery must performed separate means ethernet example specifies damaged frame discarded specify action cause frame retransmitted protocols notably transmission control protocol tcp notice data loss initiate retransmission error recovery fcs often transmitted way receiver compute running sum entire frame together trailing fcs expecting see fixed result zero correct ethernet ieee 802 protocols fixed result also known magic number crc32 residue 0xc704dd7b transmitted used way fcs generally appears immediately frame-ending delimiter far popular fcs algorithm cyclic redundancy check crc used ethernet ieee 802 protocols 32 bits x.25 16 32 bits hdlc 16 32 bits frame relay 16 bits point-to-point protocol ppp 16 32 bits data link layer protocols protocols internet protocol suite tend use checksums | [
2062,
2967,
7637,
5485,
5880,
4783,
5492,
3855,
3207
] | Test |
6,266 | 9 | String_interpolation:string interpolation computer programming string interpolation variable interpolation variable substitution variable expansion process evaluating string literal containing one placeholders yielding result placeholders replaced corresponding values form simple template processing formal terms form quasi-quotation logic substitution interpretation string interpolation allows easier intuitive string formatting content-specification compared string concatenation string interpolation common many programming languages make heavy use string representations data apache groovy kotlin perl php python ruby scala swift tcl unix shells two modes literal expression usually offered one interpolation enabled without termed raw string placeholders usually represented bare named sigil typically codice_1 codice_2 e.g codice_3 codice_4 expansion string usually occurs run time languages offer string interpolation instead offering standard function one parameter printf format string provide values placeholder ruby uses codice_5 symbol interpolation allows interpolating expression variables languages may support advanced interpolation special formatting function codice_6 first argument format specifies pattern remaining arguments substituted two main types expand variable algorithms variable interpolation string interpolation like string concatenation may lead security problems user input data improperly escaped filtered system exposed sql injection script injection xml external entity injection xxe cross-site scripting xss attacks sql injection example codice_7 replaced codice_8 executing query wipe data table following perl code works identically php produces output codice_9 output output output coldfusion markup language cfml script syntax tag syntax output output output groovy interpolated strings known gstrings output output java support direct string interpolation versions 5 static method codice_10 used interpolation javascript ecmascript 2015 es6 standard supports string interpolation using backticks codice_11 feature called template literals example output output also supports advanced formatting features output output output output output output rust provides string interpolation via std :fmt module interfaced various macros format write print macros converted rust source code compile-time whereby argument interacts formatter formatter supports positional parameters named parameters argument types defining various formatting traits let apples bananas 4 3 println apples bananas apples bananas output scala 2.10+ implemented following string interpolators f raw also possible write custom ones override standard ones f interpolator compiler macro rewrites format string embedded expressions invocation string.format verifies format string well-formed well-typed scala 2.10+ string interpolation allows embedding variable references directly processed string literals example output sciter function name starting considered interpolating function interpolation customizable context sensitive gets compiled swift new string value created mix constants variables literals expressions including values inside string literal item inserted string literal wrapped pair parentheses prefixed backslash output tool command language always supported string interpolation quote-delimited strings output order actually format simply replace values formatting function version 1.4 typescript supports string interpolation using backticks codice_11 example output codice_13 function used codice_6 function example rewritten thusly output remains visual basic 14 string interpolation supported visual basic print hello tom | [
623,
2451,
5983,
6172,
6428,
831,
486,
4425,
6029,
5506,
5965,
7687,
2619,
5091
] | Test |
6,267 | 2 | CB_UNIX:cb unix columbus unix cb unix discontinued variant unix operating system used internally bell labs administrative databases transaction processing developed columbus ohio branch based v6 v7 pwb unix little-known outside company cb unix developed address deficiencies inherent research unix notably lack interprocess communication ipc file locking considered essential database management system several bell system operation support system products based cb unix switching control center system primary innovations power-fail restart line disciplines terminal types ipc features interprocess communication features developed cb unix message queues semaphores shared memory support eventually appeared mainstream unix systems starting system v 1983 collectively known system v ipc | [
4751,
4478,
1630,
900,
2467,
5216,
2294,
5571,
2300,
2118,
6360,
578,
6367,
1493,
1776,
4447,
6577,
1426,
443,
1435
] | Test |
6,268 | 7 | OpenMosix:openmosix openmosix free cluster management system provided single-system image ssi capabilities e.g automatic work distribution among nodes allowed program processes threads migrate machines node network would able run process faster process migration particularly useful running parallel applications low moderate input/output i/o released linux kernel patch also available specialized live cds openmosix development halted developers linuxpmi project continuing development former openmosix code openmosix originally forked mosix moshe bar february 10 2002 mosix became proprietary software openmosix considered stable linux kernel 2.4.x x86 architecture porting linux 2.6 kernel remained alpha stage support 64-bit amd64 architecture started 2.6 version july 15 2007 bar announced openmosix project would reach end life march 1 2008 due decreasing need ssi clustering low-cost multi-core processors increase availability openmosix used distributed gentoo linux kernel choice removed gentoo linux portage tree february 2007 march 1 2008 openmosix read-only source code still hosted sourceforge linuxpmi project continuing development former openmosix code clusterknoppix specialized linux distribution based knoppix distribution uses openmosix kernel traditionally clustered computing could achieved setting individual rsh keys creating nfs shares editing host files setting static ips applying kernel patches manually clusterknoppix effectively renders work unnecessary distribution contains autoconfiguration system new clusterknoppix-running computers attached network automatically join cluster clusterknoppix modified knoppix distro using openmosix kernel linux live cds openmosix include | [
5200,
1629,
3444,
7251,
6984,
474,
7075,
3366,
1941,
7453,
578,
314,
2758,
6205,
1663,
2864,
3559,
6209,
2688,
6761,
5605,
2063,
343,
4824,
5523,
7587,
5259,
1893,
5530,
5704,
6317,
352,
3751,
83,
2168,
7954,
6244,
788
] | Test |
6,269 | 9 | Mike_McMahon_(computer_scientist):mike mcmahon computer scientist mike mcmahon programmer mit computer science artificial intelligence laboratory 1970s worked richard stallman emacs also wrote eine first implementation emacs lisp machines daniel weinreb eine stands eine emacs eine later became zwei meaning zwei eine initially one founders symbolics inc. company developing selling lisp machines 1980s 1990s mike mcmahon co-developed new error system symbolics main inspiration common lisp condition system mike mcmahon designed implemented new window system mit lisp machine 1980 together howard cannon window system implemented using flavors object-oriented extension lisp machine lisp | [
5501,
6875,
1445,
2600,
3976
] | Validation |
6,270 | 8 | Oracle_iPlanet_Web_Server:oracle iplanet web server oracle iplanet web server oiws web server designed medium large business applications oracle iplanet web server builds earlier sun java system web server sun one web server iplanet web server netscape enterprise server products oracle iplanet web server available solaris windows hp-ux aix gnu/linux supports jsp java servlet technologies php nsapi cgi coldfusion netscape enterprise server web server developed originally netscape communications corporation 1996 based 1994 release netsite product renamed sun java system web server reflecting product acquisition sun microsystems oracle acquired sun 2010 oracle iplanet web server january 2009 sun open sourced core components sun java system web server 7.0 bsd license open web server open source version kept sync commercial releases january 2010 7.0 update 8 since oracle acquisition sun open source releases 2010 oracle renamed product sun java system web server oracle iplanet web server although documentation links still process updated reflect | [
5369,
1834,
7535,
26,
7544,
1105,
4701,
6458,
417,
418,
2958,
7213,
6489,
7952,
6505,
4755,
4759,
1923,
5820,
2646,
2291,
6184,
1185,
6536,
2299,
7988,
4418,
4427,
1223,
3408,
1602,
6586,
5882,
1254,
1258,
5206,
900,
5214,
6270,
908,
55... | Test |
6,271 | 9 | Event_bubbling:event bubbling event bubbling type event propagation event first triggers innermost target element successively triggers ancestors parents target element nesting hierarchy till reaches outermost dom element document object provided handler initialized one way events handled browser events actions done user button click changing field etc event handlers used perform methods according event occurred e.g steps need done button clicked webpage completes loading etc consider dom structure 3 elements nested following order element 1 div element 2 span element 3 button whose on-click handlers handler1 handler2 handler3 respectively button clicked event handler element 3 triggered first event bubbles handler immediate parent element element 2 called followed handler element 1 till reaches outermost dom element event handling order handler3 handler2 handler1 innermost element event triggered called target element browsers consider event bubbling default way event propagation however another approach event propagation known event capturing direct opposite event bubbling event handling starts outermost element document dom structure goes way target element executing target element handler last order event handlers consider event bubbling default way event handling user manually select way propagation specifying last parameter addeventlistener element javascript capturemode false event handled using event bubbling capturemode true event handled using event capturing user ’ specify value capturemode argument default considered event bubbling.most browser support event bubbling event capturing except ie 9 opera 7.0 support event capturing javascript also provides event property called bubbles check whether event bubbling event returns boolean value true false depending whether event bubble parent elements dom structure isbubblepossible true event bubble ancestors isbubblepossible false event bubble handle cases one event one handler event bubbling concept implemented.the major use event bubbling registration default functions present program recent times many developers use event capturing bubbling particular necessary implement event bubbling may become complicated users keep track actions getting executed event since browsers default support event bubbling sometimes useful stop event bubbling user might get confused single trigger one element lead multiple triggers ancestors simple individual requirement user wants one event one element another another bubbling event necessity stop event bubbling user use following approaches 1 stoppropagation method stops propagation particular event parents invoking event handler target element although supported w3c compliant browsers method ’ work internet explorer version 9 lesser ie 9 stop bubbling using following code w3c compliant browsers 2 stopimmediatepropagation method stop propagation also stops handler target event executing dom multiple handlers event independent stopping execution one event handler generally ’ affect handlers target stopimmediatepropagation method prevents execution handler target w3c compliant browsers another approach stop event bubbling cancelling event preventdefault return false .but prevents target handler execution well therefore advisable use aim prevent event bubbling user still wants actions associated target element | [] | Test |
6,272 | 4 | Factory_reset:factory reset factory reset also known master reset software restore electronic device original system state erasing information stored device attempt restore device original manufacturer settings effectively erase data settings applications previously device often done fix issue device could also done restore device original settings electronic devices include smartphones since factory reset entails deleting information stored device essentially concept reformatting hard drive pre-installed applications data card storage card microsd card erased factory reset performed caution effectively destroys data stored unit factory resets fix many chronic performance issues freezing remove device operating system factory resets achieved variety ways depending electronic device devices could done going device service menu devices may require complete re-installation software following section lists common electronic devices factory reset computer factory resets restore computer computer original operating system delete user data stored computer microsoft windows 8 windows 10 apple macos options android devices factory data reset option settings appear erase device data reset settings method typically used device issue fixed using methods owner wants destroy personal data selling device performing study avast reported data recoverable using fairly generic publicly available forensics software factory data reset option effect knox flag reset device original factory settings way return device state compatible manufacturer warranty data sim card microsd card erased device modded custom recovery twrp able custom install custom roms sure back data well stock rom necessary many devices restored factory settings like televisions gps units tablets many electronic devices menu tools settings called service menu service menu commonly includes tool performs factory reset tool common devices displays television sets computer monitors menus usually accessed sequence button presses | [
1020,
2813,
7790,
3511,
5150,
5571,
8191,
4957,
6327,
7110,
5264,
740,
4536
] | Test |
6,273 | 4 | Cyber_Intelligence_House:cyber intelligence house cyber intelligence house formerly kinkayo singapore-based cyber intelligence agency specializes cyber exposure company detects monitors cyber exposure via dark web deep web data breaches alert individuals businesses potential cyber threats cyber exposure index cei company research-driven project world first proprietary global scoring system calculates exposure index listed companies based exposed credentials hacker-group activity leaked sensitive information cei sort cyber risk score given public companies listed stock exchanges hosted 11 countries australia finland germany hong kong indonesia italy south africa uk usa malaysia singapore cei scores 6,000 listed companies levels exposure analysing data collected company publicly available sources dark web deep web published data breaches companies evaluated given score ranging 0 300+ 0 indicating exposure past 12 months 300+ indicating company represent top 10 exposed companies globally index first launched october 2017 results concluded publicly listed companies australia hong kong singapore least exposed cyber threats october 2018 results updated singapore malaysia indonesia earmarked least exposed countries world also led speculation cyber threat exposure location centric asia pacific firms tend lower exposure american eu counterparts cei faced negative press south africa ranked 3rd exposed country october 2017 south african banking risk information centre sabric speculated research findings may cause unnecessary fear uncertainty doubt hacked cyber exposure monitoring app individuals launched june 2018 company aim android application alert people whenever sensitive information compromised provides free e-mail account monitoring however premium plan subscription users monitor credit cards usernames id numbers physical addresses well | [
860,
1972
] | Validation |
6,274 | 8 | Halalgoogling:halalgoogling halalgoogling islamic internet search engine holy month ramadan halalgoogling used block content deemed haram sharia law collects results web search engines google bing presents halal results users | [
5965,
1435,
518
] | Validation |
6,275 | 9 | Compilers:_Principles,_Techniques,_and_Tools:compilers principles techniques tools compilers principles techniques tools computer science textbook alfred v. aho monica s. lam ravi sethi jeffrey d. ullman compiler construction first published 1986 widely regarded classic definitive compiler technology text affectionately known dragon book generations computer scientists cover depicts knight dragon battle metaphor conquering complexity name also refer aho ullman older principles compiler design first edition 1986 informally called red dragon book distinguish second edition aho ullman ’ 1977 principles compiler design sometimes known green dragon book topics covered first edition include following tradition two predecessors second edition 2006 features dragon knight cover informally known purple dragon monica s. lam stanford university became co-author edition second edition includes several additional topics including | [
1361,
1616,
1997,
3931,
1114,
2455,
1446,
2420,
8097,
3816,
1854
] | Test |
6,276 | 3 | Protocol_converter:protocol converter protocol converter device used convert standard proprietary protocol one device protocol suitable device tools achieve interoperability protocols software installed routers convert data formats data rate protocols one network protocols network data navigating varieties protocols used different fields like power generation transmission distribution oil gas automation utilities remote monitoring applications major protocol translation messages involve conversion data messages events commands time synchronization general architecture protocol converter includes internal master protocol communicating external slave devices data collected used update internal database converter external master requests data internal slave collects data database send external master different schemes handling spontaneous reporting events commands different physical medium communication protocol-x include rs-232 rs-485 ethernet etc protocol converter applications vary industry industry protocol converter software converter hardware converter integrated converter depending protocols major protocols used area application listed list automation protocols protocol converters generally used transforming data commands one device application another necessarily involves transformation data commands representation encoding framing achieve conversion simple complex types conversions depending application domain used simplest commonly used conversion protocol conversion modbus rtu modbus tcp conversion change overall framing hence easy take serial modbus rtu frame encapsulate tcp/udp socket send ethernet since protocol framings except actual physical layer transmission application layers interpret data similarly long communication interfaces made transparent however exist complex conversions example data formatted data types supported object models etc different conversion engine needs make modifications framing mapping information type data command cases object models also might user configurations required defining mapping supported non-supported data types transformations however bring conversion advantages communication delay processing latency overall end end processing time finite needs considered solution designs latency end-to-end communication depends processing delay hardware and/or software used protocol conversion complexity solution architecture latencies vary typical industrial energy automation applications 10—20 milliseconds high 1 second solution architectures using protocol converters need consider latency impact project converters considered also majority architectures would involve configuration mapping require considerable engineering effort engineering time need considered defining project schedules | [
3209,
7637
] | Test |
6,277 | 9 | Comparison_of_Object_Pascal_and_C:comparison object pascal c computer programming languages c object pascal similar times origin influences purposes used design compile compilers early lifetimes c pascal old programming languages original pascal definition appeared 1969 first compiler 1970 first version c appeared 1972 c n't change much time pascal evolved lot nowadays vast majority pascal programming done modern object pascal old procedural pascal old procedural pascal today essentially limited microcontroller programming tools mikropascal object pascal main dialect used tools delphi lazarus ide free pascal documented modern object pascal used free pascal delphi c documented c99 standardized 1999 syntactically object pascal much algol-like c. english keywords retained c uses punctuation symbols — pascal codice_1 codice_2 codice_3 c uses codice_4 codice_5 codice_6 example however c actually algol-like pascal regarding simple declarations retaining type-name variable-name syntax example c accept declarations start block outer block function another subtle difference role semicolon pascal semicolons separate individual statements within compound statement whereas terminate statement c. also syntactically part statement c transforming expression statement difference manifests primarily two situations superfluous semicolon put last line end thereby formally inserting empty statement traditional c codice_9 since c99 also codice_10 object pascal codice_11 codice_12 codice_13 c pascal differ interpretation upper lower case c case sensitive pascal thus codice_14 codice_15 distinct names c identical pascal languages identifiers consist letters digits rule first character may digit c underscore counts letter even _abc valid name names leading underscore often used differentiate special system identifiers c. pascal also accepts character part identifiers difference c. c pascal use keywords words reserved use language examples const goto keywords happen common languages c basic built-in type names also keywords e.g int char combinations keywords e.g unsigned char pascal built-in type names predefined normal identifiers recent object pascal compilers however allow escape keywords feature mainly need directly communication foreign oop systems like com cocoa might use fields methods based pascal keywords c way escape keywords pascal procedure definitions start keywords procedure function type definitions type c function definitions determined syntactical context type definitions use keyword codice_16 languages use mix keywords punctuation definitions complex types instance arrays defined keyword array pascal punctuation c enumerations defined keyword codice_17 c punctuation pascal pascal functions begin end delimit block statements proper c functions use delimit block statements optionally preceded declarations c prior c99 strictly defines declarations must occur statements within particular block allows blocks appear within blocks way go around pascal strict declarations must occur statements allows definitions types functions variable declarations encapsulated function definitions level depth grammars languages similar size implementation perspective main difference two languages parse c necessary access symbol table types pascal one construct assignment instance c fragment codice_18 could declaration codice_19 object whose type pointer codice_20 statement-expression multiplies codice_20 codice_19 corresponding pascal fragment codice_23 unambiguous without symbol table pascal requires variable function declarations specify type explicitly traditional c type name may omitted contexts default type codice_24 corresponds codice_25 pascal implicitly assumed however defaults considered bad practice c often flagged warnings c accommodates different sizes signed unsigned modes integers using modifiers codice_26 codice_27 codice_28 codice_29 etc exact meaning resulting integer type machine-dependent however guaranteed codice_30 shorter codice_24 codice_24 shorter codice_33 however c standard least minimal sizes types specified guarantees codice_34 single byte codice_24 least two bytes pascal similar end performed declaring subrange integer compiler may choose allocate smaller amount storage declared variable subrange feature supported c. major subtle difference c pascal promote integer operations pascal operations integers integer subranges effect operands promoted full integer c defined rules promote different types integers typically resultant type operation two integers precision greater equal precisions operands make machine code generated c efficient many processors highly optimizing pascal compiler reduce eliminate effect standard pascal rules pre-standard implementation c well small-c et al allowed integer pointer types relatively freely intermixed c character type codice_34 kind integer longer codice_33 expressions codice_38 therefore perfectly legal declarations codice_39 codice_40 integer nature codice_34 eight-bit byte machines clearly illustrated declarations whether codice_34 type regarded codice_28 codice_29 default implementation pascal characters integers distinct types inbuilt compiler functions codice_45 codice_46 used typecast single characters corresponding integer value character set use vice versa e.g systems using ascii character set codice_47 codice_48 tab character addition codice_49 type object pascal also codice_50 represent unicode characters c usually implemented macro codice_16 name codice_52 simply alias codice_24 pascal boolean enumerated type possible values boolean false true ordinal value false=0 true=1 values undefined conversion integer ord used standard function integer boolean however conversion simple practice c binary valued relational operators == may regarded boolean sense always give results either zero one tests || etc performed zero-checks false represented zero true represented value interface com object pascal added codice_54 codice_55 codice_56 type whose size respects prefix follow c truth table free pascal added proper pascal boolean types size suffix codice_57 interface glib uses codice_58 32-bit boolean type pascal truth table c programmer may sometimes use bitwise operators perform boolean operations care needs taken semantics different operands make use one bit represent value pascal another abstract high level method dealing bitwise data sets sets allow programmer set clear intersect unite bitwise data values rather using direct bitwise operators example pascal c although bit operations integers operations sets considered similar sets implemented using bits direct parallel uses unless non-standard conversion integers sets possible pascal could also bitwise operations exactly way c use codice_1 codice_2 codice_61 codice_62 operators operators normally work booleans operands integers behave bitwise operators made possible boolean integer distinct incompatible types therefore c code could written pascal c string remains pointer first element null-terminated array char 1972 one still use library support codice_63 manipulate strings object pascal many string types new type introduced old one kept backwards compatibility happened twice delphi 2 introduction ansistring delphi 2009 unicodestring besides main string types short- ansi- wide- unicodestring corresponding character types ansichar widechar=unicodechar types derived character type string properties pointer char array char dynamic array char pointer array char etc. object pascal codice_64 compiler-managed type reference-counted i.e. storage management handled compiler accurately runtime code inserted compiler executable string concatenation done codice_65 operator string comparison done standard relational operators case sensitive codice_66 object pascal also provides c-compatible strings type codice_67 manipulation routines defined codice_68 unit moreover object pascal provides wide variety string types convenience plain codice_76 type provided depending compiler switch could mean codice_69 codice_71 codice_74 additional convention used limit number characters given codice_69 otherwise codice_81 codice_82 strings freely intermixed manipulating strings compiler silent conversion required note target string type codice_69 silent truncation might happen due maximum length allowed example c real concept array pseudo construct declare storage multiple variables type arrays c n't know length 're referenced pointer first element 're always 0 based example get array length one calculate codice_84 therefore count length integer array use codice_85 common mistake calculate function expecting array argument despite appearance function accept pointer argument real array therefore inside function array treated plain pointer example common solution problem always pass array length function argument functions expect array argument also provide placeholder length despite treatment pointer pointer style constructs could used array example code would compile fine would cause access violation executed care taken designing code documentation explicitly state prevent users mistake assignment static arrays n't allowed one must use codice_86 function variants copy data arrays pascal array declared using codice_87 keyword specifying lower upper bound base type latter usually defined range type example arrays know upper lower bounds implicitly length bounds passed along function expects array argument functions codice_88 codice_89 codice_90 retrieve lower bound upper bound array length respectively context without explicit cast arrays ca n't wo n't converted pointers compile time error property type-safe programming assignment static arrays allowed assignment copies items source array destination mandatory upper lower bounds compatible source destination somehow 're different one use codice_91 partially copy data however since codice_91 low-level function one must use care programmer responsibility ensure data movement exceeds neither destination source boundary example c language support declaring using dynamic arrays however due pointer dereference syntax dynamic array could implemented memory management functions usually codice_93 example seen length n't maintained automatically reallocation use additional variable protect enough memory error assignment dynamic arrays follows pointer assignment rule object pascal provides language-level support dynamic arrays declared lower upper bound omitted one must call codice_94 function allocate storage dynamic arrays object pascal reference counted one n't worry freeing storage dynamic arrays always zero-based three functions codice_88 codice_89 codice_90 would still retrieve lower bound upper bound array length correctly example assignment dynamic arrays copies reference source array destination real copy required one use codice_98 function example | [
783,
1345,
7333,
4302,
5639,
7970,
993,
109,
4589,
3955,
304,
1842,
4053,
2661,
7005,
7460,
5937,
666,
4164,
1114,
5948,
5855,
7844,
3898,
5510,
2871,
7394,
2881,
3069,
1435
] | Validation |
6,278 | 2 | NDISwrapper:ndiswrapper ndiswrapper free software driver wrapper enables use windows xp network device drivers devices pci cards usb modems routers linux operating systems ndiswrapper works implementing windows kernel ndis apis dynamically linking windows network drivers implementation result works systems based instruction set architectures supported windows namely ia-32 x86-64 native drivers network adapters available linux manufacturers maintain proprietary interfaces write cross-platform drivers ndiswrapper allows use windows drivers available virtually modern pc network adapters three steps creating linux driver installing using ndiswrapper composed two main parts command-line tool used installation time windows subsystem used application calls wi-fi subsystem outcome ndiswrapper installation sort linux driver able work linux applications first action user compile couple windows files ndiswrapper version windows ddk linux kernel module done tool named ndiswrapper resultant linux driver installed often manually os linux application send request linux driver automatically needed adaptations call its—now—internal windows driver ddk achieve compilation ndiswrapper requires least .inf .sys files invariably supplied parts windows driver example driver called mydriver files mydriver.inf mydriver.sys vendorid productid 0000:0000 ndiswrapper installs driver /etc/ndiswrapper/mydriver/ directory contains three files graphical frontends ndiswrapper ndisgtk ndisconfig allow ndiswrapper installed using graphical user interface rather console commands ndiswrapper enables unix-like system use windows drivers type ndis wifi useful time linux wi-fi drivers common wi-fi cards composed ndiswrapper uses windows inf files linux application calls device registered linux ndiswrapper device ndiswrapper determines windows driver targeted converts linux query windows parlance calls windows driver waits result translates linux parlance sends result back linux application possible linux driver ndiswrapper linux driver call windows driver execute address space linux kernel windows driver composed layered drivers example one ethernet one usb upper layer driver called upper layer create new calls irp windows parlance calling mini ntoskrnl mini ntoskrnl must know drivers must registered internal database priori reading windows .inf files | [
1341,
191,
6711,
1356,
1547,
7355,
5571,
8094,
8194,
8096,
1193,
578,
3636,
4059,
8001,
5760,
1119,
594,
5065,
7289,
4441,
6477,
4534,
7029,
5250,
5694,
1315,
1133,
689,
3747,
6402,
2161,
4910,
6860,
1703,
875,
6505
] | Test |
6,279 | 1 | InnoDB:innodb innodb storage engine database management system mysql mysql 5.5 december 2010 later use default replacing myisam provides standard acid-compliant transaction features along foreign key support declarative referential integrity included standard binaries distributed mysql ab exception oem versions innodb became product oracle corporation acquisition finland-based innobase oy october 2005 software dual licensed distributed gnu general public license also licensed parties wishing combine innodb proprietary software innodb supports | [
7957,
5717,
7248,
1262,
1359,
6270,
6184,
1185,
5126,
5571,
6281,
7368,
1105,
4708,
4427,
4167,
3652,
1491,
418,
6755,
1223,
1590,
7213,
4363,
5340,
5780,
6056,
3915,
1695,
5882,
2259,
5706,
3244,
971,
7598,
1435,
7231
] | Test |
6,280 | 9 | Mobile_Service_Architecture:mobile service architecture mobile service architecture msa jsr 248 specification describes end-to-end wireless environment java msa includes full set 16 jsrs subset 8 jsrs msa subset includes following jsrs msa includes msa subset following jsrs | [
3077,
6510,
631,
7347,
484,
4055,
6190,
7459,
4606,
3879,
2422,
686,
2519,
2520,
6319,
2619,
4287
] | Validation |
6,281 | 7 | Oracle_WebCenter:oracle webcenter oracle webcenter oracle portfolio user engagement software products built top jsf-based oracle application development framework three main products make webcenter portfolio purchased together suite individually products separate connected markets webcenter content competes enterprise content management market webcenter sites competes web experience management market webcenter portal competes self-service portal content delivery market space different combinations products frequently used together oracle bundled together within webcenter product family oracle webcenter contains set components building rich web applications portals team collaboration/social sites oracle webcenter targeted enterprise larger accounts significant content management requirements need deliver information internal external portals customer-facing websites within integrated business applications oracle made particular effort integrate webcenter leading business applications e-business suite peoplesoft jd edwards content centrally managed one location shared across multiple applications development community advanced business users webcenter provides development environment includes webcenter framework webcenter services along out-of-the-box application team collaboration enterprise social networking according oracle strategic portal product eventually replacing oracle portal well portal products acquired bea product costs 70000 per cpu webcenter services 125,000 per cpu webcenter suite production installation users expect deploy least 4 cpus base system likely additional cpus development testing webcenter includes embedded us licenses oracle secure enterprise search oracle universal content management oracle bpel process manager addition webcenter needs database store information supported licensed database oracle database ms sql server ibm db2 work three major products webcenter product stack base webcenter framework allows user embed portlets adf taskflows/pages content customizable components oracle adf application framework pieces integrated oracle jdeveloper ide providing access resources webcenter services set independently deployable collaboration services incorporates web 2.0 components content collaboration communication services full list provided webcenter services includes oracle adf user interface components called taskflows embedded directly adf applications addition apis utilized create custom uis integrate services non-adf applications finally webcenter spaces closed source application built webcenter framework services offers prebuilt project collaboration solution compared solutions like microsoft sharepoint atlassian confluence limited mechanisms extend application note product called webcenter interaction built core webcenter stack former plumtree portal product also oracle portal products oracle included webcenter suite umbrella products products included suite regardless whether built adf based webcenter framework webcenter comprises furthermore several editions among others webcenter suite plus webcenter portal webcenter content webcenter sites webcenter sites satellite server distributed caching mechanism stores assembles pagelets elements output webcenter universal content management seven webcenter adapters one wce management available social networking services enables users maximize productivity collaboration shared services provides features social networking personal productivity personal productivity services focuses requirements individual rather group webcenter framework supports following standards 22 february 2012 oracle released webcenter 11g release 1 patch set 5 includes many bug fixes addition several new enhancements patch set mainly targeted releasing customer bug fixes january 2011 oracle released webcenter 11g release 1 patch set 3 converged portal platform major new release many features integrated previously acquired portal products including greatly improved flexible portal framework improved gui personalization server brand new navigation model support hierarchical pages spaces jsr 286 improved performance webcenter framework services lacks support notable technologies | [
7715,
7347,
6270,
6184,
1185,
6279,
7368,
1105,
4427,
418,
2054,
1223,
1590,
4445,
7213,
2519,
5882,
971
] | Test |
6,282 | 1 | Swedish_Open_Cultural_Heritage:swedish open cultural heritage soch swedish open cultural heritage web service used searching retrieving data museum historical environment sectors sweden soch aggregate metadata different central regional local databases order facilitiate applications search present cultural heritage data via open api aim facilitate application developers build applications exploit soch march 2013 +10 different applications built using soch api one first applications built soch mobile phone application displaying ancient monuments map layer number museums also building applications soch order make stuff available online 2012 commercial applications started appear using soch data soch operated developed swedish national heritage board snhb snhb used soch api applications http //www.kringla.nu http //www.platsr.se | [
6986,
2054,
84
] | Test |
6,283 | 0 | Spoken_dialog_systems:spoken dialog systems spoken dialog system computer system able converse human voice two essential components exist written text dialog system speech recognizer text-to-speech module written text dialog systems usually use input systems provided os distinguished command control speech systems respond requests attempt maintain continuity time spoken dialog systems vary complexity directed dialog systems simple require developer create graph typically tree manages task may correspond needs user information access systems typically based forms allow users flexibility example order retrieval constraints specified use optional constraints limited capabilities problem-solving dialog systems may allow human users engage number different activities may include information access plan construction possible execution latter examples systems include pionieers dialogue systems companies like speech recognizer system seventies cselt laboratories led european research projects eighties e.g sundial end darpa project us field spoken dialog systems quite large includes research featured scientific conferences sigdial interspeech large industrial sector meetings speechtek avios following might provide good technical introductions | [
1718,
7372
] | Test |
6,284 | 9 | Cynbe_ru_Taren:cynbe ru taren jeffrey prothero march 15 1956–november 16 2016 american computer programmer author citadel arguably first virtual world system one longest-running open source projects digital anatomist software better known visible human project original pascal strek.pas star trek game program first loglan parsers mythryl production-grade port sml/nj prothero used screenname cynbe ru taren online cynbe ru taren name fictional alien poul anderson 1964 science fiction novel star fox sbn 425-03772-x novel cynbe ru taren aleriona intellect master garden war fleet admiral military strategist grand commission negotiators died november 16 2016 battle colorectal cancer prothero born march 15 1956 london ontario academic parents john jack joyce prothero attended kindergarten ontario first form london england second form cambridge england third grade boston massachusetts fourth twelfth seattle washington prothero lived seattle programming designing virtual worlds 1997 moved austin texas live wife allucquere rosanne stone professor university texas austin beginning 1998 prothero stone divided time santa cruz tahoe city california maintaining residence austin school sessions prothero enrolled university washington 1974 spending time campus computer center learned craft visual techniques laboratory using pdp10 mohawk data 600lpm printer long working full-time programmer department biological structure headed john w. sundsten john prothero wrote skandha visualization system assembled microscopic sections biological material three-dimensional images could manipulated minutely reveal details interior objects human body biological structure department named effort digital anatomist project image database supplied raw digital material wolfgang rauschning swedish researcher microtomy microscopy specialized producing ultrathin tissue cross-sections rauschning method subtractive ablating layer carefully frozen tissue thousand molecules thick coating exposed surface glycerol mixture rauschning adapted specific tissue photographing surface high resolution repeating tissue completely sectioned rauschning sent image via internet digital anatomist database university washington seattle method produced extremely high resolution digital images vivid color almost none distortion would normally caused displacement forces generated action conventional microtome extreme thinness settings sundsten jeffrey prothero john prothero asked rauschning include fiduciaries sections enabled prothero skandha 3d visualization software assemble huge digital database three-dimensional flythrough-capable anatomical images extremely fine grain group made prothero tapes 3d reconstructions freely available website hearing work national library medicine issued call proposals national 3d anatomical reconstruction database would later become visible human project astonishment digital anatomist group found university colorado made strong bid contract using prothero ’ data tapes examples work technically nothing illegal since tapes freely available colorado bid mention provenance colorado contract continued display prothero ’ work without attribution first three years contract although later work based methodology developed digital anatomist project colorado specimen sectioning system involved something rather like bandsaw produced considerably coarser-grained reconstructions shortly afterward chief scientists uw digital anatomist project resigned frustration 1980 prothero completed building second computer heath h89 homebrew power supply silent 700 acoustic coupler began writing code december 14 released first version citadel december 24 first release used phone number connected hardware prothero study first call program citadel instead named ode phone number acronym ode-data later changed odd-data suggestion friends version citadel released december 24 1980 written c fast responsive self-maintaining ran 90kb floppy disc world consisted collection rooms connected “ clues ” since rooms invisible clue included name clued room part clue details citadel room architecture see citadel software page details citadel program architecture see even early stage new social forms enabled citadel system allowed users display aberrant antisocial behavior well-known among virtual world researchers including griefing unresolvable arguments misreadings innocuous remarks resulting flame wars hardware problems finally brought system prothero felt enough peacekeeping wanted concentrate programming consequently passed software system david mitchell friend lived bainbridge island washington far prothero ’ home system mitchell acquired went become canonical citadel april 1982 prothero released citadel v.2.11 c users group mailing list social experiment distribute power broadly v.2.1.1 provided class people neither sysadmins users partial sysadmin powers afford measure accountability actions produced unerasable paper trail v.2.11 also implemented secure database encrypting disc using simple xor hash prothero continued make innovations citadel software moving projects prothero posted citadel source code rcp/m archive network 1990 code cited one longest running open source projects | [] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.