node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,285
9
Lawrence_M._Breed:lawrence m. breed lawrence larry moser breed born july 17 1940 computer scientist artist inventor best known involvement programming language apl undergraduate stanford university 1961 created first computer animation language system used stanford football half-times coordinate images produced 100 ft-by-100 ft array rooters holding colored cards graduate student stanford corresponded apl inventor ken iverson correct formal description ibm system/360 used iverson notation receiving m.s stanford 1965 academic supervisor niklaus wirth joined iverson group ibm thomas j. watson research center yorktown heights new york created first implementation apl philip s. abrams mainframe computer ibm 7090 1965 later created apl implementations experimental ibm little computer ibm 360 1966 ibm 1130 breed 1973 recipient dick lathwell roger moore grace murray hopper award association computing machinery work design implementation apl\360 setting new standards simplicity efficiency reliability response time interactive systems dan dyer others co-founded scientific time sharing corporation 1969 led development apl plus time-sharing system 1972 francis bates iii wrote one world first worldwide email systems named mailbox breed rejoined ibm 1977 helped develop international organization standardization iso apl standard joined ibm efforts port berkeley software distribution bsd unix onto ibm platforms worked compilers programming language c floating-point arithmetic standardization radix conversion retiring 1992 breed became significant contributor burning man festival playa name ember conceived built first trash fence capture windborne debris created spiraling flaming sculpture chaotick built artistic bicycle light effects edited proofread black rock gazette newspaper role continues co-founder director successor black rock beacon burning man materials earth guardian promoted leave trace ethos particularly post-event cleanup 1973 1974 took first place co-solver donna breed dictionary rally associated burning man activities breed devised gray-b-gon evaporator graywater disposal bay area workshops directed construction burning man campers 100 units 2012
[ 7331, 6977, 811, 470, 6263, 1361, 908, 3464, 6367, 2315, 752, 1116, 5322, 851, 1774, 1308, 7758, 5424, 6846, 8137, 3060, 1892, 6064, 356, 1435 ]
Test
6,286
5
FAST_TCP:fast tcp fast tcp also written fasttcp tcp congestion avoidance algorithm especially targeted long-distance high latency links developed netlab california institute technology commercialized fastsoft fastsoft acquired akamai technologies 2012 fasttcp compatible existing tcp algorithms requiring modification computer sending data name fast recursive acronym fast aqm scalable tcp aqm stands active queue management tcp stands transmission control protocol role congestion control moderate rate data transmitted according capacity network rate users transmitting like tcp vegas fast tcp uses queueing delay instead loss probability congestion signal current congestion control algorithms detect congestion slow discover packets dropped average sending rate depends loss probability two drawbacks first low loss probabilities required sustain high data rates case tcp reno low loss probabilities required even new congestion avoidance algorithms h-tcp bic tcp hstcp require loss rates lower provided wireless wide area networks moreover packet loss provides single bit information congestion level whereas delay continuous quantity principle provides information network fast tcp flow seeks maintain constant number packets queues throughout network number packets queues estimated measuring difference observed round trip time rtt base rtt defined round trip time queueing base rtt estimated minimum observed rtt connection packets queued sending rate increased many queued rate decreased respect direct descendant tcp vegas difference tcp vegas fast tcp lies way rate adjusted number packets stored small large tcp vegas makes fixed size adjustments rate independent far current rate target rate fast tcp makes larger steps system equilibrium smaller steps near equilibrium improves speed convergence stability delay-based algorithms principle maintain constant window size avoiding oscillations inherent loss-based algorithms however also detect congestion earlier loss-based algorithms since delay corresponds partially filled buffers loss results totally filled buffers either strength weakness protocol used network delay-based inefficiency loss avoided however loss-based delay-based protocols share network delay-based algorithms tend less aggressive overcome suitable choice parameters leading complex interactions studied tang et al delay measurements also subject jitter result operating system scheduling bus contention whether strengths weaknesses prevail clear depends large part particular scenario propagation delay used fast window control algorithm clean network queueing delay maintained existing fast flows may mistaken part propagation delay new flows join later shown ns-2 simulations effect estimation error equivalent modifying underlying utility functions favor new flows existing flows method eliminate error suggested fast tcp shown promising terms system stability throughput fairness however requires buffering increases linearly number flows bottlenecked link paper proposes new tcp algorithm extends fast tcp achieve α n -proportional fairness steady state yielding buffer requirements grow nth power number flows authors call new algorithm generalized fast tcp prove stability case single bottleneck link homogeneous sources absence feedback delay simulation results verify new scheme stable presence feedback delay buffering requirements made scale significantly better standard fast tcp unlike tcp congestion avoidance algorithms fast tcp protected several patents instead seeking standardization ietf inventors fast notably steven h. low cheng jin seeking commercialize company fastsoft currently fastsoft sells 1-unit rack appliance deployed sender-side software hardware modifications needed either end
[ 7061, 7637, 5571, 79, 2077, 4058, 4561 ]
Validation
6,287
9
Unit_generator:unit generator unit generators ugens basic formal units many music-n-style computer music programming languages sometimes called opcodes particularly csound though expression accurate machine-level instructions unit generators form building blocks designing synthesis signal processing algorithms software example simple unit generator called osc could generate sinusoidal waveform specific frequency given input argument function class represents unit generator env could unit generator delineates breakpoint function thus env could used drive amplitude envelope oscillator osc equation osc*env unit generators often use predefined arrays values functions filled waveforms shapes calling specific generator function unit generator theory sound synthesis first developed implemented max mathews colleagues bell labs 1950s supercollider language .ar method sinosc class ugen generates sine wave example makes sine wave frequency 440 phase 0 amplitude 0.5
[ 6408, 5260, 6238, 263, 4853, 556, 1803, 5266 ]
Test
6,288
4
Twinge_attack:twinge attack internet-based computer-networking twinge attack flood false icmp packets attempt cripple system attack spoofed random fake internet source addresses used makes difficult identify attacker idea attack either degrade performance attacked computer make crash attacking program called twinge icmp packets particular signature gives identity away long computer safely behind router firewall nothing worry attack attack used compromise system steal information simply annoyance easy way avoid attack set router firewall ignore icmp ping packets internet
[ 2944, 6062, 3775 ]
Test
6,289
4
Backup_software:backup software backup software computer programs used perform backup create supplementary exact copies files databases entire computers programs may later use supplementary copies restore original contents event data loss hence 're useful users several features backup software make effective backing data voluming allows ability compress split backup data separate parts storage smaller removable media cds often used cds easy transport off-site inexpensive compared hard drives servers however recent increase hard drive capacity decrease drive cost made voluming far less popular solution introduction small portable durable usb drives increase broadband capacity provided easier secure methods transporting backup data off-site since hard drive space cost compressing data reduce size allowing less drive space used save money many backup solutions offer plug-in access exclusive use locked files backup solutions generally support differential backups incremental backups addition full backups material newer changed compared backed data actually backed effect increase significantly speed backup process slow networks decreasing space requirements backup schedules usually supported reduce maintenance backup tool increase reliability backups prevent data theft backup software offers cryptography features protect backup prevent loss previously backed data backup backup software e.g areca backup argentum backup offer transaction mechanism commit rollback management critical processes backups merges guarantee backups integrity
[ 2452, 6606, 891, 4581, 1630, 8070, 4398, 5380, 2390, 5382, 2566, 3109, 3711, 660, 3551, 3720, 6917, 2949, 6832, 1397, 2682, 1310, 8029, 7939, 2157, 8143, 6859, 7046, 4464, 6962 ]
Validation
6,290
3
Winter_Games:winter games winter games sports video game developed epyx released europe u.s. gold based sports featured winter olympic games snow-and-ice themed follow-up highly successful summer games winter games released 1985 commodore 64 later ported several popular home computers video game consoles 1980s game presented virtual multi-sport carnival called epyx winter games official ioc licensing place 8 players choosing country represent taking turns competing various events try medal events available vary slightly depending platform include following game allowed compete events sequentially choose events choose one event practice event winter games ported amiga apple ii atari st apple macintosh apple ii amstrad cpc zx spectrum dos computer platforms atari 2600 atari 7800 nintendo entertainment system family computer disk system video game consoles 2004 featured one games c64 direct-to-tv virtual console version released europe february 20 2009 winter games epyx best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info rated winter games four-plus stars five stating event good enough sold separately concluding sports simulation best 1985 zzap 64 gave 94 game calling another classic sport simulation epyx lemon64 website users given average vote 8.6 places game top 20 list site game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 3½ 5 stars spectrum version topped charts month april however nes famicom disk system versions critically panned unresponsive controls abysmal music poor graphics
[ 5827, 6380, 63 ]
Test
6,291
3
TEST_(x86_instruction):test x86 instruction x86 assembly language codice_1 instruction performs bitwise two operands flags codice_2 codice_3 codice_4 modified result discarded codice_5 codice_6 flags set codice_7 codice_8 flag undefined 9 different opcodes test instruction depending type size operands compare 8-bit 16-bit 32-bit 64-bit values also compare registers immediate values register indirect values test operation sets flags codice_6 codice_5 zero codice_2 set significant bit result result codice_7 codice_3 set codice_14 otherwise set codice_7 parity flag set bitwise xnor least significant byte result codice_14 number ones byte even codice_7 otherwise value codice_8 undefined
[ 4611, 5680, 263, 1335 ]
Train
6,292
8
Web_Compatibility_Test_for_Mobile_Browsers:web compatibility test mobile browsers web compatibility test mobile browsers often mobile acid test test page published promoted world wide web consortium w3c expose web page rendering flaws mobile web browsers applications render html developed spirit acid test web standards project test relevant parts mobile browser need support test uses parts javascript test different technologies browser accomplish 16 different subtest indicated 4 x 4 raster squares mobile acid test tests variety web standards published world wide web consortium internet engineering task force specifically mobile acid test tests
[ 296, 2451, 6452, 3219, 1496, 87, 3383 ]
Test
6,293
2
System_Management_Interface_Tool:system management interface tool system management interface tool smit menu-based management tool ibm aix operating system allows user navigate menu hierarchy commands rather using command line
[ 630 ]
Train
6,294
2
Xbox_One_system_software:xbox one system software xbox one system software sometimes called xbox os operating system eighth-generation home video game console xbox one microsoft windows-based operating system using hyper-v virtual machine monitor contains separate operating systems games applications run console located internal hdd day-to-day usage also duplicated internal nand storage console recovery purposes factory reset functionality xbox one allows users download applications add functionality dashboard june 2014 onwards entertainment apps longer required user signed valid xbox live gold account order use features advertised given app since launch microsoft updating os monthly updates downloaded xbox live service directly xbox one subsequently installed using offline recovery images downloaded via pc november 2015 major system update known new xbox one experience released brought significant changes design functionality system windows 10-based core replaced windows 8-based one update new system sometimes referred windows 10 xbox one xbox one console runs operating system includes windows 10 core although initially included windows 8 core xbox one release xbox one system software contains heavily modified hyper-v hypervisor known nanovisor host os two partitions one partitions exclusive partition custom virtual machine vm games partition shared partition custom vm running multiple apps shared partition contained windows 8 core launch november 2015 via system update known new xbox one experience upgraded windows 10 core windows 10 universal windows platform apps became available xbox one according current head microsoft gaming division phil spencer importance entertainment games windows ecosystem become really prevalent company program microsoft launched allows developers build single app run wide variety devices including personal computers xbox one video game consoles according polygon microsoft removed distinction xbox one windows pc starting february 2014 microsoft invited select users join preview program enables receive early builds upcoming system updates experiment features prior public launch software registered xbox one preview program participants test early features included update provide feedback private forum opt future waves xbox feedback website microsoft soliciting input consumers features taking requests future additions console low battery notifications blu-ray 3d support two examples ideas among top vote-getters site xbox one system software interface uses geometrical placement squares rectangular items scrolls continuous horizontal line using metro design language also seen windows 8 windows 10 microsoft products dashboard divided home community oneguide store sections home section contains recent apps games list shortcuts pinned apps games community section allows users view friends in-game activities captures post status updates well view trending content oneguide section aggregates television online video content store section serves portal games video music app marketplaces general top level menu xbox one feels lot less cluttered xbox 360 dashboard example friends tab removed replaced dedicated app users load see connections couple columns settings options area pinned favorites main screen showing current recent apps games user played used small new section highlighting recently added content total interface clean sparse microsoft also introduced new way multitask called snap allows xbox one users open multiple panes single window microsoft upgraded windows 8-based core windows 10-based one made tour new user interface xbox wire promising faster easier navigation improved community features return xbox avatars main feature home screen list recently played games selecting given title give users information announcements achievements social activity forth also focused actual games playing part parcel company ’ new direction phil spencer current head microsoft xbox division like video game consoles xbox one primarily designed playing games game console entertainment hub games television music videos mainly console focuses functionality entertainment whole gamescom 2014 microsoft unveiled new plan remedy make earnest xbox one ’ label all-in-one entertainment solution way expanding media support xbox one media player quite similar xbox 360 playback suite terms form function however newer console supports 30 formats including mkv container gif files xbox one console also unique things example owners control television broadcasts using device well use functioning dvr apart streaming music videos via play charms devices play also networked approach two primary ways first stream media computer tablet second play directly usb flash drive advantage method play system users wherever sit via xbox one instead sending video pc console aside multimedia files xbox one plays cds dvds blu-ray discs also comes dlna mkv support means downloaded video files streamed via pc transported via external hard drive usbs meanwhile interactive tv guide allows users turn control television voice furthermore system comes comprehensive range applications related multimedia features united states video channels include example amazon instant video crackle hulu plus netflix microsoft announced xbox one awarded multimedia capabilities 66th annual technology engineering emmy awards early 2015 prize given xbox one television-on-demand functions xbox one backward compatible either original xbox xbox 360 console launch microsoft admitted attempts use cloud streaming allow xbox 360 games played xbox one proved problematic however e3 press conference june 15 2015 microsoft announced plans introduce xbox 360 backward compatibility using software method xbox one supported xbox 360 games supposed run within software emulator provided updated system software implementing hardware software xbox 360 xbox one recording broadcasting features supported along xbox 360 multiplayer achievements cloud save access unlike xbox 360 emulation original xbox games specifically patched need repackaged xbox one format users digitally-purchased games automatically appear library download available games physical media executed directly disc inserting disc initiates download repackaged version xbox one titles disc must inserted play validation purposes least 100 xbox 360 games officially supported available feature public launch alongside november 2015 new xbox one experience system update xbox one preview program members received early access limited number titles upon announcement microsoft expected number supported games increase significantly time xbox 360 games supported—this explicitly includes games require kinect access usb peripherals xbox division head phil spencer stated idea possibly adding support games original xbox silly xbox division focusing xbox 360 compatibility first june 11 2017 microsoft announced would backwards compatibility original xbox june 10 2019 microsoft announced wound bring addition new titles program order focus backward compatibility efforts project scarlett 2016 build conference announced xbox one consoles could updated include development kit universal windows applications xbox one official support platform cortana coming summer 2016 along introducing improvements fixes native console apps software monthly updates xbox one system software introduce major features voted requested community though months included one update starting february 2014 beta releases updates tested going live check unwanted bugs stability day console launch 2013 system update released remove controversial always-online drm announced electronic entertainment expo 2013 drm would required xbox one connect internet least every twenty-four hours else games would cease function wave backlash gamers press alike microsoft forced reverse policies regarding early users go online least receive patch february 2014 update introduced ability see much hard disk space available also introduced support usb keyboards enabling users plug keyboard console thus eliminating need use on-screen keyboard year later july 2015 phil spencer head xbox team vowed mouse support would added sometime future part cross-platform gameplay windows 10 devices xbox one console march 2014 update added support video output 50 frames per second rather 60 allowing smoother video 50 hz displays common europe united states refresh rates screens higher 60 hz europe june 2014 support added external hard drives 256 gigabytes allowing two connected console time via usb 3.0 part july 2014 update consoles could better understand voice commands spoken different accents dialects english german month later purchases official xbox website smartglass app enabled allowing easier content purchasing october 2014 update media player app added support many formats codecs including matroska container well dlna streaming networked devices march 2015 new screenshot feature added console along tile transparency allowing owners share game screenshots online use one menu background april 2015 due criticisms power consumption needed instant-on feature system update prompted users select instant-on energy saving mode instant-on enabled default u.s. drawing criticism natural resources defense council electronic entertainment expo 2015 june microsoft discussed three major features later came xbox one consoles november 2015 windows 10 streaming xbox 360 backward compatibility interface redesign known new xbox one experience advance public release windows 10 july 2015 update let users stream games xbox one device running windows 10 feature announced january 2015 service streams one device time february 2016 update slew new features became available example global leaderboards game ability hide unused expired beta games demos user game collection february 2016 update allowed users rearrange customized 'pins via controller whereas previously users use xbox one smartglass application use feature march 2016 update builds features introduced february 2016 update new features included march 2016 update ability purchase xbox 360 compatible games xbox one party chat broadcasting twitch streams customizable dvr recording lengths means owners record clip 5 minutes long improvements included ability track achievement progress xbox one guide video playback xbox one activity feed ability 16 people party chat ability track xbox 360 achievements xbox one activity feed improvements march 2016 update include ability launch web links youtube videos directly game hubs ability user compare avatars friends additionally update also introduces ability factory reset console without deleting installed games applications june 6 2016 first preview update windows 10 anniversary update made available participants preview program included many new features enhancements software build 14352 one first builds introduce cortana main aim help users undertake certain tasks setting party using voice commands unlike older kinect voice commands cortana gives users audio feedback commands similar pc windows mobile versions update also included refreshed design xbox store cementing relationship xbox one windows 10 pcs well redesigned 'my games apps interface includes vertical design rather older horizontal design 'my games apps interface build 14352 also gives user information downloading games apps percentage completed current download size total download size current download speed june 2016 update also includes new 'facebook friend finder allows users find add friends facebook xbox live final release public published july 30 2016 coincide release windows 10 anniversary update released days later august 2 2016 final release introduced newly redesigned universal store well integration universal windows platform march 29 2017 update released public known creators update coincide pc version released weeks later april 6 2017 released xbox insiders late february 2017 testing evaluation creators update featured number updates including refreshed homepage design new guide design new video screenshot capture controls well new game streaming service called beam accessibility also improved new feature called microsoft co-pilot allows users physical impairments 'hook second controller allow friend assist controls tapping xbox guide button longer takes user back home screen instead opens guide represents significant design paradigm shift compared older releases october 16 2017 fall update released major changes include ui overhaul using microsoft fluent design system modular home menu faster dashboard content transfer feature support usb webcams new guide menu improvements game dvr several miscellaneous functionality interface tweaks april 24 2018 april xbox update released changes include new video features auto low-latency mode support variable refresh rate output amd radeon freesync freesync 2 compatible displays addition xbox one x xbox one support output 2560 x 1440 1440p resolution games media improvements mixer share controller option start mixer broadcasts anywhere xbox one share captured screenshots clips directly twitter several audio improvements community tournaments available directly game hubs supported games club feeds also gained new filters may 18 2018 may xbox update released changes include support 120hz refresh rate powerful new enhancement pins called “ groups ” users create multiple collections content made anything within games apps trim recent game captures directly guide improved family settings improvements xbox accessories app several changes button commands throughout dashboard additionally then-forthcoming update added captive portal support console allowing users connect wireless networks requiring authentication commonly used colleges hotels well wireless hotspots provided internet service providers microsoft aims release frequent updates xbox one console mainly containing new improved features faster installation loading times games apps largest november 2015 named new xbox experience update gaming platforms microsoft gaming platforms generation gaming platforms seventh generation
[ 4293, 7514, 2550, 7172, 3958, 728, 6110, 6839, 424, 5781, 5442, 4377, 786, 6158, 1522, 4751, 4759, 7619, 2283, 5475, 481, 5141, 3028, 134, 7660, 3395, 3039, 522, 5872, 6580, 183, 3076, 8054, 3081, 6256, 7715, 8073, 8076, 5213, 5563, 273...
Test
6,295
2
System_Preferences:system preferences system preferences application included macos operating system allows users modify various system settings divided separate preference panes system preferences application introduced first version mac os x replace control panel included classic mac os prior mac os x control panel small application enabled user modify software hardware settings sound volume desktop pattern control panels differ extensions allow user specify options whereas extensions provide user interface setting preferences many software distributions extensions provided functionality corresponding control panel provided configuration options release mac os x 2001 users modified system settings using control panels control panels like preference panes found system preferences separate resources cdevs accessed apple menu control panel rudimentary form system preferences dates back 1983 apple lisa preferences menu item included subset configurable settings called convenience settings well settings adapted according programs devices installed lisa office system original control panels earliest versions classic mac os combined one small desk accessory susan kare designed interface original control panel tried make user-friendly possible design used system 3 separate control panel files cdev added accessible solely control panel debut system 7 control panels separated individual small application-like processes accessible finder sub-menu apple menu provided apple menu options mac os 9 last release mac os mac os x included 32 control panels mac os 9 many control panels rewritten true applications mac os x released preference panes replaced control panels preference panes applications loadable bundles system preferences application similar arrangement used system 6 default system preferences organizes preference panes several categories latest version system preferences included mac os x v10.7 categories personal hardware internet wireless system fifth category appears third-party preference panes installed users also choose sort preference panes alphabetically system preferences originally included customizable toolbar frequently-used preference pane icons could dragged removed mac os x v10.4 replaced static toolbar featured back forward navigation buttons search field apple added new preference panes major features added operating system occasionally merges multiple panes one exposé introduced mac os x v10.3 corresponding preference pane added system preferences replaced single dashboard exposé pane mac os x v10.4 introduced dashboard .mac service replaced mobileme corresponding preference pane also renamed control panels included mac os 9 os x mountain lion 10.8 includes following preference panes os x mountain lion universal access pane changed accessibility speech changed dictation speech
[ 1069, 7517, 2547, 3940, 713, 4690, 734, 1103, 405, 6832, 3989, 2597, 4355, 3322, 768, 1502, 5786, 4740, 1897, 4014, 4749, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 149, 6565, 2329, 3050, 16...
Test
6,296
8
Session_(web_analytics):session web analytics web analytics session visit unit measurement user actions taken within period time regard completion task sessions also used operational analytics provision user-specific recommendations two primary methods used define session time-oriented approaches based continuity user activity navigation-based approaches based continuity chain requested pages definition session varies particularly applied search engines generally session understood consist sequence requests made single end-user visit particular site context search engines sessions query sessions least two definitions session query session may queries made user particular time period may also series queries navigations consistent underlying user need sessions per user used measurement website usage metrics used within research applied web analytics include session length user actions per session session length seen accurate alternative measuring page views reconstructed sessions also used measure total user input including measure number labour hours taken construct wikipedia sessions also used operational analytics data anonymization identifying networking anomalies synthetic workload generation testing servers artificial traffic essential use sessions web analytics able identify known session reconstruction approaches session reconstruction divided two main categories time-oriented navigation-oriented time-oriented approaches session reconstruction look set period user inactivity commonly called inactivity threshold period inactivity reached user assumed left site stopped using browser entirely session ended requests user considered second session common value inactivity threshold 30 minutes sometimes described industry standard argued threshold 30 minutes produces artifacts around naturally long sessions experimented thresholds others simply state time threshold effective identifying sessions one alternative proposed using user-specific thresholds rather single global threshold entire dataset problem assuming thresholds follow bimodal distribution suitable datasets cover long period time navigation-oriented approaches exploit structure websites specifically presence hyperlinks tendency users navigate pages website clicking rather typing full url browser one way identifying sessions looking data build map website user first page identified session actions lasts land page accessed previously-accessed pages takes account backtracking user retrace steps opening new page simpler approach take backtracking account simply require http referer request page already session new session created class heuristics exhibits poor performance websites contain framesets
[ 5430, 4600, 6214, 3999 ]
Test
6,297
8
Google_URL_Shortener:google url shortener google url shortener also known goo.gl discontinued url shortening service offered google launched december 2009 initially used google toolbar feedburner later google launched separate website goo.gl opened public september 2010 user could access list urls shortened past logging google account user could see additional details via details link next shortened url public real-time analytics data including traffic time top referrers visitor profiles could found security google added automatic spam detection based type filtering technology used gmail service accepting new users since april 13 2018 google discontinued service existing users march 30 2019 links previously created still redirect previous destination succeeded firebase dynamic links existing links wo n't become dynamic links automatically
[ 3507, 4116, 5455, 3850, 5372, 7249, 7431, 6176, 993, 7346, 2107, 2475, 831, 5141, 136, 2317, 2673, 8107, 5151, 3309, 7924, 2591, 2683, 855, 4636, 168, 6776, 6950, 6153, 2712 ]
Test
6,298
7
List_of_grid_computing_middleware_distribution:list grid computing middleware distribution grid middleware distribution software stack set cooperating components services protocols enable users access distributed resources grid
[ 2362, 4159, 138, 2721, 5604, 1923, 1878 ]
Test
6,299
3
Harvard_architecture:harvard architecture harvard architecture computer architecture physically separate storage signal pathways instructions data term originated harvard mark relay-based computer stored instructions punched tape 24 bits wide data electro-mechanical counters early machines data storage entirely contained within central processing unit provided access instruction storage data programs needed loaded operator processor could initialize today processors implement separate signal pathways performance reasons actually implement modified harvard architecture support tasks like loading program disk storage data executing harvard architecture need make two memories share characteristics particular word width timing implementation technology memory address structure differ systems instructions pre-programmed tasks stored read-only memory data memory generally requires read-write memory systems much instruction memory data memory instruction addresses wider data addresses system pure von neumann architecture instructions data stored memory instructions fetched data path used fetch data means cpu simultaneously read instruction read write data memory computer using harvard architecture cpu read instruction perform data memory access time even without cache harvard architecture computer thus faster given circuit complexity instruction fetches data access contend single memory pathway also harvard architecture machine distinct code data address spaces instruction address zero data address zero instruction address zero might identify twenty-four-bit value data address zero might indicate eight-bit byte part twenty-four-bit value modified harvard architecture machine much like harvard architecture machine relaxes strict separation instruction data still letting cpu concurrently access two memory buses common modification includes separate instruction data caches backed common address space cpu executes cache acts pure harvard machine accessing backing memory acts like von neumann machine code moved around like data powerful technique modification widespread modern processors arm architecture power isa x86 processors sometimes loosely called harvard architecture overlooking fact actually modified another modification provides pathway instruction memory rom flash memory cpu allow words instruction memory treated read-only data technique used microcontrollers including atmel avr allows constant data text strings function tables accessed without first copied data memory preserving scarce power-hungry data memory read/write variables special machine language instructions provided read data instruction memory instruction memory accessed using peripheral interface distinct instructions embed constant data although individual constants two mechanisms substitute recent years speed cpu grown many times comparison access speed main memory care needs taken reduce number times main memory accessed order maintain performance instance every instruction run cpu requires access memory computer gains nothing increased cpu speed—a problem referred memory bound possible make extremely fast memory practical small amounts memory cost power signal routing reasons solution provide small amount fast memory known cpu cache holds recently accessed data long data cpu needs cache performance much higher cpu get data main memory modern high performance cpu chip designs incorporate aspects harvard von neumann architecture particular split cache version modified harvard architecture common cpu cache memory divided instruction cache data cache harvard architecture used cpu accesses cache case cache miss however data retrieved main memory formally divided separate instruction data sections although may well separate memory controllers used concurrent access ram rom flash memory thus von neumann architecture visible contexts data code come memory controller hardware implementation gains efficiencies harvard architecture cache accesses least main memory accesses addition cpus often write buffers let cpus proceed writes non-cached regions von neumann nature memory visible instructions written data cpu software must ensure caches data instruction write buffer synchronized trying execute just-written instructions principal advantage pure harvard architecture—simultaneous access one memory system—has reduced modified harvard processors using modern cpu cache systems relatively pure harvard architecture machines used mostly applications trade-offs like cost power savings omitting caches outweigh programming penalties featuring distinct code data address spaces even cases common employ special instructions order access program memory though data read-only tables reprogramming processors modified harvard architecture processors
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 7905, 1481, 5055, 2226, 1867, 2248, 2251, 75, 6148, 441, 2266, 5097, 809, 4047, 3365, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 73...
Validation
6,300
9
COLT_(software):colt software colt code orchestra livecoding tool actionscript javascript livecoding tool code orchestra available subscription first version colt released may 2013 time first available livecoding tool actionscript language minor updates included mobile development support using adobe air technology ios android devices version 1.1 included upgraded flex compiler boasting 3x compilation speed increase allowed using compiler bundled application external compiler actionscript ides using external api version 1.2 featured javascript support completely reworked user interface colt separate tool used ide unlike livecoding tools limit user usage specific development environment code/resource routine triggered alteration file within colt project configured paths also provides external api providing methods export project run livecoding sessions production build routines etc ease ide integration prevent application hanging crashing due possible mistypes live code updates colt manages protect running application following potentially dangerous cases version 1.2.2 includes support actionscript javascript programming languages
[ 562, 2451, 5571 ]
Validation
6,301
4
The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense:cis critical security controls effective cyber defense center internet security critical security controls effective cyber defense publication best practice guidelines computer security project initiated early 2008 response extreme data losses experienced organizations us defense industrial base recently publication initially developed sans institute ownership transferred council cyber security ccs 2013 transferred center internet security cis 2015 earlier known consensus audit guidelines also known cis csc cis 20 ccs csc sans top 20 cag 20 guidelines consist 20 key actions called critical security controls csc organizations take block mitigate known attacks controls designed primarily automated means used implement enforce monitor security controls give no-nonsense actionable recommendations cyber security written language ’ easily understood personnel goals consensus audit guidelines include version 3.0 released april 13 2011 version 5.0 released february 2 2014 council cyber security ccs version 6.0 released october 15 2015 consists security controls version 6.1 released august 31 2016 priorization version 6 version 7 released march 19 2018 version 7.1 released april 4 2019 compared version 5 version 6/6.1 re-prioritized controls changed two controls version 7 controls 3 4 5 reshuffled controls 1-6 considered basic 7-16 foundational 17-20 organizational also released cis ram information security risk assessment method help implement cis controls consensus audit guidelines cag compiled consortium 100 contributors us government agencies commercial forensics experts pen testers authors initial draft include members starting 2009 us department state began supplementing risk scoring program part using consensus audit guidelines according department measurements first year site scoring using approach department reduced overall risk key unclassified network nearly 90 percent overseas sites 89 percent domestic sites
[ 1858, 3474, 284, 2381, 2829, 5051, 1805 ]
Test
6,302
2
NetRexx:netrexx netrexx open source originally ibm variant rexx programming language run java virtual machine supports classic rexx syntax reserved keywords along considerable additions support object-oriented programming manner compatible java object model yet used compiled interpreted language option using data types native jvm netrexx runtime package latter offers standard rexx data type combines string processing unlimited precision decimal arithmetic integration jvm platform tight existing java class libraries used unchanged without special setup time java programmer opt use rexx class runtime package improved string handling java syntax source programs netrexx free download rexx language association ibm announced transfer netrexx 3.00 source code rexx language association rexxla june 8 2011 1995 mike cowlishaw ported java os/2 soon started experiment run rexx jvm rexx generally considered first general purpose scripting languages netrexx first alternative language jvm 0.50 release april 1996 contained netrexx runtime classes translator written rexx tokenized turned os/2 executable 1.00 release came available january 1997 contained translator bootstrapped netrexx release 2.00 became available august 2000 major upgrade interpreted execution added mike cowlishaw left ibm march 2010 future ibm netrexx open source unknown ibm finally announced transfer netrexx source code rexx language association rexxla june 8 2011 14 years v1.0 release ibm released netrexx source code rexxla icu license rexxla shortly released netrexx 3.00 followed regular releases latest one 3.07 2018-10-01. icu license approved osi appears variant expat license syntax object model netrexx differ object rexx another ibm object-oriented variant rexx released open source software successor oorexx shares syntactical elements codice_1 codice_2 found classical rexx netrexx written netrexx uses decimal arithmetic rexx specified ansi x3.274
[ 6507, 8137, 5932 ]
Test
6,303
4
Fravia:fravia fravia spoke six languages including latin degree history early middle ages expert linguistics-related informatics five years made available large quantity material related reverse engineering website also hosted advice reverse engineering experts known reversers provided tutorials essays hack software code well advice related assembly disassembly applications software protection reversing fravia professor high cracking university +hcu founded old red cracker +orc legendary figure reverse engineering conduct research reverse code engineering addition sign front nickname reverser signified membership +hcu website known +fravia pages reverse engineering used challenge programmers well wider society reverse engineer brainwashing corrupt rampant materialism heyday website receiving millions visitors per year influence widespread web presence dates 1995 first got involved research related reverse code engineering rce 2000 changed focus concentrated advanced internet search methods reverse engineering search engine code websites www.fravia.com www.searchlores.org contained large amount specialised information related data mining website www.searchlores.org called useful instrument searching web www.fravia.com site described required reading spy wanting go beyond simple google searches 1980s member esteban canal chess club venice moving ces brussels graduated history university venice 1994 fravia master degree history philosophy 1999 interested studying arts humanities aiming build collective knowledge particular subject learning web-searching art spoke six languages including latin fravia participated speaker 22nd chaos communication congress lecture subject hacking fravia focusing privacy created myth fjalar ravia aka fravia+ msre spini red avenger ~s~ sustrugiel pellet ravia f. protection hostile seekers least two distinct phases internet public work identified first period fravia focused reverse-engineering software protection content copyright software patents steps cracking software protection many cases published website form essays old red cracker lessons fravia asked safety precaution community remove web every copy old site www.fravia.org corresponding period idea convert young crackers ... experiment worked part hence decision couple years ago freeze site nevertheless mirrors still exist fravia website described containing useful tools products according 2001 acm multimedia workshops association computing machinery fravia website contained information could assist hackers certain classification skilled enough mount new novel attack website also analysed brute force attacks steganography period included papers related reality-cracking i.e capacity seeker decode hidden facts behind appearance reverse engineering legitimately bought program studying modifying code knowledge claimed legal fravia least european union restricted conditions transition two phases occurred realizing growing importance internet search engines tools access information according vision access information restricted advocating true openness web information contents strongly criticized large amount advertising internet considered promoting unnecessary products population naive consumers richard stallman web article ubuntu spyware mentions friend fravia alerted fact fravia windows system sent information packet external server detected firewall fravia computer second stage work fravia explained content currently structured world wide web difficulties finding relevant information search engines growing number ads search engines promote today 2005 fravia keynote speaker t2 infosec conference subject speech web bottomless cornucopia immense garbage dump fravia professor high cracking university +hcu founded old red cracker +orc considered genius reverse engineering legendary figure rce advance research reverse code engineering rce addition sign front nickname reverser signified membership +hcu amongst students +hcu top elite windows reversers worldwide +hcu published new reverse engineering problem annually small number respondents best replies qualified undergraduate position university fravia website known +fravia pages reverse engineering used challenge programmers well wider society reverse engineer brainwashing corrupt rampant materialism heyday website received millions visitors per year influence widespread nowadays graduates +hcu migrated linux remained windows reversers information university rediscovered new generation researchers practitioners rce started new research projects field founding cast members first professors denoted symbol +hcu along fravia fravia postings +aesculapius +greythorne technomancer +indian trail +malattia +mammon_ +rezident +sandman fravia described inspiration many hackers reversers friend founder ccc wau holland motivation jon lech johansen understand inner workings computer programs johansen commented blog post fravia site goldmine education reverse engineer later years moved software reversing free software searching web website described meeting point people wanted search web deeper still september 2008 fravia stopped updating site holding conferences diagnosed receiving treatment squamous cell carcinoma tonsil metastasized site frozen half year updated 9 march 2009 fravia slowly recovering focusing gnu/linux fravia died suddenly sunday 3 may 2009 age 56
[ 7234, 578, 3486, 7093 ]
Test
6,304
4
China_Chopper:china chopper china chopper web shell 4 kilobytes size first discovered 2012 web shell commonly used malicious chinese actors including advanced persistent threat apt groups remotely control web servers web shell two parts client interface executable file receiver host file compromised web server china chopper many commands control features password brute-force attack option code obfuscation file database management graphical user interface originally distributed website www.maicaidao.com fireeye revealed client web shell programmed microsoft visual c++ 6.0 china chopper used attacks eight australian web hosting providers compromised due use unsupported operating system windows server 2008 hackers connected web servers monero mining pool way cryptocurrency miners pool resources mined au 3868 worth monero
[ 2054, 3875, 1805 ]
Test
6,305
4
Sophos:sophos sophos group plc british security software hardware company sophos develops products communication endpoint encryption network security email security mobile security unified threat management sophos primarily focused providing security software mid market pragmatic enterprise 100- 5,000-seat organizations whilst primary focus sophos also protects home users free antivirus software sophos home intended demonstrate product functionality listed london stock exchange constituent ftse 250 index sophos founded jan hruska peter lammer began producing first antivirus encryption products 1985 late 1980s 1990s sophos primarily developed sold range security technologies uk including encryption tools available users private business late 1990s sophos concentrated efforts development sale antivirus technology embarked program international expansion 2003 sophos acquired activestate north american software company developed anti-spam software time viruses spread primarily email spam allowed sophos produce combined anti-spam antivirus solution 2006 peter gyenes steve munford named chairman ceo sophos respectively jan hruska peter lammer remain members board directors 2010 majority interest sophos sold apax 2010 nick bray formerly group cfo micro focus international named cfo sophos 2011 utimaco safeware ag acquired sophos 2008-9 accused supplying data monitoring tracking software partners sold governments syria sophos issued statement apology confirmed suspended relationship partners question launched investigation 2012 kris hagerman formerly ceo corel corporation named ceo sophos joined company board former ceo steve munford became non-executive chairman board february 2014 sophos announced acquired cyberoam technologies provider network security products june 2015 sophos announced plans raise us100 million london stock exchange september 2003 february 2006 sophos served parent company activestate developer programming tools dynamic programming languages february 2006 activestate became independent company sold vancouver-based venture capitalist firm pender financial 2007 sophos acquired endforce company based ohio united states developed sold security policy compliance network access control nac software july 2008 sophos announced intention acquire utimaco safeware ag july 2009 sophos completed integration utimaco safeware ag may 2010 sophos reached definitive agreement sell majority interest company apax partners global private equity group may 2011 sophos announced entered agreement acquire astaro privately held provider network security solutions headquartered wilmington massachusetts united states karlsruhe germany 2012 sophos acquired remained virusbuster – hungarian antivirus firm – company closed april 2012 sophos acquired dialogs privately held provider mobile management solutions headquartered germany february 2014 sophos announced acquired cyberoam technologies leading global provider network security products october 2014 sophos acquired mojave networks leading cloud-based security startup december 14 2015 sophos acquired surfright small dutch company behind hitmanpro strengthen endpoint protection products november 2016 sophos acquired barricade pioneering start-up powerful behavior-based analytics engine built machine learning techniques strengthen synchronized security capabilities next-generation network endpoint protection february 2017 sophos acquired invincea software company provides malware threat detection prevention pre-breach forensic intelligence
[ 376, 2919, 2923, 385, 1838, 4689, 2566, 1102, 6823, 7193, 5066, 4364, 84, 7597, 7600, 88, 5452, 91, 6515, 2991, 7243, 7244, 3353, 2642, 1931, 6899, 2296, 4783, 496, 5144, 142, 6573, 3411, 4456, 6962, 4115, 3089, 8069, 3096, 4492, 4138, ...
Test
6,306
3
Monitor_Control_Command_Set:monitor control command set vesa monitor control command set mccs computer standard developed video electronics standards association defines binary protocol controlling properties computer monitors host device pc set-top box etc mccs requires bidirectional communication protocol like display data channel host display although specification favour particular protocol virtual control panel vcp code binary code represents single command entity mccs language command contains variable number data parameters command attributes following groups controls defined standard three categories controls exist control data may read write rw read-only ro write-only wo display exposes supported internal controls via capability strings original mccs standard version 1 released september 11 1998 mccs version 2 released october 17 2003 major update standard provided support flat panel displays vesa dpvl digital packet video link standard added range television controls introduced individual control multiple windows display new classes vcp codes associated asset management secondary displays information status etc remote program calls display processor introduced mccs version 2 revision 1 released may 28 2005 included minor updates well clarifications improved usability standard mccs version 3 released july 27 2006 major revision update introduced significant changes however revision seen little support industry latest release v2 standard version 2.2a adopted january 2011
[ 6307, 2959 ]
Test
6,307
3
DisplayPort:displayport displayport dp digital display interface developed consortium pc chip manufacturers particularly maxell lattice philips sony standardized video electronics standards association vesa interface primarily used connect video source display device computer monitor also carry audio usb forms data displayport designed replace vga dvi fpd-link interface backward compatible interfaces hdmi dvi use either active passive adapters displayport first display interface rely packetized data transmission form digital communication found technologies ethernet usb pci express permits use internal external display connections unlike legacy standards transmit clock signal output displayport protocol based small data packets known micro packets embed clock signal within data stream allows higher resolution using fewer pins use data packets also makes displayport extensible meaning additional features added time without significant changes physical interface displayport used transmit audio video simultaneously although optional transmitted without video signal path range six sixteen bits per color channel audio path eight channels 24-bit 192khz pcm audio uncompressed bi-directional half-duplex auxiliary channel carries device management device control data main link vesa edid mccs dpms standards addition interface capable carrying bi-directional usb signals displayport uses lvds signal protocol compatible dvi hdmi however dual-mode displayports designed transmit single-link dvi hdmi protocol tmds across interface use external passive adapter adapter enables compatibility mode converts signal 3.3 volts 5 volts analog vga/ypbpr dual-link dvi powered active adapter required compatibility rely dual mode active vga adapters powered displayport connector directly active dual-link dvi adapters typically rely external power source usb first version 1.0 approved vesa 3 may 2006 version 1.1 ratified 2 april 2007 version 1.1a ratified 11 january 2008 displayport 1.0–1.1a allow maximum bandwidth 10.8gbit/s 8.64gbit/s data rate standard 4-lane main link displayport cables 2 meters length required support full 10.8gbit/s bandwidth displayport 1.1 allows devices implement alternative link layers fiber optic allowing much longer reach source display without signal degradation although alternative implementations standardized also includes hdcp addition displayport content protection dpcp displayport1.1a standard downloaded free vesa website displayport version 1.2 introduced 7 january 2010 significant improvement new version doubling effective bandwidth 17.28gbit/s high bit rate 2 hbr2 mode allows increased resolutions higher refresh rates greater color depth improvements include multiple independent video streams daisy-chain connection multiple monitors called multi-stream transport facilities stereoscopic 3d increased aux channel bandwidth 1mbit/s 720mbit/s color spaces including xvycc scrgb adobe rgb 1998 global time code gtc sub 1µs audio/video synchronisation also apple inc. mini displayport connector much smaller designed laptop computers small devices compatible new standard displayport version 1.2a released january 2013 may optionally include vesa adaptive sync amd freesync uses displayport adaptive-sync feature operation freesync first demonstrated ces 2014 toshiba satellite laptop making use panel-self-refresh psr feature embedded displayport standard proposal amd vesa later adapted panel-self-refresh feature use standalone displays added optional feature main displayport standard name adaptive-sync version 1.2a optional feature support adaptive-sync required display displayport 1.2a-compliant displayport version 1.3 approved 15 september 2014 standard increases overall transmission bandwidth 32.4gbit/s new hbr3 mode featuring 8.1gbit/s per lane 5.4gbit/s hbr2 version 1.2 total data throughput 25.92gbit/s factoring 8b/10b encoding overhead bandwidth enough 4k uhd display 120hz 24bit/px rgb color 5k display 60hz 30bit/px rgb color 8k uhd display 30hz 24bit/px rgb color using multi-stream transport mst displayport port drive two 4k uhd displays 60hz four wqxga displays 60hz 24bit/px rgb color new standard includes mandatory dual-mode dvi hdmi adapters implementing hdmi2.0 standard hdcp2.2 content protection thunderbolt 3 connection standard originally include displayport1.3 capability final release ended version 1.2 vesa adaptive sync feature displayport version 1.3 remains optional part specification displayport version 1.4 published 1 march 2016 new transmission modes defined hbr3 32.4gbit/s introduced version 1.3 still remains highest available mode displayport1.4 adds support display stream compression 1.2 dsc forward error correction hdr10 metadata defined cta-861.3 including static dynamic metadata rec 2020 color space hdmi interoperability extends maximum number inline audio channels 32 dsc visually lossless encoding technique 3:1 compression ratio using dsc hbr3 transmission rates displayport1.4 support 8k uhd 60hz 4k uhd 120hz 30bit/px rgb color hdr 4k 60hz 30bit/px rgb/hdr achieved without need dsc displays support dsc maximum limits unchanged displayport1.3 4k 120hz 5k 60hz 8k 30hz displayport version 1.4a published april 2018 vesa made official press release version updated displayport dsc implementation dsc 1.2 1.2a according roadmap published vesa september 2016 new version displayport intended launched early 2017 would improved link rate 8.1 10.0gbit/s 24 increase would increased total bandwidth 32.4gbit/s 40.0gbit/s however new version released 2017 likely delayed make improvements hdmi forum announced january 2017 next standard hdmi2.1 would offer 48gbit/s bandwidth according press release 3 january 2018 vesa also currently engaged members development next displayport standard generation plans increase data rate enabled displayport two-fold beyond vesa plans publish update within next 18 months ces 2019 vesa announced new version would support 8k 60hz without compression expected released first half 2019 june 26 2019 vesa formally released displayport 2.0 standard vesa stated dp 2.0 first major update displayport standard since march 2016 provides ≈3× improvement data rate 25.92 77.37gbit/s compared previous version displayport 1.4a well new capabilities address future performance requirements traditional displays include beyond 8k resolutions higher refresh rates high dynamic range hdr support higher resolutions improved support multiple display configurations well improved user experience augmented/virtual reality ar/vr displays including support 4k-and-beyond vr resolutions increased bandwidth enabled dp 2.0 vesa offers high degree versatility configurations higher display resolutions refresh rates addition above-mentioned 8k resolution 60hz hdr support dp 2.0 across native dp connector usb-c displayport alt mode enables variety high-performance configurations using two lanes usb-c connector via dp alt mode allow simultaneous superspeed usb data video dp 2.0 enable configurations displayport main link used transmission video audio main link consists number unidirectional serial data channels operate concurrently called lanes standard displayport connection 4 lanes though applications displayport implement thunderbolt 3 interface implements 8 lanes displayport standard displayport connection lane dedicated set twisted-pair wires transmits data across using differential signaling self-clocking system dedicated clock signal channel necessary unlike dvi hdmi vary transmission speed exact rate required specific video format displayport operates specific speeds excess bits transmission filled stuffing symbols displayport versions 1.01.4a data encoded using ansi 8b/10b encoding prior transmission scheme 8 every 10 transmitted bits represent data extra bits used dc balancing ensuring roughly equal number 1s 0s result rate data transmitted 80 physical bitrate transmission speeds also sometimes expressed terms link symbol rate rate 8b/10b-encoded symbols transmitted i.e rate groups 10 bits transmitted 8 represent data following transmission modes defined version 1.01.4a displayport 2.0 uses 128b/132b encoding group 132 transmitted bits represents 128 bits data scheme efficiency 96. addition forward error correction fec consumes small amount link bandwidth resulting overall efficiency ≈96.7 following transmission modes added dp 2.0 total bandwidth main link standard 4-lane connection aggregate lanes transmission mode used displayport main link negotiated source sink device connection made process called link training process determines maximum possible speed connection quality displayport cable insufficient reliably handle hbr2 speeds example displayport devices detect switch lower mode maintain stable connection link re-negotiated time loss synchronization detected audio data transmitted across main link video blanking intervals short pauses line frame video data displayport aux channel half-duplex bidirectional data channel used miscellaneous additional data beyond video audio ic cec commands device manufacturer discretion aux signals transmitted across dedicated set twisted-pair wires displayport1.0 specified manchester encoding 2mbaud signal rate 1mbit/s data rate displayport1.2 introduced second transmission mode called faux fast aux operates 720mbaud 8b/10b encoding 576mbit/s data rate used implement additional transport protocols usb2.0 480mbit/s without need additional cable seen little practical use 2018 displayport cables compatible displayport devices regardless version device cable certification level features displayport function across displayport cable displayport multiple cable designs dp cables basic layout wiring support feature including audio daisy-chaining g-sync/freesync hdr dsc displayport cables differ transmission speed support displayport specifies four different transmission modes rbr hbr hbr2 hbr3 support progressively higher bandwidths displayport cables capable four transmission modes vesa offers certifications level bandwidth certifications optional displayport cables certified vesa cables limited transmission speed still compatible displayport devices may place limits maximum resolution refresh rate available displayport cables classified version although cables commonly labeled version numbers hbr2 cables advertised displayport1.2 cables example notation permitted vesa use version numbers cables seem imply displayport1.4 display requires displayport1.4 cable features introduced dp1.4 hdr dsc function older dp1.2 cables reality neither true displayport cables classified bandwidth certification level rbr hbr hbr2 hbr3 certified displayport cables capable functioning highest levels bandwidth cables may submitted vesa optional certification various bandwidth levels vesa offers three levels cable certification rbr standard dp8k certify displayport cables proper operation following speeds april 2013 vesa published article stating displayport cable certification distinct tiers hbr hbr2 bandwidth certified standard displayport cable—including certified displayport1.1—would able handle 21.6gbit/s bandwidth hbr2 introduced displayport 1.2 standard displayport1.2 standard defines single specification high bit rate cable assemblies used hbr hbr2 speeds although dp cable certification process governed displayport phy compliance test standard cts displayport standard dp8k certification announced vesa january 2018 certifies cables proper operation hbr3 speeds 8.1gbit/s per lane 32.4gbit/s total june 2019 release version 2.0 displayport standard vesa announced dp8k certification also sufficient new uhbr 10 transmission mode new certifications announced uhbr 13.5 uhbr 20 modes vesa encouraging displays use tethered cables speeds rather releasing standalone cables onto market also noted use display stream compression dsc introduced displayport1.4 greatly reduces bandwidth requirements cable formats would normally beyond limits displayport1.4 4k 38402160 144hz 8bpc rgb/4:4:4 31.4gbit/s data rate uncompressed implemented using dsc would reduce physical bandwidth requirements 2–3x placing well within capabilities hbr2-rated cable exemplifies displayport cables classified version although dsc introduced version 1.4 mean needs so-called dp1.4 cable hbr3-rated cable function hbr3 cables required applications exceed hbr2-level bandwidth simply application involving displayport1.4 dsc used reduce bandwidth requirements hbr2 levels hbr2-rated cable sufficient displayport standard specify maximum length cables though displayport 1.2 standard set minimum requirement cables 2 meters length must support hbr2 speeds 21.6gbit/s cables length must support rbr speeds 6.48gbit/s cables greater 2 meters may may support hbr/hbr2 speeds cables length may may support hbr3 speeds displayport cables ports may either full-size connector mini connector connectors differ physical shape—the capabilities displayport regardless connector used using mini displayport connector affect performance feature support connection standard displayport connector referred full-size connector distinguish mini connector sole connector type introduced displayport1.0 20-pin single-orientation connector friction lock optional mechanical latch standard displayport receptacle dimensions 16.10mm width × 4.76mm height × 8.88mm depth standard displayport connector pin allocation follows mini displayport connector developed apple use computer products first announced october 2008 use new macbook pro macbook air cinema display 2009 vesa adopted official standard 2010 specification merged main displayport standard release displayport1.2 apple freely licenses specification vesa mini displayport mdp connector 20-pin single-orientation connector friction lock unlike full-size connector option mechanical latch mdp receptacle dimensions 7.50mm width × 4.60mm height × 4.99mm depth mdp pin assignments full-size displayport connector pin 20 displayport connector called dp_pwr provides 3.3v ±10 dc power 500ma minimum power delivery 1.5w power available displayport receptacles source display devices dp_pwr intended provide power adapters amplified cables similar devices separate power cable necessary standard displayport cable connections use dp_pwr pin connecting dp_pwr pins two devices directly together cable create short circuit potentially damage devices since dp_pwr pins two devices unlikely exactly voltage especially ±10 tolerance reason displayport1.1 later standards specify passive displayport-to-displayport cables must leave pin 20 unconnected however 2013 vesa announced investigating reports malfunctioning displayport devices discovered large number non-certified vendors manufacturing displayport cables dp_pwr pin connected stipulation dp_pwr wire omitted standard displayport cables present displayport1.0 standard however displayport products cables begin appear market 2008 long version 1.0 replaced version 1.1 displayport1.0 standard never implemented commercial products tables describe refresh frequencies achieved transmission mode general maximum refresh frequency determined transmission mode rbr hbr hbr2 hbr3 uhbr 10 uhbr 13.5 uhbr 20 transmission modes introduced displayport standard follows however transmission mode support necessarily dictated device claimed displayport version number example older versions displayport marketing guidelines allowed device labeled displayport 1.2 supported mst feature even n't support hbr2 transmission mode newer versions guidelines removed clause currently june 2018 revision guidelines usage displayport version numbers products displayport version numbers therefore reliable indication transmission speeds device support addition individual devices may arbitrary limitations beyond transmission speed example nvidia kepler gk104 gpus geforce gtx 680 770 support displayport 1.2 hbr2 transmission mode limited 540mpx/s maximum possible hbr2 consequently certain devices may limitations differ listed following tables support particular format source display devices must support required transmission mode displayport cable must also capable handling required bandwidth transmission mode see cables connectors color depth 8bpc 24bit/px 16.7 million colors assumed formats tables standard color depth used computer displays note operating systems refer 32-bit color depth—this 24-bit color depth 8 extra bits alpha channel information present software transmission stage information already incorporated primary color channels actual video data transmitted across cable contains 24 bits per pixel color depth 10bpc 30bit/px 1.07 billion colors assumed formats tables color depth requirement various common hdr standards hdr10 requires 25 bandwidth standard 8bpc video hdr extensions defined version 1.4 displayport standard displays support hdr extensions may implement hbr2 transmission mode extra bandwidth hbr3 unnecessary example 4k 60hz hdr displays since definition constitutes displayport 1.4 device manufacturers may choose label dp 1.2 devices despite support dp 1.4 hdr extensions result displayport version numbers used indicator hdr support displayport dual-mode dp++ also called dual-mode displayport standard allows displayport sources use simple passive adapters connect hdmi dvi displays dual-mode optional feature displayport sources necessarily support dvi/hdmi passive adapters though practice nearly devices officially dp++ logo used indicate dp port supports dual-mode modern devices use logo devices implement dual-mode detect dvi hdmi adapter attached send dvi/hdmi tmds signals instead displayport signals original displayport dual-mode standard version 1.0 used displayport1.1 devices supported tmds clock speeds 165mhz 4.95gbit/s bandwidth equivalent hdmi1.2 sufficient 19201080 19201200 60hz 2013 vesa released dual-mode 1.1 standard added support 300mhz tmds clock 9.00gbit/s bandwidth used newer displayport1.2 devices slightly less 340mhz maximum hdmi1.4 sufficient 19201080 120hz 25601440 60hz 38402160 30hz older adapters capable 165mhz speed retroactively termed type1 adapters new 300mhz adapters called type2 release displayport1.3 standard vesa added dual-mode support 600mhz tmds clock 18.00gbit/s bandwidth full bandwidth hdmi2.0 sufficient 19201080 240hz 25601440 144hz 38402160 60hz however passive adapters capable 600mhz dual-mode speed produced 2018 multi-stream transport feature first introduced displayport1.2 standard allows multiple independent displays driven single dp port source devices multiplexing several video streams single stream sending branch device demultiplexes signal original streams branch devices commonly found form mst hub plugs single dp input port provides multiple outputs also implemented display internally provide dp output port daisy-chaining effectively embedding 2-port mst hub inside display.. theoretically 63 displays supported combined data rate requirements displays exceed limits single dp port 17.28gbit/s dp1.2 port 25.92gbit/s dp 1.3/1.4 port addition maximum number links source device i.e maximum length daisy-chain 7 maximum number physical output ports branch device hub 7 release mst standard single-display operation retroactively named sst mode single-stream transport daisy-chaining feature must specifically supported intermediary display displayport1.2 devices support daisy-chaining requires dedicated displayport output port display standard displayport input ports found displays used daisy-chain output last display daisy-chain need support feature specifically dp output port displayport1.1 displays also connected mst hubs part displayport daisy-chain last display chain host system software also needs support mst hubs daisy-chains work microsoft windows environments full support apple operating systems currently support mst hubs displayport daisy-chaining macos 10.13 high sierra displayport-to-dvi displayport-to-hdmi adapters/cables may may function mst output port support depends specific device mst supported usb type-c displayport alternate mode standard displayport daisy-chains mst hubs function type-c sources simple type-c displayport adapter support hdr video introduced displayport1.4 implements cta 861.3 standard transport static hdr metadata edid displayport1.0 includes optional dpcp displayport content protection philips uses 128-bit aes encryption also features full authentication session key establishment encryption session independent independent revocation system portion standard licensed separately also adds ability verify proximity receiver transmitter technique intended ensure users bypassing content protection system send data distant unauthorized users displayport1.1 added optional implementation industry-standard 56-bit hdcp high-bandwidth digital content protection revision 1.3 requires separate licensing digital content protection llc displayport1.3 added support hdcp2.2 also used hdmi2.0 vesa creators displayport standard state standard royalty-free implement however march 2015 mpeg la issued press release stating royalty rate 0.20 per unit applies displayport products manufactured sold countries covered one patents mpeg la license pool includes patents hitachi maxell philips lattice semiconductor rambus sony response vesa updated displayport faq page following statement october 2017 still seems royalty according vesa official faq standard may require per-device royalty fees vesa requires membership access said standards minimum cost presently 5,000 december 2010 several computer vendors display makers including intel amd dell lenovo samsung lg announced would begin phasing fpd-link vga dvi-i next years replacing displayport hdmi one notable exception list manufacturers nvidia yet announce plans regarding future implementation legacy interfaces displayport several advantages vga dvi fpd-link although displayport much functionality hdmi complementary connection used different scenarios dual-mode displayport port emit hdmi signal via passive adapter figures idc show 5.1 commercial desktops 2.1 commercial notebooks released 2009 featured displayport main factor behind phase-out vga intel amd planned stop building products fpd-link 2013 nearly 70 lcd monitors sold august 2014 us uk germany japan china equipped hdmi/displayport technology 7.5 year according digitimes research ihs markit analytics firm forecast displayport would surpass hdmi 2019 mini displayport mdp standard announced apple fourth quarter 2008 shortly announcing mini displayport apple announced would license connector technology fee following year early 2009 vesa announced mini displayport would included upcoming displayport 1.2 specification 24 february 2011 apple intel announced thunderbolt successor mini displayport adds support pci express data connections maintaining backwards compatibility mini displayport based peripherals micro displayport would targeted systems need ultra-compact connectors phones tablets ultra-portable notebook computers standard would physically smaller currently available mini displayport connectors standard expected released q2 2014 project seems aborted replaced displayport alt mode usb type-c standard direct drive monitor ddm 1.0 standard approved december 2008 allows controller-less monitors display panel directly driven displayport signal although available resolutions color depth limited two-lane operation display stream compression dsc vesa-developed low-latency compression algorithm overcome limitations posed sending high-resolution video physical media limited bandwidth visually lossless low-latency algorithm based delta pcm coding ycocg-r color space allows increased resolutions color depths reduced power consumption dsc tested meet requirements iso/iec 29170-2 evaluation procedure nearly lossless coding using various test patterns noise subpixel-rendered text cleartype ui captures photo video images dsc version 1.0 released 10 march 2014 soon deprecated dsc version 1.1 released 1 august 2014 dsc standard supports 3:1 compression ratio constant variable bit rate 4:4:4 chroma subsampling optional 4:2:2 conversion 6/8/10/12 bits per color component dsc version 1.2 released 27 january 2016 included displayport 1.4 version 1.2a released 18 january 2017 update includes native encoding 4:2:2 4:2:0 formats pixel containers 14/16 bits per color minor modifications encoding algorithm dsc compression works horizontal line pixels encoded using groups three consecutive pixels native 4:4:4 simple 4:2:2 formats six pixels three compressed containers native 4:2:2 4:2:0 formats rgb encoding used first converted reversible ycgco simple conversion 4:2:2 4:4:4 add missing chroma samples interpolating neighboring pixels luma component coded separately using three independent substreams four substreams native 4:2:2 mode prediction step performed using one three modes modified median adaptive coding mmap algorithm similar one used jpeg-ls block prediction optional decoders due high computational complexity negotiated dsc handshake midpoint prediction bit rate control algorithm tracks color flatness buffer fullness adjust quantization bit depth pixel group way minimizes compression artifacts staying within bitrate limits repeating recent pixels stored 32-entry indexed color history ich buffer referenced directly group slice improves compression quality computer-generated images alternatively prediction residuals computed encoded entropy coding algorithm based delta size unit-variable length coding dsu-vlc encoded pixel groups combined slices various height width common combinations include 100 25 picture width 8- 32- 108-line height 4 january 2017 hdmi 2.1 announced supports 10k resolution uses dsc 1.2 video higher 8k resolution 4:2:0 chroma subsampling embedded displayport edp display panel interface standard portable embedded devices defines signaling interface graphics cards integrated displays various revisions edp based existing displayport standards however version numbers two standards interchangeable instance edp version 1.4 based displayport 1.2 edp version 1.4a based displayport 1.3 practice embedded displayport displaced lvds predominant panel interface modern laptops edp 1.0 adopted december 2008 included advanced power-saving features seamless refresh rate switching version 1.1 approved october 2009 followed version 1.1a november 2009 version 1.2 approved may 2010 includes displayport 1.2 hbr2 data rates 120hz sequential color monitors new display panel control protocol works aux channel version 1.3 published february 2011 includes new optional panel self-refresh psr feature developed save system power extend battery life portable pc systems psr mode allows gpu enter power saving state frame updates including framebuffer memory display panel controller version 1.4 released february 2013 reduces power consumption partial-frame updates psr mode regional backlight control lower interface voltages additional link rates auxiliary channel supports multi-touch panel data accommodate different form factors version 1.4a published february 2015 underlying displayport version updated 1.3 order support hbr3 data rates display stream compression 1.1 segmented panel displays partial updates panel self-refresh version 1.4b published october 2015 protocol refinements clarifications intended enable adoption edp 1.4b devices mid-2016 internal displayport idp 1.0 approved april 2010 idp standard defines internal link digital tv system chip controller display panel timing controller aims replace currently used internal fpd-link lanes displayport connection idp features unique physical interface protocols directly compatible displayport applicable external connection however enable high resolution refresh rates providing simplicity extensibility idp features non-variable 2.7ghz clock nominally rated 3.24gbit/s data rate per lane sixteen lanes bank resulting six-fold decrease wiring requirements fpd-link 1080p24 signal data rates also possible idp built simplicity mind n't aux channel content protection multiple streams however frame sequential line interleaved stereo 3d portable digital media interface pdmi interconnection docking stations/display devices portable media players includes 2-lane displayport v1.1a connection ratified february 2010 ansi/cea-2017-a wireless displayport wdp enables displayport 1.2 bandwidth feature set cable-free applications operating 60ghz radio band announced november 2010 wigig alliance vesa cooperative effort slimport brand analogix products complies mobility displayport also known mydp industry standard mobile audio/video interface providing connectivity mobile devices external displays hdtvs slimport implements transmission video 4k-ultrahd eight channels audio micro-usb connector external converter accessory display device slimport products support seamless connectivity displayport hdmi vga displays mydp standard released june 2012 first product use slimport google nexus 4 smartphone lg smartphones lg g series also adopted slimport slimport alternative mobile high-definition link mhl displayid designed replace e-edid standard displayid features variable-length structures encompass existing edid extensions well new extensions 3d displays embedded displays latest version 1.3 announced 23 september 2013 adds enhanced support tiled display topologies allows better identification multiple video streams reports bezel size locations december 2013 many current 4k displays use tiled topology lack standard way report video source tile left right early 4k displays manufacturing reasons typically use two 1920×2160 panels laminated together currently generally treated multiple-monitor setups displayid 1.3 also allows 8k display discovery applications stereo 3d multiple video streams used dockport formerly known lightning bolt extension displayport include usb 3.0 data well power charging portable devices attached external displays originally developed amd texas instruments announced vesa specification 2014 22 september 2014 vesa published displayport alternate mode usb type-c connector standard specification send displayport signals newly released usb-c connector one two four differential pairs usb uses superspeed bus configured dynamically used displayport lanes first two cases connector still carry full superspeed signal latter case least non-superspeed signal available displayport aux channel also supported two sideband signals connection furthermore usb power delivery according newly expanded usb-pd 2.0 specification possible time makes type-c connector strict superset use-cases envisioned dockport slimport mini micro displayport virtuallink uses usb-c connectors displayport transmit video signals since introduction 2006 displayport gained popularity within computer industry featured many graphic cards displays notebook computers dell first company introduce consumer product displayport connector dell ultrasharp 3008wfp released january 2008 soon amd nvidia released products support technology amd included support radeon hd 3000 series graphics cards nvidia first introduced support geforce 9 series starting geforce 9600 gt later year apple introduced several products featuring mini displayport new connector – proprietary time – eventually became part displayport standard however apple reserves right void license licensee commence action patent infringement apple 2009 amd followed suit radeon hd 5000 series graphics cards featured mini displayport eyefinity versions series nvidia launched nvs 810 8 mini displayport outputs single card 4 november 2015 nvidia revealed geforce gtx 1080 world first graphics card displayport 1.4 support 6 may 2016 amd followed radeon rx 480 support displayport 1.3/1.4 29 june 2016 radeon rx 400 series support displayport 1.3 hbr hdr10 dropping dvi connector reference board design february 2017 vesa qualcomm announced displayport alt mode video transport integrated snapdragon 835 mobile chipset powers smartphones vr/ar head-mounted displays ip cameras tablets mobile pcs following organizations hold active patents contributed towards development displayport technology listed patent pool mpeg la following companies participated preparing drafts displayport edp idp ddm dsc standards following companies additionally announced intention implement displayport edp idp
[ 2448, 2539, 6599, 8054, 3764, 4759, 6793, 1920, 7974, 8073, 1833, 5822, 6351, 5301, 4954, 7826, 4694, 2117, 1012, 6545, 4970, 7659, 1670, 6655, 6562, 7669, 2509, 6572, 5335, 6306, 6307, 7212, 4090, 1595, 4636, 6490, 1237, 3156, 4197, 6950...
Test
6,308
4
Eric_Vanderburg:eric vanderburg eric vanderburg american cyber security storage networking information technology professional writer living cleveland ohio vanderburg vice president cybersecurity tcdi author speaker information security interviewed tv radio discuss information security presents conferences seminars participated panels information security vanderburg attended kent state university earning bachelor science technology masters business administration also master business administration mba pursued doctorate information assurance vanderburg interested technology early age often reading computer manuals library thus allowing learn basics programming spending time hackers internet deviants early 1990s managed turn interest security career since late 1990s interest primarily cybersecurity within business world also spoken development devops business world vanderburg founded independent systems consulting consulting firm 1997 ran almost ten years joined jurinnov 2006 directed digital forensics cybersecurity consulting teams 2009 built network operations center jurinnov headquarters monitor data center operations perform transaction monitoring key business client systems 2016 vanderburg became vice president cybersecurity tcdi tcdi acquired jurinnov also techmin network board member vanderburg involved hitachi data systems testing essential nas product compared netapp fas3000 nas partnered lateral data using viewpoint ediscovery tool perform large-scale litigation document review worked venio litigation review tool early case assessment eca worked companies including dell carbonite bitdefender microsoft vanderburg served expert witness cases involving digital preservation electronic communication access control confidential information disclosure database management systems directory services vanderburg taught courses security database management systems computer networking remington college cleveland-west campus instructor chair computer networking technology program served adjunct instructor computer information systems department lorain county community college elyria ohio vanderburg delivered commencement speeches vatterott college cleveland campus 2010 commencement remington college cleveland-west campus final graduation 2013 also taught web-based courses professional development eforensics magazine vanderburg served advisory boards remington college vatterott college lincoln school technology cuyahoga community college workforce economic development division wedd vanderburg published cio magazine eforensics magazine network world computer world networks asia certification magazine pc security world cso magazine arn techworld mcgladrey technology news brief vanderburg also maintains blog called security thinking cap
[ 972 ]
Test
6,309
2
Asynchronous_System_Trap:asynchronous system trap asynchronous system trap ast refers mechanism used several computer operating systems designed former digital equipment corporation dec maynard massachusetts various events within systems optionally signalled back user processes via ast mechanism asts act like subroutine calls delivered asynchronously without regard context main thread care must taken asts commonly encountered result issuing qio calls kernel completion i/o signalled issuance ast calling process/task certain runtime errors could also signalled using ast mechanism within openvms special kernel-mode asts used standard mechanism getting access process context executed highest possible per-process priority next time scheduler makes process current used among things retrieving process-level information response getjpi getjob/process information system call performing process deletion following operating systems implement asts asts roughly analogous unix signals important differences vax/vms v4 later implemented interesting optimization problem synchronizing ast-level non-ast-level code system service named setast could used disable enable delivery asts current less-privileged access modes openvms term ring-based security features however critical section needing protection asts instructions long overhead making setast calls could far outweigh time execute instructions user mode least privileged ring normally used ordinary user programs pair bit flags provided predefined user-writable memory location per-process p1 space meanings two flags could construed n't deliver asts asts disabled instead usual pair setast calls user-mode code would set first flag executing sequence instructions asts need blocked clear sequence note ordering avoid race conditions would check second flag see become set time asts really become disabled setast called re-enable common case asts would become pending time would need call setast kernel ast delivery code part would check first flag trying deliver user-mode ast set would directly set asts-disabled bit process control block bit would set explicit setast call user mode also set second flag returning leaving ast undelivered asynchronous procedure call mechanism windows nt family operating systems similar mechanism
[ 7396, 4318, 5571, 6256, 4786, 2359 ]
Test
6,310
4
Security_type_system:security type system computer science type system described syntactic framework contains set rules used assign type property int boolean char etc various components computer program variables functions security type system works similar way main focus security computer program information flow control thus various components program assigned security types labels aim system ultimately able verify given program conforms type system rules satisfies non-interference security type systems one many security techniques used field language-based security tightly connected information flow information flow policies simple terms using security type system want detect exists kind violation confidentiality integrity program i.e want detect program line information flow policy suppose two users b program introduce following security classes sc information flow policy want define direction information allowed flow dependent whether specifying policy read write operations example consider read operations confidentiality define following flows allowed also described superset ⊇ words information allowed flow towards stricter levels confidentiality using combination operator ⊕ express security classes perform read operations respect security classes example also described intersection ∩ security classes information flow policy illustrated hasse diagram also want policy lattice greatest lower-bound least upper-bound always exists combination security classes case integrity information flow opposite direction thus policy inverted policy place software developer apply security classes program components use security type system usually combined compiler perform verification information flow according type system rules sake simplicity consider simple computer program together information flow policy described previous section simple program given following pseudocode codice_1 see equality check made variable assigned security class see variable x lower security class b influenced check means information leaking class class b violation confidentiality policy leak detected security type system order design security type system need formalize couple things first need function also known security environment creates mapping variables security types classes denote function γ γ x τ x variable τ security class type assign security classes also called judgement program components using following notation use following bottom-up notation decompose program program decomposed trivial judgements easily determine type work way obtain types less trivial parts program consider numerator isolation looking types statement see able derive allowed type denominator based defined type system rules main part security type system rules say decompose program type verification performed toy program consists conditional test two possible variable assignments rules two events defined follows applying simple program introduced get type system detects policy violation line 2 read operation security class performed followed two write operations less strict security class b formalized terms ⋢ b b rule conditional test thus program classified typeable soundness security type system informally defined program p well typed p satisfies non-interference
[ 3552 ]
Train
6,311
9
Semantic_analysis_(compilers):semantic analysis compilers semantic analysis context sensitive analysis process compiler construction usually parsing gather necessary semantic information source code usually includes type checking makes sure variable declared use impossible describe extended backus–naur form thus easily detected parsing
[ 1361, 3931, 1365, 5326 ]
Test
6,312
2
App_Store_(iOS):app store ios app store digital distribution platform developed maintained apple inc. mobile apps ios operating system store allows users browse download apps developed apple ios software development kit apps downloaded iphone smartphone ipod touch handheld computer ipad tablet computer transferred apple watch smartwatch 4th-generation newer apple tvs extensions iphone apps app store opened july 10 2008 initial 500 applications available store features 2.1 million apps developers multiple options monetizing applications ranging free free in-app purchases paid however app store criticized lackluster development environment prompting company june 2016 announce renewed focus energy store major changes introduced following months include ads search results new app subscription model ability developers respond customer reviews additionally apple began process remove old apps function intended n't follow current app guidelines app research firms noticing significant numbers app removals store furthermore release ios 11 september 2017 app store received complete design overhaul bringing greater focus editorial content daily highlights well design similar style several apple built-in ios apps iphone app store opened july 10 2008 july 11 iphone 3g released came pre-loaded support app store success apple app store launch similar services competitors term app store adopted refer similar service mobile devices however apple applied u.s. trademark term app store 2008 tentatively approved early 2011 june 2011 u.s. district judge phyllis hamilton presiding apple case amazon said would probably deny apple motion stop amazon using app store name july apple denied preliminary injunction amazon appstore federal judge term app become popular buzzword january 2011 app awarded honor 2010 word year american dialect society app used shorthand application since least mid-1990s product names since least 2006 example then-named google apps apple announced mac app store similar app distribution platform macos personal computer operating system october 2010 official launch taking place january 2011 release 10.6.6 snow leopard update february 2013 apple informed developers could begin using appstore.com links apps june developer conference apple announced upcoming kids section app store new section featuring apps categorized age range section launched alongside release ios 7 september 2013 november 2014 due pressure european commission apple updated app store apps charge download labeled get instead previous free due many free apps inclusions paid in-app purchases january 2017 reports surfaced documentation new beta then-upcoming release ios 10.3 detailed apple would let developers respond customer reviews app store marking significant change previous limitation prevented developers communicating users functionality officially enabled march 27 2017 ios 10.3 released users details also released reviews users including able rate review apps apps rather redirected app store mark users reviews helpful helpful apple published document describing proper ways respond developers including timely clear concise prioritize certain forms reviews low-star ratings certain countries recent reviews filtering itunes connect developer responses go approval process published developers also forbidden manipulating incenting feedback developer responses listed app store line underneath respective user review users receive notification/email upon response respective developer option update review march 2017 app store submissions containing pricing details free name started getting rejected developers previously advised developer guides itunes connect app store overview pages refrain practice though apps still approved starting march though apps free titles rejected october 2016 effort improve app discoverability apple rolled ability developers purchase advertising spots app store users united states ads shown top search results based strictly relevant keywords used create profiles users apple expanded search ads united kingdom australia new zealand april 2017 along configurable advertising settings developers search ads expanded canada mexico switzerland october 2017 december 2017 apple revamped search ads program offer two distinctive versions search ads basic pay-per-install program aimed smaller developers pay users actually install app search ads basic also features easier setup process restricted monthly budget search ads advanced new name given older method developers pay whenever users tap apps search results along unlimited monthly budgets launch basic program available u.s. international rollout expected sometime next year apple also offers itunes affiliate program lets people refer others apps itunes content along in-app purchases percentage sales commission rate in-app purchases reduced 7 2.5 may 2017 affiliate rates paid apps music movies books tv shows remained 7 app store received major design overhaul release ios 11 new design features greater focus editorial content daily highlights introduces cleaner consistent colorful look similar several apple built-in ios apps prior september 2017 apple offered way users manage ios app purchases itunes computer software september version 12.7 itunes released removing app store section process however following month itunes 12.6.3 also released retaining app store 9to5mac noting secondary release positioned apple necessary businesses performing internal app deployments december 2017 apple announced developers could offer applications pre-order letting make apps visible store 2–90 days ahead release january 4 2018 apple announced app store record-breaking holiday season according new press release week starting christmas eve record number customers made app store purchases spending 890 million seven-day period new year day 2018 alone customers made 300 million purchases ios sdk software development kit allows development mobile apps ios originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages publish apps app store developers must pay 99 yearly fee access apple developer program apple announced united states 2018 waive fee nonprofit organizations governments developers options monetizing applications free model enables free apps increasing likelihood engagement freemium model makes app download free users offered optional additional features in-app require payments subscription model enables ongoing monetization renewable transactions paid model makes app paid download offers additional features paymium model enables paid app downloads paid in-app content in-app subscriptions originally introduced magazines newspapers music apps february 2011 giving developers 70 revenue earned apple 30 publishers could also sell digital subscriptions website bypassing apple fees allowed advertise website alternative apps 2016 multiple media outlets reported apps decreased significantly popularity recode wrote app boom editorial techcrunch stated air hopelessness surrounds mobile app ecosystem obvious demoralizing verge wrote original app store model selling apps buck two looks antiquated issues included consumer boredom lack app discoverability stated report 2014 lack new app downloads among smartphone users interview verge june 2016 phil schiller apple senior vice president worldwide marketing said apple renewed focus energy app store announced multiple significant changes including advertisements search results new app subscription model subscription model saw firmly established 70/30 revenue split developers apple change new 85/15 revenue split user stays subscribed developer app year opens possibility subscriptions apps select categories app data insights analyst company app annie released report october 2016 announcing china overtaken united states apple biggest market app store revenue third quarter 2016 chinese users spent 1.7 billion vs. approximately 1.5 billion american users june 2017 apple announced app store generated 70 billion revenue developers since 2008 launch july 10 2008 apple then-ceo steve jobs told usa today app store contained 500 third-party applications iphone ipod touch 25 percent free ten million applications downloaded first weekend september number available apps increased 3,000 100 million downloads years store surpassed multiple major milestones including 50,000 100,000 250,000 500,000 1 million 2 million apps billionth application downloaded april 24 2009 ipad released april 2010 approximately 3,000 apps available july 2011 16 months release 100,000 apps available designed specifically device apple publishes list yearly basis giving credit apps highest number downloads past year most-downloaded ios applications highest revenue generating ios applications time 2010-2018 apple rates applications worldwide based content determines age group appropriate according iphone os 3.0 launch event iphone allow blocking objectionable apps iphone settings following ratings apple detailed applications subject approval apple outlined sdk agreement basic reliability testing analysis applications may still distributed ad-hoc rejected author manually submitting request apple license application individual iphones although apple may withdraw ability authors later date apple employed mostly static analysis app review process means dynamic code reassembly techniques could defeat review process june 2017 apple updated app store review guidelines specify app developers longer ability use custom prompts encouraging users leave reviews apps release ios 11 late 2017 apple also let developers choose whether keep current app reviews updating apps reset additionally another update app store policies allows users optionally tip content creators voluntarily sending money november 2012 boyfriend maker dating sim game removed due reports references violent sexual acts paedophilia deemed inappropriate boyfriend maker age rating 4+ revised version called boyfriend plus approved apple april 2013 march 2013 hiddenapps approved appeared app store app provided access developer diagnostic menus allowed stock apps hidden enabled opt-out feature iads apple developer-driven advertisement system app removed shortly afterwards violating guidelines april 2013 apple removed appgratis then-successful app store market promoted paid apps offering one free day apple told things digital app violated two developer agreement clauses including apps display apps purchase promotion manner similar confusing app store rejected apps use push notifications send advertising promotions direct marketing kind apple however tell developers welcome resubmit changing app though much hope could survive anything like current incarnation november 2014 apple removed marijuana social networking app massroots reason given encourage excessive consumption alcohol illegal substances. ” february 2015 massroots reintroduced store apple changed enforcement guidelines allow cannabis social apps 23 states legal september 2015 discovered hundreds apps submitted approved app store using xcodeghost malicious version xcode development software issues prompted apple remove infected apps store issue statement working developers make sure ’ using proper version xcode security firm later published lists infected apps including china-only version angry birds 2 camcard lifesmart tinydeal.com wechat aftermath apple stated would make xcode faster download certain regions outside united states contacted developers ensure download code mac app store apple website provided code signature developers test running tampered version xcode june 2017 scamming trend discovered store developers make apps built non-existent services attach in-app purchase subscriptions opening dialogue buy app store search advertising space get app higher rankings one instance app name mobile protection clean security vpn would require payments 99.99 seven-day subscription short trial apple yet responded issues addition apple removed software licensed gnu general public license gpl app store due text apple terms service agreement imposing digital rights management proprietary legal terms incompatible terms gpl september 1 2016 apple announced starting september 7 would removing old apps function intended n't follow current review guidelines developers warned given 30 days update apps apps crash startup removed immediately additionally app names registered developers exceed 50 characters attempt stop developers inserting long descriptions irrelevant terms app names improve app ranking app store search results app intelligence firm sensor tower revealed november 2016 apple promised september announcement removing old apps removed 47,300 apps app store october 2016 238 percent increase prior number average monthly app removals june 2017 techcrunch reported apple turned app removal focus apps copying functionality popular apps example cited included popular game like flappy bird red ball hits charts hundreds thousands clones within weeks attempt capitalize initial wave popularity report also noted removals music apps serving pirated tracks publication wrote since initial september app removals began apple removed multiple hundreds thousands apps december 2017 new report techcrunch stated apple begun enforcing new restrictions use commercialized template app generation services originally introduced part apple 2017 developer conference new app store guidelines allow company ban apps making use templates commercial app services affected many small businesses techcrunch report citing local retailers restaurants small fitness studios nonprofits churches organizations benefit using templates app services due minimal costs developers received notice apple january 1 2018 deadline change respective apps news caught attention congress congressman ted lieu writing letter apple beginning december asking reconsider writing understanding many small businesses research organizations religious institutions rely template apps possess resources develop apps in-house new rules cast wide net specifically invalidating apps longstanding legitimate developers pose threat app store ’ integrity additionally news stricter enforcement caused significant criticism app development firms one company told techcrunch chose close business following news saying 4.2.6 rule enforcement final drop made us move bit faster decision close another company told publication way june guidelines changed would said ‘ ’ going target apps ... apple told us ’ targeted quality standpoint hit umbrella spam shocking every quality developer good actors furthermore latter company stated ’ much apps perform utility – ordering food third company said rule 4.2.6 concrete illustration danger apple ’ dominant position fourth said ’ wiped pretty much entire industry diy tools like appmakr also development suites like titanium towards end year apple updated guideline clarify companies organizations allowed use template apps long directly publish app remained violation rule commercial app services publish apps respective clients january 2017 apple complied request chinese government remove chinese version new york times app followed government efforts 2012 block times website stories hidden wealth among family members then-leader china wen jiabao published statement apple spokesperson told media informed app violation local regulations though would specify regulations added result app must taken china app store situation changes app store offer new york times app download china following july reported apple begun remove listings china apps circumvent government internet censorship policies new laws restricting virtual private network vpn services apple issued statement explaining app removals result developers complying new laws china requiring government license businesses offering vpns apps remain available markets business earnings call following month cook elaborated recent news explainining would obviously rather remove apps like countries follow law wherever business besides vpn services number internet calling apps including microsoft skype also removed chinese app store 2017 apple telling new york times similar vpn apps new apps also violated local law microsoft explained bbc news skype app temporarily removed working reinstate app soon possible though many news outlets reported chinese government increased efforts pressure crack internet freedom following apple ceo tim cook appearance china world internet conference december 2017 cook stated apple china share vision developing digital economy openness shared benefits free speech human rights activists criticized cook company maya wang human rights watch told washington post cook ’ appearance lends credibility state aggressively censors internet throws people jail critical social ills building artificial intelligence systems monitors everyone targets dissent ... version cyberspace chinese government building decidedly dystopian one ’ think anyone would want share ‘ common future. ’ apple spoken endorsed u.s senator patrick leahy told cnbc american tech companies become leading champions free expression commitment end borders ... global leaders innovation like apple opportunity moral obligation promote free expression basic human rights countries routinely deny rights cook told reuters hope time things couple things ’ pulled come back great hope great optimism however techcrunch jon russell criticized line thinking writing firstly apple ’ remove couple things reach china-based users rather couple hundred apps acknowledging even counting furthermore russell listed censorship efforts chinese government including vpn bans restrictions live video messaging apps wrote apple little choice follow beijing ’ line order continue business lucrative chinese market statements like cook ’ today dangerous massively underplay severity situation florida senator marco rubio also criticized cook appearance world internet conference describing situation ’ example company view desperate access chinese market place willing follow laws country even laws run counter companies ’ standards supposed august 2018 result chinese regulations 25,000 illegal apps pulled apple app store china
[ 6788, 3603, 3940, 4668, 5726, 4675, 7890, 6428, 7169, 6429, 4320, 2926, 4690, 5386, 6440, 734, 740, 5752, 405, 745, 7555, 4348, 6125, 2233, 1120, 2594, 2954, 1123, 6847, 4003, 6142, 7938, 2609, 1895, 781, 1897, 4014, 4376, 5091, 5092, 4...
Train
6,313
9
Brouwer–Heyting–Kolmogorov_interpretation:brouwer–heyting–kolmogorov interpretation mathematical logic brouwer–heyting–kolmogorov interpretation bhk interpretation intuitionistic logic proposed l. e. j. brouwer arend heyting independently andrey kolmogorov also sometimes called realizability interpretation connection realizability theory stephen kleene interpretation states intended proof given formula specified induction structure formula interpretation primitive proposition supposed known context context arithmetic proof formula computation reducing two terms numeral kolmogorov followed lines phrased interpretation terms problems solutions assert formula claim know solution problem represented formula instance formula_7 problem reducing q p solve requires method solve problem q given solution problem p identity function proof formula formula_22 matter p law non-contradiction formula_23 expands formula_24 putting together proof formula_24 function formula_8 converts pair b – formula_30 proof p formula_31 function converts proof p proof formula_19 – proof formula_19 function formula_8 formula_42 proving law non-contradiction matter p indeed line thought provides proof formula_43 well formula_3 proposition hand law excluded middle formula_45 expands formula_46 general proof according interpretation proof formula_45 pair b 0 b proof p 1 b proof formula_17 thus neither p formula_17 provable neither formula_45 general possible logical system formal negation operator proof formula_2 exactly n't proof formula_2 see gödel incompleteness theorems bhk interpretation instead takes formula_2 mean formula_2 leads absurdity designated formula_19 proof ¬formula_2 function converting proof formula_2 proof absurdity standard example absurdity found dealing arithmetic assume 0 1 proceed mathematical induction 0 0 axiom equality induction hypothesis 0 equal certain natural number n 1 would equal n +1 peano axiom sm sn n since 0=1 therefore 0 would also equal n 1 induction 0 equal numbers therefore two natural numbers become equal therefore way go proof 0=1 proof basic arithmetic equality thus proof complex arithmetic proposition furthermore get result necessary invoke peano axiom states 0 successor natural number makes 0=1 suitable formula_19 heyting arithmetic peano axiom rewritten 0 n → 0 s0 use 0 1 validates principle explosion bhk interpretation depend view taken constitutes function converts one proof another converts element domain proof different versions constructivism diverge point kleene realizability theory identifies functions computable functions deals heyting arithmetic domain quantification natural numbers primitive propositions form x=y proof x=y simply trivial algorithm x evaluates number always decidable natural numbers otherwise proof built induction complex algorithms one takes lambda calculus defining notion function bhk interpretation describes correspondence natural deduction functions
[ 6223 ]
Validation
6,314
4
Kaspersky_bans_and_allegations_of_Russian_government_ties:kaspersky bans allegations russian government ties company kaspersky lab faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 alleging kaspersky lab worked secret projects russia federal security service fsb october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer national security agency contractor 2015 via kaspersky antivirus software kaspersky denied allegations stating software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland according international new york times kaspersky become one russia recognized high-tech exports market share united states hampered origins according gartner evidence back doors software ties russian mafia state ... still concern ’ operate russia without controlled ruling party ceo eugene kaspersky prior work russian military education kgb-sponsored technical college led allegations employed russia expose us cyberweapons though denies analysts gartner peter firstbrook say suspicions firm ’ russian roots hindered expansion us company denied direct ties engaged russian government august 2015 bloomberg news reported kaspersky lab changed course 2012 high-level managers left fired jobs often filled people closer ties russia military intelligence services people actively aid criminal investigations fsb kgb ’ successor using data 400 million customers kaspersky slammed bloomberg coverage blog calling coverage sensationalist guilty exploiting paranoia increase readership july 2017 december 2017 u.s. government agencies phased use kaspersky software july 2017 united states general services administration gsa removed kaspersky lab list vendors authorized business u.s. government amid reports bloomberg mcclatchy dc alleging kaspersky lab worked secret projects russia federal security service fsb anti-russian sentiment also grown country wake investigation russian interference 2016 presidential election kaspersky denied reports stating inappropriate ties government never received request russian government affiliated organization create participate secret projects including one anti-ddos protection 8 september 2017 u.s. electronics store chain best buy pulled kaspersky products amid concerns ties 13 september 2017 department homeland security issued order stating 90 days kaspersky products banned use within u.s. civilian federal government citing concerns ties certain kaspersky officials russian intelligence government agencies requirements russian law allow russian intelligence agencies request compel assistance kaspersky intercept communications transiting russian networks 6 october 2017 wall street journal —citing multiple people knowledge matter —alleged 2015 hackers working russian government used kaspersky antivirus software steal classified material home computer belonging national security agency nsa contractor according report incident occurred 2015 remained undiscovered early 2016 stolen material reportedly included details nsa penetrates foreign computer networks computer code uses spying defends networks inside u.s. new york times reported hacks discovered israeli intelligence agents hacked kaspersky network 11 october 2017 wall street journal additionally alleged russian intelligence uses kaspersky software scan computers worldwide material interest company denied reports arguing baseless paranoia witch hunt considered suspicious major u.s. media outlets simultaneously went us almost full force fantasized simultaneously receiving order 've got confused details 23 october 2017 kaspersky announced global transparency initiative would accountable security issues surrounding products would allow third-party analysts validate products business practices order validate integrity company stated trust must repeatedly earned ongoing commitment transparency accountability program reaffirmation company commitment earning maintaining trust customers partners every day 25 october 2017 kaspersky confirmed incident described wall street journal occurred 2014 result software detected zip file containing samples source code equation group user enabled kaspersky security network ksn features software files automatically uploaded kaspersky malware sample ksn analysis assumption new malware variant eugene kaspersky stated ordered sample destroyed kaspersky claimed antivirus software temporarily disabled pc user order install pirated copy microsoft office software re-enabled detected equation group code well unrelated backdoor infections created keygen program office may facilitated third-party access computer 13 november 2017 british intelligence agency mi6 raised suspicions kaspersky lab software distributed free 2 million uk barclays customers 2 december 2017 barclay announced would longer provide new customers company software also around 2 december 2017 britain national cyber security centre advised national security precaution uk government departments avoid russia-based anti-virus software kaspersky stated compelling case present extend advice wider public 9 december 2017 u.s. government banned kaspersky federal civilian military computers part broader defense bill january 2018 twitter banned kaspersky advertising twitter stating kaspersky lab operates using business model inherently conflicts acceptable twitter ads business practices citing department homeland security warning kaspersky 15 may 2018 kaspersky lab announced would migrating core infrastructure russia new data centres switzerland kaspersky software antivirus definitions foreign markets compiled digitally signed switzerland end 2018 products targeting russia still compiled existing domestic infrastructure user data foreign markets stored processed swiss servers end 2019 swiss operations overseen third-party organization holding access necessary verify trustworthiness products business processes accompanied one three planned transparency centre facilities responsible stakeholders allowed inspect kaspersky source code business practices verify integrity kaspersky stated move first foremost response evolving ultra-connected global landscape challenges cyber-world currently facing step goal accountable trustworthy business practices december 2017 february 2018 company sued trump administration arguing ban bill attainder violation due process arguing government unfairly tarnished kaspersky reputation cases dismissed may 30 2018 judge colleen kollar-kotelly former presiding judge foreign intelligence surveillance court declaring unsubstantial
[ 998, 5452, 74 ]
Test
6,315
1
Distributed_concurrency_control:distributed concurrency control distributed concurrency control concurrency control system distributed computer network bernstein et al 1987 weikum vossen 2001 database systems transaction processing transaction management distributed concurrency control refers primarily concurrency control distributed database also refers concurrency control multidatabase multi-transactional object environment e.g. federated database grid computing cloud computing environments major goal distributed concurrency control distributed serializability global serializability multidatabase systems distributed concurrency control poses special challenges beyond centralized one primarily due communication computer latency often requires special techniques like distributed lock manager fast computer networks low latency like switched fabric e.g. infiniband commitment ordering commit ordering general serializability technique achieves distributed serializability global serializability particular effectively large scale without concurrency control information distribution e.g. local precedence relations locks timestamps tickets thus without performance penalties typical serializability techniques raz 1992 common distributed concurrency control technique strong strict two-phase locking ss2pl also named rigorousness also common centralized concurrency control technique ss2pl provides serializability strictness commitment ordering properties strictness special case recoverability utilized effective recovery failure commitment ordering allows participating general solution global serializability large-scale distribution complex transactions distributed locking typical heavy performance penalty due delays latency saved using atomic commitment protocol needed distributed database distributed transactions atomicity e.g. two-phase commit simpler one reliable system together local commitment ordering variant e.g. local ss2pl instead distributed locking achieve global serializability entire system commitment ordering theoretical results applicable whenever atomic commitment utilized partitioned distributed recoverable transactional data including automatic distributed deadlock resolution technique utilized also large-scale parallel database single large database residing many nodes using distributed lock manager replaced homogeneous multidatabase comprising many relatively small databases loosely defined process supports transactions partitioned data participates atomic commitment complies fitting single node using commitment ordering e.g. ss2pl strict co together appropriate atomic commitment protocol without using distributed lock manager
[ 3801, 2961, 4159, 2411, 5209, 3951, 5289, 2359 ]
Test
6,316
7
Fork_Particle:fork particle fork particle computer graphics visual effects modeling software development kit sdk developed sold fork particle inc fork particle uses real time particle system technology simulate visual effects particle effects cgi explosions fire rain smoke dust etc fork particle used video games visual simulation software flight simulator licensed game developers windows macos linux playstation 3 playstation 4 xbox 360 xbox one notable fork particle licensees include ubisoft trickstar games firaxis games zenimax online studios electronic arts microsoft lego sony video games utilized fork particle ’ technology include elder scrolls online rocksmith 2014 edition empire earth iii lego universe splosion man sid meier civilization v sid meier civilization vi fork particle real time technology component particle engine meant integrated used video game engine computer graphics engine particle effects authored vfx artists designers using fork particle ’ effects modeling tool brought user ’ 3d computer graphics environment 2d computer graphics environment particle effects simulated fork particle ’ engine real time displayed user application ’ graphics engine fork particle sdk includes components real time particle engine fork runtime sdk particle editor modeling tool fork particle studio live update application particle effects editing fork live tuner particle effects definitions batch file exporter fork particle also includes incorporation integrations partner technologies
[ 4759, 5571, 7453, 578 ]
Test
6,317
4
Devuan:devuan devuan fork debian uses sysvinit instead systemd default newer debian releases project name portmanteau debian vua veteran unix admins release debian 8 alienated developers users due project adoption systemd first stable release devuan published may 25 2017 devuan package repository mirrors upstream debian local modifications made needed allow init systems systemd modified packages include policykit udisks devuan supposed work like corresponding debian release devuan provide systemd repositories still retains libsystemd0 removed dependencies instead continuing debian practice using toy story character names release codenames devuan aliases releases using planet names first stable release shared debian 8 codename jessie however devuan release named minor planet 10464 second stable release named ascii minor planet 3568 permanent alias devuan unstable branch ceres named dwarf planet devuan 2.0.0 ascii released june 9 2018
[ 2179, 2187, 2909, 5724, 6086, 2916, 3271, 7894, 2935, 6453, 2585, 2228, 1487, 58, 3996, 7587, 4008, 1893, 7954, 1523, 1909, 5803, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, ...
Test
6,318
3
Inindo:_Way_of_the_Ninja:inindo way ninja inindo way ninja 伊忍道 打倒信長 inindou datou nobunaga スーパー伊忍道 打倒信長 super inindou datou nobunaga super famicom version role-playing video game developed published koei originally released pc8801sr pc9801 msx2 home computer sharp x68000 remade super nes also released north america game fictional account japan warring states period set 1582 player assumes role iga ninja whose village destroyed conquest demonic warlord oda nobunaga ninja must travel across feudal japan enlisting aid numerous ninja sages hermits ronin samurai wizards companions order avenge clan game fictitious account end oda nobunaga campaign conquer unify japan beginning game references rebellion akechi mitsuhide honnō-ji temple historical nobunaga died committing seppuku time game point year 1601 would prior birth tokugawa shogunate tokugawa ieyasu actual game begins year 1582 player kill nobunaga end year 1601 game several hazardous dungeons stand path victory well selection optional dungeons played order player chooses encounters monsters outlaws occur randomly dungeons game world map player characters npcs move around battlefield turn-based fashion attack cast magic spells use items complete game player must recruit npcs order successfully survive dungeons large scale battles order recruit characters player must build certain degree trust talking tea houses inns every character recruited characters rival clans join player strategy war simulation elements game well gaining trust japanese feudal lord spying committing acts sabotage competing daimyo player join battle provinces characterized era outcome battles changes lords possession individual provinces alter outcome game aid hinder player progress neighboring provinces nobunaga must conquered order advance final section game middle stories player follows either normal path magician path randomly selected completing first dungeon quest path leads different enemies random encounters example magician path causes western mythological monsters hellhound marchosias appear due smaller resolution snes character names shortened chinese version ported ms-dos 1993 playable english os 2003 pc-9801 version game ported windows 98 part koei 25th anniversary pack vol.1 standalone version published 2005 windows version runs pc-9801 game emulator saving emulator emulates drive switching operation port requires use mouse third scenario inaccessible running emulated environment gamepro review called inindo impressive mix adventure fantasy epic military strategy good rpg featuring myth magic mayhem history great fantasy
[ 6380 ]
Test
6,319
9
BeanShell:beanshell beanshell java-like scripting language invented patrick niemeyer runs java runtime environment jre uses variation java syntax addition scripting commands syntax beanshell allows users define functions called within script underpinning philosophy pollute syntax many extensions syntactic sugar thereby ensuring code written java compiler usually executed interpretively beanshell without changes almost much vice versa makes beanshell popular testing debugging tool java virtual machine jvm platform beanshell supports scripted objects simple method closures like perl javascript beanshell open source project incorporated many applications apache openoffice apache ant weblogic server application server apache jmeter jedit imagej jump gis apache taverna many others beanshell provides easy integrate application programming interface api also run command-line mode within graphical environment first versions beanshell 0.96 1.0 released patrick niemeyer 1999 followed series versions beanshell 1.3.0 released august 2003 version 2.0b1 released september 2003 culminating version 2.0b4 may 2005 january 2015 newest release posted official webpage beanshell included linux distribution debian since 1999 beanshell undergoing standardization java community process jcp jsr 274 following jcp approval beanshell jsr review ballot june 2005 visible activity taking place around beanshell jsr 274 status dormant since java 9 java instead includes jshell different read–eval–print loop repl shell based java syntax indicating beanshell continued fork beanshell beanshell2 created may 2007 now-defunct google code web site beanshell2 project made number fixes enhancements beanshell multiple releases latest version beanshell2 v2.1.8 released february 2014 since closure google code project hosted github december 2012 following proposal accept beanshell apache incubator project beanshell licensed apache software foundation migrated apache extras changing license apache license 2.0 project accepted instead projected become part apache commons future time due changes developers personal circumstances beanshell community however complete move apache remained apache extras project since released beanshell 2.0b5 used apache openoffice apache taverna windows automated installer beanshell double-click created 2013 includes desktop integration features
[ 2624, 6507, 1524, 2451, 3077, 5015, 5983, 631, 7347, 1361, 5571, 6280, 1102, 7459, 401, 7460, 2487, 3879, 7277, 5408, 7109, 7391, 7848, 1975, 2881, 4185, 2519, 2520, 4997, 3915, 6156, 6778, 2619, 2807, 4287 ]
Train
6,320
1
Database_preservation:database preservation database preservation usually involves converting information stored database form likely accessible long term technology changes without losing initial characteristics context content structure appearance behaviour data version 1.0 software independent archiving relational databases siard format developed swiss federal archives 2007 designed archiving relational databases vendor-neutral form siard archive zip-based package files based xml sql:1999 siard file incorporates database content also machine-processable structural metadata records structure database tables relationships zip file contains xml file describing database structure metadata.xml well collection xml files one per table capturing table content siard archive may also contain text files binary files representing database large objects blobs clobs siard permits direct access individual tables exploring zip tools siard archive operational database supports re-integration archived database another relational database management system rdbms supports sql:1999 addition siard supports addition descriptive contextual metadata recorded database embedding documentation files archive siard version 1.0 homologized standard ech-0165 2013 version 2.0 siard preservation format designed developed swiss federal archives auspices e-ark project version 2.0 based version 1.0 defines format backwards-compatible version 1.0 new features version 2.0 include xml schema created researcher josé carlos ramalho university minho capture table information data relational database published 2007 database preservation toolkit dbptk allows conversion database formats including connection live systems purposes digitally preserving databases toolkit allows conversion live backed-up databases preservation formats siard xml-based format created purpose database preservation toolkit also allows conversion preservation formats back live systems allow full functionality databases example supports specialized export mysql optimized phpmyadmin database fully experimented using web interface toolkit originally part roda project released developed e-ark project together new version siard preservation format toolkit uses input output modules module supports read and/or write particular database format live system new modules easily added implementation new interface adding new drivers research projects regard include
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 4054, 6636, 2663, 4424, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 2054, 6932, 6386, 684, 6390, 7937, 7303, 6144, 4457, 1902, 6594 ]
Test
6,321
5
Locator/Identifier_Separation_Protocol:locator/identifier separation protocol locator/id separation protocol lisp map-and-encapsulate protocol developed internet engineering task force lisp working group basic idea behind separation internet architecture combines two functions routing locators client attached network identifiers client one number space ip address lisp supports separation ipv4 ipv6 address space following network-based map-and-encapsulate scheme lisp identifiers locators ip addresses arbitrary elements like set gps coordinates mac address internet architecture board october 2006 routing addressing workshop renewed interest design scalable routing addressing architecture internet key issues driving renewed interest include concerns scalability routing system impending exhaustion ipv4 address space since iab workshop several proposals emerged attempted address concerns expressed workshop proposals based common concept separation locator identifier numbering internet devices often termed loc/id split current namespace architecture used internet protocol uses ip addresses two separate functions several advantages decoupling location identifier lisp specifically recent discussion several lisp use cases may found ietf active workgroup establishing standards lisp 2016 lisp specifications experimental track lisp workgroup plans moving core specifications onto standards track 2017 locator/identifier separation protocol network elements routers responsible looking mapping end-point-identifiers eid route locators rloc process invisible internet end-hosts mappings stored distributed database called mapping system responds lookup queries lisp beta network initially used bgp-based mapping system called lisp alternative topology lisp+alt replaced dns-like indexing system called ddt inspired lisp-tree protocol design made easy plug new mapping system different design proved benefits proposals already emerged compared testbed developed gain real-life experience lisp participants include google facebook ntt level3 intouch n.v. internet systems consortium january 2014 around 600 companies universities individual contributors 34 countries involved geographical distribution participating routers prefixes responsible observed lispmon project website updated daily multi-company lisp-community initiative lisp4.net/lisp6.net publishes relevant information beta network http //www.lisp4.net/ http //www.lisp6.net/ lisp-lab project coordinated upmc/lip6 aims building lisp network experimentation platform exclusively built using open source lisp nodes openlisp acting itr/etr tunnelling routers ms/mr mapping servers/resolvers ddt root proxy itr/etr partners include two academic institutions upmc tpt two cloud networking sme alphalink nss two network operators renater orange two smes access/edge networking border 6 ucopia one internet exchange point rezopole information http //www.lisp-lab.org platform opened external partners 2014/2015 already interconnected lisp beta network openlisp ddt root lisp also key component number commercial offerings njedge.net vinci consulting provide lisp based services icao considering ground-based lisp candidate technology next-generation aeronautical telecommunications network atn solution development part sesar single european sky atm research fci activities several proposals separating two functions allowing internet scale better proposed instance gse/8+8 network based solution shim6 hip ilnp host based solutions
[ 3821, 1462, 1134, 4543, 5181, 4014, 578 ]
Test
6,322
3
Flicky:flicky idea flicky came sega senior leadership wanted exceed success namco mappy 1983 yoji ishii yoshiki kawasaki developed flicky sega one year originally game simply player catch ambiguous dots maze taking inspiration popular song japanese variety show kawasaki gave game urban theme bird characters game originally titled busty flippy finally settling flicky flicky first ported sg-1000 japan later japanese home consoles 1991 flicky released north america europe sega genesis character continued hold cameo appearances sega video games notably within sonic hedgehog series flicky platform game player takes control flightless blue bird named flicky ability run side-to-side jump player must collect small yellow birds called chirps take exit clear round according game artist yoshiki kawasaki flicky friend chirps although players may think mother chirps follow flicky chain collected exit bonus points awarded bringing multiple chirps back single chain 48 total stages stage takes place single wraparound screen scrolls horizontally flicky always center stages completed game loops infinitely increased difficulty mode collected chirps disperse chain comes contact enemy chirps wear sunglasses chirps behave unpredictably dispersed two enemy types standard rounds house cats called tigers green iguanas called iggys enemies simply avoided also defeated throwable items available levels items include telephones flower pots cups bottles flicky pick item walking throw jumping sometimes diamonds may appear thrown rather provide bonus points also bonus rounds flicky attempts catch many falling chirps possible net spark develop flicky came sega desire exceed namco mappy 1983 become popular japanese arcades sega game designer yoji ishii boss wanted design similar dot eater game better flicky developed course one year designed yoji ishii collaboration artist yoshiki kawasaki game evolved simple game kawasaki first envisioned player would catch dots maze took inspiration popular song sparrows power lines 1970s japanese variety show migoro tabegoro waraigoro made main character sparrow platforms walls wires however found power line theme boring thus changed background apartment building taking inspiration one outside office window kawasaki felt anyone around children experienced emotion wanting keep children safe outside returning safe home team wanted imbue message protect children game according kawasaki emotion drives flicky kawasaki used poorly calibrated graphics tablet draw game graphics chirps originally ambiguous dots would disappear collected kawasaki changed dots trailed player increased size 8x8 pixels make way interesting design size large enough simple chick design add difficulty game chirps programmed behave unpredictably touched enemy chirps given sunglasses deemed bad chirps game testing began team created 100 levels four background designs barely space left game kawasaki able change colors backgrounds create variety testing iggy added game flicky originally titled busty american sega branch asked team change term slang usage english game titled flippy changed shortly release 2002 ishii stated trademark issues united states 2018 said flippy similar mappy flicky released arcades may 1984 like many early 1980s sega arcade games flicky ported sg-1000 console port retains 40 arcade levels restructured feature iggy enemy addition behavior chirps slightly modified graphics changed version later ported several home platforms japan including msx sharp x1 fujitsu fm-7 nec pc-8801 1991 flicky ported sega genesis released north america europe japan port released sega meganet genesis port flicky reviewed multiple western publications found game poor graphics sound highly addictive enjoyable gameplay reviewers noted poor initial impressions based appearance sound found sprites simple colors garish music repetitive however began play game found simple appearance complemented simple yet engaging gameplay computer video games described flicky guilty pleasure discussed cute appearance positive light reviewers electronic gaming monthly concluded game aimed children based game cuteness aesthetic provided lower scores accordingly critics computer video games mean machines wrote employees offices disappearing game room play flicky julian mean machines wrote crazy know game crappy laughably-simple pathetic sounding prove addictive challenging long-lasting virtually mega drive game true numerous sega video game compilations feature flicky genesis version compiled game kanzume vol 1 1994 sega cd compilation japan featured cd quality remixes original soundtrack genesis port also featured sonic mega collection 2002 sega genesis collection 2006 sonic ultimate genesis collection 2009 sega mega drive classic collection 2010 even genesis-based plug play devices arcade version released japan sega ages memorial collection vol 1 1996 sega saturn sega memorial selection 1998 windows flicky also ported mobile devices first port 2001 sega ages line japan march 2003 similar variant appeared sonic cafe service exclusive japan 2007 sonic cafe port upgraded better graphics ported north america sega mobile service genesis port released steam 2010 flicky character made cameo appearances several sega arcade games effectively becoming mascot sega early arcade years teddy boy blues 1985 appears shooting target among sega mascots pengo puzzle game bloxeed used special weapon drop blocks playing field also playable sdi 1987 use cheat code flicky minor cameo appearance flash point wish player good luck round racing game super monaco gp 1989 appears racetrack banners game screen flicky also become entire species reoccurring minor character sonic hedgehog series featured prominently sonic 3d flickies island 1996 flicky continued minor cameo appearances sega titles including shenmue 1999 gunstar super heroes 2005 mario sonic olympic games 2007
[ 4759 ]
Test
6,323
4
Zerodium:zerodium zerodium american information security company founded 2015 based washington d.c.. main business acquiring premium zero-day vulnerabilities functional exploits security researchers companies reporting research along protective measures security recommendations corporate government clients founder chaouki bekrar also known founding vupen defunct 2015 zerodium first company release full pricing chart zero-days ranging 5,000 1,500,000 per exploit company reportedly spending 400,000 600,000 per month vulnerability acquisitions
[ 3932, 4025, 7328, 1528, 2991, 7799, 2190, 2912, 376, 1173, 7066, 6526, 998, 3528, 3277, 2923, 7818, 208, 2021, 3864, 5922, 6628, 6904, 5305, 1376, 6541, 6194, 924, 1383, 2854, 7600, 6740, 5675, 2587, 2678, 3038, 4531, 5330, 600, 1307, 3...
Train
6,324
1
FAME_(database):fame database fame forecasting analysis modeling environment time series database sungard comes along suite apis domain-specific programming language fame software environment several development phases long history lawrence c. rafsky founded gemnet software corp create fame 1981 independent software company located ann arbor michigan first version software delivered harris bank 1983 company purchased citicorp 1984 time development focused time series oriented database engine 4gl scripting language citigroup sold fame private investors headed warburg pincus 1994 management focused fixing bugs developing remote database server access fame invested expanding fame database engine emphasis also placed extending fame creating object-oriented java interface called timeiq replicated many features fame 4gl java period also saw release accesspoint provides url access fame objects multiple output formats acquisition fame sungard 2004 resulted new set priorities focused core fame engine extending 4gl scripting language including another key goal modernize tools support working fame software environment example developers worked leverage fame web access transform fame software run service allows developers architects plug online analytical processing capabilities fame software existing enterprise software empower internal systems better handle complex queries made financial professionals many fame customers run environment within overall technology stack providing improved access wider distribution data analytics rather access standalone fame installations enterprise-oriented technology teams load fame databases procedures within multiple client analytical database server mcadbs providing access fame data via browser applications microsoft excel statistical applications advanced reporting systems crystal reports 2010 sungard merged fame marketmap data marketmap brand fis global acquired sungard 2015 early fame ’ evolution customers obtained loaders company required build maintain processes loading vendor feeds sungard provides service delivers content throughout day fame siteserver fame channel finds fame desktop add-in excel fame desktop excel add-in supports =fmd =fms formula 4gl command prompt formulas placed excel spreadsheets linked fame objects analytics stored fame server sample excel templates research analytics act accelerators clients available template library fame desktop add-in first renamed fame populator marketmap analytics fame connector matlab matlab environment technical computing applications also used financial sector fixed income analysts equity research groups investment firms customers store content fame use matlab access model data matlab-fame connector uses fame java toolkit link matlab scripts fame objects bita curve connector bita curve workstation provides platform link “ database ” analytics content warehoused fame bita curve connector fame users better visualize work content warehouse fame r interface fame customers developed released free software interface links fame objects open source r statistical package originally developed federal reserve board features include sasefame sas provides interface fame databases called sasefame provides dynamic read write access sas application fame databases fame server process troll interface troll ’ interface fame provides read write access troll application fame server directly local fame database 1982–1994 gemnet introduced first release fame 1983 citicorp purchased company 1984 development milestones period mcadbs users could use thin c hli client leverage power 4gl remote host via client/server tcp 7.5 release also introduced important 4gl features including postscript reports database features global names formulas 1994–2004 period focus improving managed content delivery onsite fame warehouses hosted asp fame servers milestones included 2004–present acquired sungard fame ’ development focus shifted 4gl scripting language core fame features milestones included fame 9.2 also added new 4gl debugging features analytical functions graphics reporting improvements core 4gl features included move function new forms shift filespec functions fame search command enhanced path option support memory mapped fame databases tune cache megabytes option helped users better manage large volume warehouses fame 9.3 also introduced new graphical features including bubble charts fame 10 opens environment real-time analysis larger database storage well support new frequencies millisecond weekly patterns new database formats increase maximum size 256 gb period fame also focused expanding managed content delivered database well out-of-the-box object models warehouse builders leverage loading proprietary content
[ 4070 ]
Test
6,325
3
Macintosh_XL:macintosh xl macintosh xl modified version apple lisa personal computer made apple computer inc macintosh xl configuration computer shipped macworks xl lisa program allowed 64 k macintosh rom emulation identical machine previously sold lisa 2/10 lisa os macintosh xl 400k 3.5 floppy drive internal 10 mb proprietary widget hard drive provision optional 5 10 mb external profile hard drive addition parallel interface card machine uses motorola 68000 cpu clocked 5 mhz together 512kb ram time release january 1985 macintosh xl colloquially referred hackintosh although name since used generally describe macintosh computers assembled unusual combinations parts apple transition intel processors denote pcs running osx86 hacked version mac os x macintosh xl discontinued april 1985 roots lisa — unlike macintosh computers — stock macintosh xl used rectangular pixels resolution macintosh xl 12 inch 30.5 cm display 720x364 square pixels available via macintosh xl screen kit upgrade changed resolution 608x432 cpu could replaced new cpu board containing 8 mb ram called xlerator 18 maximum upgraded ram conventional add-in ram cards 2 mb four times larger maximum capacity earlier macintosh computers modifications cpu board macintosh xl could accommodate 4 mb ram macworks plus developed sun remarketing successor macworks xl order provide application compatibility macintosh plus computer macworks plus added support 800 kb 3.5-inch floppy disk system software version 6.0.3 macworks plus ii extended 7.5.5 limit imposed 68000 processors re-badging xl last-ditch effort apple save poorly selling lisa usurped macintosh line two years marginal sales apple unprepared record number orders placed newest member macintosh family despite relative success macintosh xl discontinued unavailable parts ordered keep xl production last parts ran apple made decision shut production good 1986 apple offered lisa/xl owners opportunity turn computer along us 1,498 receive exchange macintosh plus hard disk 20 list price us 4,098 time apple dropped xl price list september 1985 sun remarketing logan utah bought number apple remaining inventory continued sell license updated version macworks plus re-branded macintosh professional though new lisas available sale development continued macworks plus support installed base lisas making relevant closely related cousin macintosh plus macintosh xl shares legacy lisa however increased sales emulation macintosh operating system proved macintosh family badly needed professional environment could support larger monitors greater memory expandability macintosh 512k offered
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 405, 2954, 7572, 6482, 5079, 6142, 4373, 7226, 2978, 7601, 4749, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1599, 1234, 1237, 7311, 889, ...
Validation
6,326
4
Trust_no_one_(Internet_security):trust one internet security trust one tno approach towards internet software security issues internet communication software packages sort secrecy needed usually sort encryption applied trust one approach teaches one oneself trusted comes storage keys behind applied encryption technology many encryption technologies rely trust external party instance security secure end-to-end ssl connections relies trust certificate authority ca trust one design philosophy requires keys encryption always stay hands user applies implies external party access encrypted data assumed encryption strong enough also implies external party provide backup mechanism password recovery although philosophy trust one least assures reliability communication user creates real life society many communication means rely trust relationship least two parties tno crypt microsoft store example utility leverages methodology https //www.microsoft.com/en-us/p/tno-crypt/9phgpmz9dkvf activetab=pivot overviewtab
[ 907, 363, 7729, 826 ]
Test
6,327
4
Blancco:blancco blancco ltd. international data security company specializes data erasure computer reuse corporations governments computer remarketing companies founded headquartered joensuu finland company operates offices across europe north america middle east russia asia australasia blancco wholly owned subsidiary regenersis strategic outsourcing company consumer technology companies 1997 janne tervo kim väisänen co-founded carelian innovation ltd company ’ first data erasure product blancco data cleaner released 1999 2000 carelian innovations ltd. changed name blancco ltd. sun microsystems blancco formed partnership 2007 deliver secure flexible data erasure solutions 2007 blancco approved included nato information assurance product catalogue niapc company expanded product line 2008 introduction blancco 4.5 client series added server support data center edition enables safe reuse hard drives mass storage environments clients sun hp emc need deep data expunging company released blancco mobile smartphone erasure 2012 2011 blancco lun launched 2012 blancco 5 management console 3 released company also acquired dban 2012 received common criteria certification year blancco acquired regenersis april 2014 blancco ’ data wipe products scale single reusable pc erasure tool software erasure requirements mass storage environments data centers various versions support erasure different hardware configurations blancco ’ security certificates approvals include common criteria iso 15408 communications electronics security group united kingdom information technology group cesg nato listed nato information assurance product catalogue
[ 1020, 2813, 6272, 3764, 5150, 5635, 6208, 1300, 4957, 7110, 4536 ]
Test
6,328
4
Asprox_botnet:asprox botnet asprox botnet network hacking tool used gain access ipv4 address network attacks microsoft windows mac e-mails untrusted websites social networking websites block fresh installation software compromise devices like computers printers ipads phones tablets playstation infection removed anti-virus like norton mcafee avast avg webroot etc network firewall lock programming tool security remove infection prevent network contamination future well since discovery 2008 asprox botnet involved multiple high-profile attacks various websites order spread malware botnet consists roughly 15,000 infected computers may 2008 although size botnet highly variable controllers botnet known deliberately shrink later regrow botnet order prevent aggressive countermeasures community botnet propagates somewhat unusual way actively searches infects vulnerable websites running active server pages finds potential target botnet performs sql injections website inserting iframe redirects user visiting site site hosting malware botnet usually attacks waves goal wave infect many websites possible thus achieving highest possible spread rate wave completed botnet lay dormant extended amount time likely prevent aggressive counterreactions security community initial wave took place july 2008 infected estimated 1,000 2,000 pages additional wave took place october 2009 infecting unknown number websites another wave took place june 2010 increasing estimated total number infected domains 2,000 estimated 10,000 13,000 within day infection targets asprox botnet randomly determined google searches high-profile websites infected past infections received individual coverage
[ 2173, 623, 2632, 2376, 1632, 6715, 7441, 3281, 651, 7186, 2577, 5401, 6740, 6370, 5675, 7657, 51, 3480, 7294, 2693, 2789, 7307, 3154, 7600, 2535, 4110 ]
Test
6,329
3
UltraSPARC_T2:ultrasparc t2 sun microsystems ultrasparc t2 microprocessor multithreading multi-core cpu member sparc family successor ultrasparc t1 chip sometimes referred codename niagara 2 sun started selling servers t2 processor october 2007 t2 commodity derivative ultrasparc series microprocessors targeting internet workloads computers storage networking devices processor manufactured 65 nm available eight cpu cores core able handle eight threads concurrently thus processor capable processing 64 concurrent threads new features include 8 stages integer operations instead 6 t1 t2 processor found following products sun fujitsu computer systems sun also licensed t2 processor themis computer introduced first non-sun t2-based servers 2008 april 2008 sun released servers based ultrasparc t2 plus processor smp capable version ultrasparc t2 sun released ultrasparc t2 plus processor following changes ultrasparc t2 plus processors found following products sun fujitsu computer systems two-way smp servers four-way smp server high performance computing virtual laboratory canada built compute cluster using 78 sun sparc enterprise t5140 servers two 1.2 ghz t2 plus chips t5140 server cluster close 10,000 compute threads making ideal high-throughput workloads like t1 t2 supports hyper-privileged execution mode sparc hypervisor runs mode partition t2 system 64 logical domains two-way smp t2 plus system 128 logical domains run independent operating system instance ultrasparc t2 offers variety performance improvements former ultrasparc t1 processor ultrasparc t2 performance related tunings documented oracle engineers blogs peak power consumption go high 123 watts t2 typically consumes 95 watts nominal system operation 72 watts t1 sun explains due higher degree system integration onto chip april 12 2006 sun announced tape-out ultrasparc t2 sun announced t2 release 7 august 2007 billing world fastest microprocessor april 9 2008 sun announced ultrasparc t2 plus december 11 2007 sun made ultrasparc t2 processor design publicly available gnu general public license via opensparc project release includes
[ 3761, 6329, 1254, 1258, 2992, 5373, 1263, 7535, 1185, 1937, 7639, 2299, 4418, 7453, 3294, 3026, 4515, 4967, 6029, 2765, 3219, 418, 763, 515, 1590, 8138, 7499, 1237, 3156, 8145, 7777, 441, 971 ]
Test
6,330
3
PSX_(digital_video_recorder):psx digital video recorder psx sony digital video recorder fully integrated playstation 2 video game console released japan december 13 2003 since designed general-purpose consumer video device marketed main sony corporation instead sony computer entertainment carry usual playstation branding high cost resulted poor sales meaning psx never released outside japan making commercial failure device fully functional digital video recorder included infrared remote control s-video composite video rf inputs able tune analog vhf catv also linked playstation portable transfer photos videos music via usb ports features software non-linear video editing image editing audio editing dvd+r support introduced future update first device use sony xrossmediabar xmb graphical user interface later used playstation portable playstation 3 2008-era bravia tvs psx fully supports playstation playstation 2 software slot-loading dvd drive onboard ee+gs chip unification ps2 emotion engine graphics synthesizer chips online game compatibility available using broadband connection games use ps2 hdd final fantasy xi supported well psx supplied game controllers two controller ports back device psx compatible standard ps/ps2 controllers memory cards exception pocketstation variant dualshock 2 controller marketed specifically psx also sold featured 4-meter long cord bit longer standard versions controller two playstation memory card ports front psx behind panel cover different placement memory card slots located controller ports standard ps2 consoles psx incompatible playstation multitap ps2 counterpart psx-compatible multitap ever produced games require use two usb ports also incompatible psx like standard ps2 consoles psx laid horizontally stood vertically psx released eight retail configurations lifespan 5000 series embossed logo top grey stripe back shipped 160 gb hard disk drives 7000 series colored logo top black stripe back contained 250 gb drives software updates made available disc download 7500/7700 models added ghost reduction tuner inclusion bs uhf/vhf connectors varied model final revision series supported playstation portable video export via memory stick revisions console support psp games compatible umd discs models two sets indicator lights power lights infrared receivers one along front horizontal orientation second strip along top-back vertical orientation 'disk rec indicator front device later models known ps1 first playstation console came known colloquially provisional codename psx adopted echo msx home computer standard sold sony companies throughout 1980s cause confusion device referred psx initially displayed ceatec white silver yellow red blue white variant released commercially limited edition silver model made available 2004
[ 7232, 2903, 450, 2177, 7962, 7514, 4761, 638, 6621, 4408, 481, 5571, 746, 7014, 4718, 6217, 602, 2873, 424, 253, 4006, 5526, 1237, 4011, 4911, 5446, 4748 ]
Validation
6,331
7
Open_Architecture_Computing_Environment:open architecture computing environment open architecture computing environment oace specification aimed provide standards-based computing environment order decouple computing environment software applications proposed united states department defense 2004
[ 4482 ]
Test
6,332
3
Xeon_Phi:xeon phi xeon phi series x86 manycore processors designed made intel intended use supercomputers servers high-end workstations architecture allows use standard programming languages apis openmp since originally based earlier gpu design intel shares application areas gpus main difference xeon phi gpgpu like nvidia tesla xeon phi x86-compatible core less modification run software originally targeted standard x86 cpu initially form pcie-based add-on cards second generation product codenamed knights landing announced june 2013 second generation chips could used standalone cpu rather add-in card june 2013 tianhe-2 supercomputer national supercomputer center guangzhou nscc-gz announced world fastest supercomputer used intel xeon phi coprocessors ivy bridge-ep xeon processors achieve 33.86 petaflops xeon phi product line directly competes nvidia tesla amd radeon instinct lines deep learning gpgpu cards larrabee microarchitecture development since 2006 introduced wide 512-bit simd units x86 architecture based processor design extended cache-coherent multiprocessor system connected via ring bus memory core capable four-way multithreading due design intended gpu well general purpose computing larrabee chips also included specialised hardware texture sampling project produce retail gpu product directly larrabee research project terminated may 2010 another contemporary intel research project implementing x86 architecture many-multicore processor 'single-chip cloud computer prototype introduced 2009 design mimicking cloud computing computer datacentre single chip multiple independent cores prototype design included 48 cores per chip hardware support selective frequency voltage control cores maximize energy efficiency incorporated mesh network inter-chip messaging design lacked cache-coherent cores focused principles would allow design scale many cores teraflops research chip prototype unveiled 2007 experimental 80-core chip two floating point units per core implementing 96-bit vliw architecture instead x86 architecture project investigated intercore communication methods per-chip power management achieved 1.01 tflops 3.16 ghz consuming 62 w power intel many integrated core mic prototype board named knights ferry incorporating processor codenamed aubrey isle announced 31 may 2010 product stated derivative larrabee project intel research including single-chip cloud computer development product offered pcie card 32 in-order cores 1.2 ghz four threads per core 2 gb gddr5 memory 8 mb coherent l2 cache 256 kb per core 32 kb l1 cache power requirement ~300 w built 45 nm process aubrey isle core 1,024-bit ring bus 512-bit bi-directional connects processors main memory single board performance exceeded 750 gflops prototype boards support single precision floating point instructions initial developers included cern korea institute science technology information kisti leibniz supercomputing centre hardware vendors prototype boards included ibm sgi hp dell others knights corner product line made 22 nm process size using intel tri-gate technology 50 cores per chip intel first many-cores commercial product june 2011 sgi announced partnership intel use mic architecture high performance computing products september 2011 announced texas advanced computing center tacc use knights corner cards 10 petaflops stampede supercomputer providing 8 petaflops compute power according stampede comprehensive petascale computing environment second generation intel knights landing mics added become available increasing stampede aggregate peak performance least 15 petaflops 15 november 2011 intel showed early silicon version knights corner processor 5 june 2012 intel released open source software documentation regarding knights corner 18 june 2012 intel announced 2012 hamburg international supercomputing conference xeon phi brand name used products based many integrated core architecture june 2012 cray announced would offering 22 nm 'knight corner chips branded 'xeon phi co-processor 'cascade systems june 2012 scalemp announced virtualization update allowing xeon phi transparent processor extension allowing legacy mmx/sse code run without code changes important component intel xeon phi coprocessor core vector processing unit vpu vpu features novel 512-bit simd instruction set officially known intel initial many core instructions intel imci thus vpu execute 16 single-precision sp 8 double-precision dp operations per cycle vpu also supports fused multiply-add fma instructions hence execute 32 sp 16 dp floating point operations per cycle also provides support integers vpu also features extended math unit emu execute operations reciprocal square root logarithm thereby allowing operations executed vector fashion high bandwidth emu operates calculating polynomial approximations functions 12 november 2012 intel announced two xeon phi coprocessor families using 22 nm process size xeon phi 3100 xeon phi 5110p xeon phi 3100 capable 1 teraflops double precision floating point instructions 240 gbit/s memory bandwidth 300 w. xeon phi 5110p capable 1.01 teraflops double precision floating point instructions 320 gbit/s memory bandwidth 225 w. xeon phi 7120p capable 1.2 teraflops double precision floating point instructions 352 gbit/s memory bandwidth 300 w. 17 june 2013 tianhe-2 supercomputer announced top500 world fastest tianhe-2 used intel ivy bridge xeon xeon phi processors achieve 33.86 petaflops fastest list two half years lastly november 2015 cores knights corner based modified version p54c design used original pentium basis intel mic architecture leverage x86 legacy creating x86-compatible multiprocessor architecture use existing parallelization software tools programming tools include openmp opencl cilk/cilk plus specialised versions intel fortran c++ math libraries design elements inherited larrabee project include x86 isa 4-way smt per core 512-bit simd units 32 kb l1 instruction cache 32 kb l1 data cache coherent l2 cache 512 kb per core ultra-wide ring bus connecting processors memory knights corner instruction set documentation available intel code name second generation mic architecture product intel intel officially first revealed details second generation intel xeon phi products 17 june 2013 intel said next generation intel mic architecture-based products available two forms coprocessor host processor cpu manufactured using intel 14 nm process technology knights landing products include integrated on-package memory significantly higher memory bandwidth knights landing contains 72 airmont atom cores four threads per core using lga 3647 socket supporting 384 gb far ddr4 2133 ram 8–16 gb stacked near 3d mcdram version hybrid memory cube core two 512-bit vector units supports avx-512 simd instructions specifically intel avx-512 foundational instructions avx-512f intel avx-512 conflict detection instructions avx-512cd intel avx-512 exponential reciprocal instructions avx-512er intel avx-512 prefetch instructions avx-512pf national energy research scientific computing center announced phase 2 newest supercomputing system cori would use knights landing xeon phi coprocessors 20 june 2016 intel launched intel xeon phi product family x200 based knights landing architecture stressing applicability traditional simulation workloads also machine learning model lineup announced launch included xeon phi bootable form-factor two versions standard processors processors integrated intel omni-path architecture fabric latter denoted suffix f model number integrated fabric expected provide better latency lower cost discrete high-performance network cards 14 november 2016 48th list top500 contained 10 systems using knights landing platforms pcie based co-processor variant knight landing never offered general market discontinued august 2017 included 7220a 7240p 7220p coprocessor cards intel announced discontinuing knights landing summer 2018 models boost peak speeds adding 200 mhz base frequency running one two cores running three maximum number cores chips boost 100 mhz base frequency chips run high-avx code frequency reduced 200 mhz knights hill codename third-generation mic architecture intel announced first details sc14 manufactured 10 nm process knights hill expected used united states department energy aurora supercomputer deployed argonne national laboratory however aurora delayed favor using advanced architecture focus machine learning 2017 intel announced knights hill canceled favor another architecture built ground enable exascale computing future new architecture expected 2020–2021 terms exascale computing high performance computing hpc got meanwhile linked intel towards term omni-path architecture opa publications knights mill intel codename xeon phi product specialized deep learning initially released december 2017 nearly identical specifications knights landing knights mill includes optimizations better utilization avx-512 instructions enables 4-way hyperthreading single-precision variable-precision floating-point performance increased expense double-precision floating-point performance empirical performance programmability study performed researchers authors claim achieving high performance xeon phi still needs help programmers merely relying compilers traditional programming models still far reality however research various domains life sciences deep learning computer-aided engineering demonstrated exploiting thread- simd-parallelism xeon phi achieves significant speed-ups
[ 2449, 2000, 2814, 5802, 6698, 6793, 3262, 3942, 7428, 3849, 4765, 5371, 3443, 6170, 6344, 6987, 4408, 7449, 5042, 7453, 3020, 7364, 4962, 3717, 5669, 5670, 584, 3803, 4802, 1867, 1031, 3565, 239, 4985, 766, 2961, 2248, 691, 5343, 866, 4...
Test
6,333
4
Self-XSS:self-xss self-xss social engineering attack used gain control victims web accounts self-xss attack victim attack unknowingly runs malicious code web browser thus exposing attacker self-xss operates tricking users copying pasting malicious content browsers web developer console usually attacker posts message says copying running certain code user able hack another user account fact code allows attacker hijack victim account past similar attack took place users tricked pasting malicious javascript address bar browser vendors stopped preventing easily running javascript address bar attackers started using self-xss current form web browser vendors web sites taken steps mitigate attack mozilla firefox google chrome begun implementing safeguards warn users self-xss attacks facebook google+ others display warning message users open web developer console link pages explaining attack detail self part name comes fact user attacking themself xss part name comes abbreviation cross-site scripting attacks result malicious code running legitimate site however attacks n't much else common xss attack website users protect fixed site operator making site secure whereas self-xss social engineering attack user savvy users protect site operator anything
[ 2451, 6305 ]
Train
6,334
8
Adobe_Atmosphere:adobe atmosphere adobe atmosphere informally abbreviated atmo software platform interacting 3d computer graphics 3d models created commercial program could explored socially using browser plugin available free charge atmosphere originally developed attitude software 3d anarchy later bought adobe systems product spent majority lifetime beta testing adobe released last version atmosphere version 1.0 build 216 february 2004 discontinued software december year atmosphere focused explorable worlds later officially called environments linked together portals analogous world wide web hyperlinks portals represented spinning squares red green blue revolved around floated ground portals indicative atmosphere team desire mirror functionality web pages although world described codice_1 codice_2 file images sounds kept separately usually gif wav mp3 format objects worlds scriptable using specialized dialect javascript allowing immersive environment worlds could generated dynamically using php using javascript world author could link object web page user could example launch web page clicking billboard advertisement ctrl+shift+click earlier versions version 1.0 atmosphere also boasted support using macromedia flash animations windows media video textures atmosphere-based worlds consisted mainly parametric primitives floors walls cones primitives could painted solid color given image-based texture made subtractive invisible subtractive primitives could used cut holes primitives build complex shapes many worlds also contained animated polygon meshes made possible atmosphere implementation subcomponent viewpoint corporation viewpoint media player however viewpoint stopped supporting atmosphere subcomponent time atmosphere discontinued unlike centralized structure active worlds environments primarily built within alphaworld atmosphere worlds spread throughout internet usually hosted author web site codice_1 files binary ascii versions codice_1 file format though ascii format phased later releases codice_1 files could generated dynamically using server-side content management systems demonstrated atmoworlds.com worlds directory users represented worlds avatars later builds option allowed user see avatar early quirk atmosphere displayed users whose avatars yet loaded colorful slanted cylinders announced arrival users bug zapper sound whereas activeworlds possible communicate users within 200-meter radius atmosphere users could chat users world model appropriate atmosphere considering smaller sizes worlds technically users could chat anyone yacp channel reference irc protocol see exception worlds would receive many visitors often case homeworld worlds would clone creating duplicate channels world would often cause confusion users. ref name= patent 9/788526 /ref world developers wrote scripts limited communication users within certain distance greater realism built-in havok physics engine detailed rendering dynamic lighting support lighting effects like radiosity distance fog glare also contributed realism atmosphere worlds many world authors wanted create large worlds order build realistic cities example worlds would often take excessive amount time load visitor web browser especially visitor using slower dial-up connection alleviate issue atmosphere supported pattern reminiscent inline frames html sections world – subworlds models – would load user neared city could load block block rather one atmosphere problems however excessive memory usage exacerbated use advanced features embedded models flash movies many worlds atmosphere chat console used windows-1252 character encoding inception adobe photoshop album included 3d gallery feature could publish photo album atmosphere world adobe atmosphere began 3d anarchy attitude software originally relied irc chat functionality original user interface rather eccentric featuring two ever-present eyeballs would occasionally blink later versions adopted conventional interface although one pre-supplied avatars based eyes adobe bought technology attitude november 1999 announced first public beta version new name march 26 2001 atmosphere came two stand-alone applications builder used build online worlds player allowed users explore worlds 3d anarchy components called editor chat respectively addition applications adobe provided browser plugin explore worlds within web browser companion chat server called adobe community server ran irc-like protocol known yet another chat protocol yacp beta-testing three components atmosphere available free charge adobe distributed server software atmosphere open source license permissive open source license beta versions builder notoriously unstable program crashed frequently user wrote program automatically saved worlds opened builder fixed interval preventing users losing hours work august 2002 adobe began scrap stand-alone player instead devoting resources develop atmosphere plugin time viewed buggy less attractive alternative player company focus plugin viewed attempt compete flash developer macromedia purchased adobe part plugin ran internet explorer windows despite frequent requests community members expand atmosphere support mozilla-based browsers linux mac os unofficially plugin ran mozilla-based browsers limited functionality one user able run stand-alone player linux using wine albeit less-than-usable state part efforts garner commercial interest software adobe introduced support embedding atmosphere worlds pdf documents viewing acrobat reader company also distanced atmosphere reputation platform online chat first disabling chat various official adobe-hosted worlds deleting worlds version 1.0 released october 22 2003 point adobe decided charge builder simply renamed atmosphere continue provide plugin server free beta-testing program ended adobe sent free copies builder registered beta-testers late 2003 early 2004 via airborne express dhl following long period relative silence developers adobe announced december 2004 would continue development software according faq adobe adobe retains copyright atmosphere give permission others distribute copies software company decision stop making builder available purchase essentially halted creation new worlds plugin remains available free download adobe ftp site however adobe still provides 3d capabilities popular adobe acrobat product features developed using technology new zealand right hemisphere rather using atmosphere nearly atmosphere development team went work acrobat team atmosphere component still use adobe scripting api atmosphere components including scene graphs physics engine licensed companies viewpoint atmosphere dedicated beta-testing community whose members constructed many worlds avatars promoted software word mouth conducted community events world tours building contests largest contests star wars 3d large-scale effort create comprehensive set worlds avatars based star wars trilogy creations unveiled july 4 2003 festivities officially continued july 6 another large effort held themed lord rings trilogy community members also organized attended events world tours featured innovative worlds week tech talks originally weekly event intended world avatar developers initially community discussion occurred either worlds appropriate adobe user-to-user forums later supplement official atmosphere product web site discussion forums community created large number resource web sites listed beta-testers dubbed atmosphere developers zombies recognition long hours adobe employees apparently spent developing software running joke team instead typical meal brains atmosphere zombies ingested eyeballs due visual nature product beta-testing community eagerly awaited new releases development team developers invariably answered would take two weeks response became euphemism ready despite decentralized structure atmosphere popularity world-building contests atmosphere community still preferred gather worlds created adobe partner digitalspace adobe annually-revamped homeworld digitalspace atmospherians community homeworld primary starting place new users community found easier establish lively crowds adobe shut homeworld along number adobe-hosted worlds many builders made attempts emulating success homeworld starting points however without constant stream new users homeworld experienced attempts failed attract small group regulars years adobe ended support atmosphere worlds remain online though maintained fewer still continue support multi-user chat nonetheless software continues enjoy small fanbase meets online year halloween
[ 2451, 1254, 4759, 2379, 7892, 5571, 6015, 6016, 578, 3543, 6029, 1128, 84, 1435 ]
Validation
6,335
7
Wireless_mesh_network:wireless mesh network wireless mesh network wmn communications network made radio nodes organized mesh topology also form wireless ad hoc network mesh refers rich interconnection among devices nodes wireless mesh networks often consist mesh clients mesh routers gateways mobility nodes less frequent nodes constantly frequently move mesh spends time updating routes delivering data wireless mesh network topology tends static routes computation converge delivery data destinations occur hence low-mobility centralized form wireless ad hoc network also sometimes relies static nodes act gateways truly all-wireless ad hoc network mesh clients often laptops cell phones wireless devices mesh routers forward traffic gateways may need connected internet coverage area radio nodes working single network sometimes called mesh cloud access mesh cloud depends radio nodes working together create radio network mesh network reliable offers redundancy one node longer operate rest nodes still communicate directly one intermediate nodes wireless mesh networks self form self heal wireless mesh networks work different wireless technologies including 802.11 802.15 802.16 cellular technologies need restricted one technology protocol see also mesh networking wireless mesh architecture first step towards providing cost effective low mobility specific coverage area wireless mesh infrastructure effect network routers minus cabling nodes built peer radio devices cabled wired port like traditional wlan access points ap mesh infrastructure carries data large distances splitting distance series short hops intermediate nodes boost signal cooperatively pass data point point b making forwarding decisions based knowledge network i.e perform routing first deriving topology network wireless mesh networks relatively stable-topology network except occasional failure nodes addition new nodes path traffic aggregated large number end users changes infrequently practically traffic infrastructure mesh network either forwarded gateway wireless ad hoc networks client mesh networks traffic flows arbitrary pairs nodes rate mobility among nodes high i.e. link breaks happen frequently wireless mesh networks start break low communication performance type infrastructure decentralized central server centrally managed central server relatively inexpensive reliable resilient node needs transmit far next node nodes act routers transmit data nearby nodes peers far away reach single hop resulting network span larger distances topology mesh network must relatively stable i.e. much mobility one node drops network due hardware failure reason neighbors quickly find another route using routing protocol mesh networks may involve either fixed mobile devices solutions diverse communication needs example difficult environments emergency situations tunnels oil rigs battlefield surveillance high-speed mobile-video applications board public transport real-time racing-car telemetry self-organizing internet access communities important possible application wireless mesh networks voip using quality service scheme wireless mesh may support routing local telephone calls mesh applications wireless mesh networks similar wireless ad hoc networks current applications principle similar way packets travel around wired internet—data hops one device another eventually reaches destination dynamic routing algorithms implemented device allow happen implement dynamic routing protocols device needs communicate routing information devices network device determines data receives – either pass next device keep depending protocol routing algorithm used attempt always ensure data takes appropriate fastest route destination multi-radio mesh refers different radios operating different frequencies interconnect nodes mesh means unique frequency used wireless hop thus dedicated csma collision domain radio bands communication throughput likely increase result available communication channels similar providing dual multiple radio paths transmit receive data one often cited papers wireless mesh networks identified following areas open research problems 2005 70 competing schemes routing packets across mesh networks include ieee developed set standards title 802.11s less thorough list found ad hoc routing protocol list standard autoconfiguration protocols dhcp ipv6 stateless autoconfiguration may used mesh networks mesh network specific autoconfiguration protocols include
[ 7876, 3762, 3608, 2004, 371, 4482, 1738, 6987, 2650, 8192, 7365, 5053, 6025, 1205, 2132, 6923, 4177, 5693, 4378 ]
Test
6,336
2
Index_of_articles_related_to_BlackBerry_OS:index articles related blackberry os list blackberry-related topics
[ 1522, 291, 1544, 3863, 484, 740, 6550, 2048, 2233, 2498, 1582, 2961, 2795, 4380 ]
Validation
6,337
9
CLIPS:clips clips public domain software tool building expert systems name acronym c language integrated production system syntax name inspired charles forgy ops5 first versions clips developed starting 1985 nasa-johnson space center alternative existing system art*inference mid-1990s development group responsibilities ceased focus expert system technology original name project nasa ai language nail clips probably widely used expert system tool clips written c extensions written c clips called c. syntax resembles programming language lisp clips incorporates complete object-oriented language writing expert systems cool combines programming paradigms procedural object oriented logical theorem proving languages clips uses forward chaining like expert system languages clips deals rules facts various facts make rule applicable applicable rule fired facts rules created first defining shown set reset command causes clips read facts rules case would lead three trouble_shooting facts asserted run command used given two facts listed rule1 asserted conditions action met additional fact asserted result run clips salience allows user assign priority weight rule descendants clips language include jess rule-based portion clips rewritten java later grew different direction fuzzyclips adds concept relevancy language
[ 6507, 5584, 4543, 1435, 2405, 4425 ]
Validation
6,338
3
Interrupt_storm:interrupt storm operating systems interrupt storm event processor receives inordinate number interrupts consume majority processor time interrupt storms typically caused hardware devices support interrupt rate limiting interrupt processing typically non-preemptible task time-sharing operating systems interrupt storm cause sluggish response user input even appear freeze system completely state commonly known live lock state system spending resources processing interrupts instead completing work end-user appear processing anything often output interrupt storm sometimes mistaken thrashing since similar symptoms unresponsive sluggish response user input little output common causes include misconfigured faulty hardware faulty device drivers flaws operating system metastability one components latter condition rarely occurs outside prototype amateur-built hardware modern hardware operating systems methods mitigating effect interrupt storm example ethernet controllers implement interrupt rate limiting causes controller wait programmable amount time interrupt generates present within device similar functionality usually written device driver and/or operating system common cause device behind another signals interrupt apic advanced programmable interrupt controller computer peripherals generate interrupts apic number interrupts always less typically 15 modern pc number devices os must query driver registered interrupt ask interrupt originated hardware faulty drivers may always claim yes causing os query drivers registered interrupt one interrupt processed time device originally requested interrupt therefore get interrupt serviced new interrupt generated cleared processor becomes swamped continuous interrupt signals operating system live lock interrupt storm caused fault kernel debugger usually break storm unloading faulty driver allowing driver underneath faulty one clear interrupt user input still possible drivers often implemented 3rd party operating systems also polling mode queries pending interrupts fixed intervals round-robin fashion mode set globally per-driver per-interrupt basis dynamically os detects fault condition excessive interrupt generation polling mode may enabled dynamically number interrupts resource use caused interrupt passes certain thresholds thresholds longer exceeded os may change interrupting driver interrupt interrupt handling globally interrupt mode polling mode interrupt rate limiting hardware usually negates use polling mode still happen normal operation intense i/o processor unable switch contexts quickly enough keep pace perhaps first interrupt storm occurred apollo 11 lunar descent 1969 interrupt rate limiting must carefully configured optimum results example ethernet controller interrupt rate limiting buffer packets receives network interrupt rate set low controller buffer overflow packets dropped rate must take account fast buffer may fill interrupts interrupt latency interrupt transfer buffer system hardware-based software-based approaches problem example freebsd detects interrupt storms masks problematic interrupts time response system used napi example hardware-based approach system driver starts interrupt enabled state interrupt handler disables interrupt lets thread/task handle event task polls device processing number events enabling interrupt another interesting approach using hardware support one device generates interrupt event queue state changes empty empty free dma descriptors rx fifo tail device drops event event added tail fifo entry marked occupied point entry tail−1 free cleared interrupt generated level interrupt tail pointer incremented hardware requires interrupt acknowledged cpu interrupt handler handle valid dma descriptors head return interrupt
[ 2633, 5571, 7412, 810, 1150, 2266, 2332, 4061 ]
Test
6,339
4
PureMessage:puremessage sophos puremessage anti-spam program sophos plc aimed primarily corporate environments sophos puremessage microsoft exchange — part email security data protection — blocks spam viruses spyware phishing scanning inbound outbound internal email exchange message stores proactively protects email-borne threats prevents confidential data lost
[ 4734, 4759, 5571, 6305, 578, 900, 2467 ]
Validation
6,340
2
Bluebottle_OS:bluebottle os bluebottle formerly known active object system aos recently a2 modular object-oriented operating system originally developed eth zurich unconventional features including automatic garbage-collected memory management zooming user interface a2 next generation native oberon x86 pc version niklaus wirth oberon operating system small fast supports multiprocessor computers provides soft real-time operation entirely written upward-compatible dialect oberon programming language called active oberon oberon active oberon members pascal family along modula-2 a2 design allows development efficient systems based active objects run directly hardware active objects represent combination traditional oops notion object combined thread executes context object active oberon implementation active object may include addition activity activity ancestor objects differences a2 mainstream operating systems extremely minimalistic design completely implemented type-safe language automatic memory management combined powerful flexible set primitives level programming language runtime system synchronisation access internal properties objects competing execution contexts kernel layer a2 provides flexible collection modules providing unified abstractions devices services file systems user interfaces network connections media codecs etc bluebottle os replaces older oberon os unique tui zooming user interface zui significantly like conventional graphical user interfaces like oberon though user interface supports point-and-click metaphor execute commands directly text similar clicking hyperlinks browser
[ 1522, 4885, 6489, 5948, 5571, 5639, 352, 3751, 5730, 4589, 5424 ]
Test
6,341
1
Data_administration:data administration data administration data resource management organizational function working areas information systems computer science plans organizes describes controls data resources data resources usually stored databases database management system software electronic spreadsheets many smaller organizations data administration performed occasionally small component database administrator ’ work context information systems development data administration ideally begins system conception ensuring data dictionary help maintain consistency avoid redundancy model database make logical usable means data modeling including database normalization techniques according data management association dama data resource management development execution architectures policies practices procedures properly manage full data lifecycle needs enterprise data resource management may thought managerial activity applies information system data management tools task managing organization ’ data resource meet company ’ business needs information provide shareholders since beginning information age businesses need types data business activity data created business transaction made need data created data new direction needed focuses managing data critical resource organization directly support business activities data resource must managed intensity formality critical resources managed organizations must emphasize information aspect information technology determine data needed support business use appropriate technology build maintain high-quality data resource provides support data resource quality measure well organization data resource supports current future business information demand organization data resource support current business information demand sacrificing future business information demand must support current future business information demand ultimate data resource quality stability across changing business needs changing technology corporate data resource must developed within single organization-wide common data architecture data architecture science method designing constructing data resource business driven based real-world objects events perceived organization implemented appropriate operating environments overall structure data resource provides consistent foundation across organizational boundaries provide easily identifiable readily available high-quality data support business information demand common data architecture formal comprehensive data architecture provides common context within data organization disposal understood integrated subject oriented meaning built data subjects represent business objects business events real world interest organization data captured maintained
[ 6345, 2937, 2124, 2054 ]
Train
6,342
2
Quick_Look:quick look quick look quick preview feature developed apple inc. introduced operating system mac os x 10.5 leopard feature announced worldwide developers conference jun 11 2007 os x finder always icon previews quick look allows users look contents file finder full near-full size depending size document relative screen resolution preview files pdfs html quicktime readable media plain text rtf text documents iwork keynote pages numbers documents odf documents microsoft office word excel powerpoint files including ooxml raw camera images quick look also opened full screen launched command line additionally multi-page documents like powerpoint slide shows navigated using slide previews side preview window quick look technology implemented throughout apple suite software starting mac os x 10.5 including ichat theater time machine finder cover flow quick look apis available developers via quick look framework ios part quartz framework mac since debut quick look included number generators common file types plug-ins added quick look allow previewing content file formats plug-ins also used add additional functionality quick look syntax highlighting source code files add plug-in quick look needs placed folder codice_1 activate plug-in either computer needs restarted quick look needs reset command multiple ways invoke quick look keyboard shortcuts command line menu quick look exploited conducting forensic examination computer contents thumbnail cache created user random subfolder codice_2 called com.apple.quicklook.thumbnailcache cache contains two files quick look thumbnails stored documents internal disks also documents located removable disks including encrypted pose significant security hole document may well number thumbnails different dimensions range large small cache reset invoking codice_3 command via terminal window
[ 3940, 713, 4690, 734, 6832, 3989, 2597, 3322, 1502, 6488, 2609, 5786, 4740, 1897, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 6565, 2329, 3050, 163, 6582, 5535, 5191, 8051, 7335, 3445, 569, 5...
Validation
6,343
3
Mr._Do's_Castle:mr. castle mr. castle arcade game released universal september 1983 asian title game mr. versus unicorns though marketed sequel original mr released one year earlier game bears far closer resemblance space panic second mr. series video games although n't intended began game called knights vs. unicorns u.s. division universal persuaded japanese arm modify graphics mr. game taking account first game popularity object mr. castle score many points possible collecting cherries defeating unicorn-like monsters game takes place castle filled platforms ladders flipped one platform another player controls mr. collects cherries using hammer knock blocks contain various platforms empty holes left knocked-out blocks serve traps monsters monster falls hole player defeat causing block monster fall top player takes long complete level monsters transform faster difficult forms occasionally multiply game advances next level cherries level collected enemies defeated player loses life mr. caught monster game ends player runs lives mr player earn extra life collecting letters word extra regular monsters changed monsters bearing extra letters collecting three keys distributed around playfield picking magic shield top floor monsters state easier defeat normal simple hammer strike job brief interval change back normal forms game also offers bonus credit collecting rare diamond appears playfield random intervals cherry blocks absent mr. vs. unicorns early revisions mr. castle instead blocks keys skulls start stage fill blocks left behind unicorns fall holes left alone time three ways complete level version versus four ways complete levels mr. castle addition early revisions fill blocks change colors every two stages mr. castle ported colecovision msx atari 2600 atari 5200 commodore 64 sharp x68000 atari commodore colecovision published parker bros. version atari 8-bit family released mr. castle followed mr. wild ride run run released 1984
[ 1237, 7944, 5686 ]
Test
6,344
3
Cascade_Lake_(microarchitecture):cascade lake microarchitecture cascade lake intel codename 14nm server enthusiast processor microarchitecture cascade lake optimization intel process-architecture-optimization model intel states first microarchitecture support 3d xpoint-based memory modules also feature deep learning boost instructions cascade lake-ap branded xeon platinum 9200 series skus soldered motherboard cpus n't support optane memory
[ 2449, 2000, 2814, 5802, 6332, 6698, 6793, 3942, 3849, 4765, 6170, 3443, 6616, 4108, 1465, 7449, 7453, 3020, 7364, 3717, 5669, 5670, 584, 3803, 6647, 1867, 1770, 3565, 4077, 418, 6569, 4985, 766, 691, 5343, 6057, 4098, 6675, 352, 6152, 2...
Test
6,345
1
Database_administrator:database administrator database administrators dbas use specialized software store organize data role may include capacity planning installation configuration database design migration performance monitoring security troubleshooting well backup data recovery list skills required become database administrators database administrators benefit bachelor degree master degree computer science associate degree certificate may sufficient work experience many certifications available becoming certified database administrator try share best many certifications offered database vendors database administrator certifications may earned passing series tests sometimes requirements schools offering database administration degrees also found example database administrator responsibilities include following tasks
[ 1449, 3951, 6098, 7915, 6462, 7205, 6484, 7937, 6144, 1891, 1902, 784, 1905, 6878, 4759, 7248, 3011, 1554, 4054, 6543, 2304, 2663, 7999, 3042, 6932, 7303, 4457, 6594, 1254, 6604, 7330, 5209, 7341, 7715, 3776, 5561, 906, 5217, 2390, 5571, ...
Validation
6,346
4
Jericho_Forum_Commandments:jericho forum commandments jericho forum® commandments define areas principles must observed planning de-perimeterised future whilst building “ good security ” commandments specifically address areas security necessary deliver de-perimeterised vision commandments serve benchmark concepts solutions standards systems assessed measured jericho forum commandments issued creative commons license found https //collaboration.opengroup.org/jericho/commandments_v1.2.pdf
[ 6625, 6870, 6941 ]
Validation
6,347
7
Kimble_(app):kimble app kimble cloud-based psa software application kimble founded 2010 sean hoban mark robinson david scott company headquartered london england offices united states including boston park city chicago atlanta 2018 kimble secured investment accel-kkr technology-focused investment firm based silicon valley kimble provides professional services automation psa solution known kimble psa built salesforce platform recognized salesforce premier partner kimble app automates pipeline forecasting resource planning delivery management project accounting kimble applications helps professional service organizations run project-based businesses better global leaders consulting software hi-tech ntt data tcs sage canon use kimble optimize resource utilization profitability business scalability kimble leading software vendor focuses exclusively professional services automation psa putting energy innovating features easy-to-use functionality improve team collaboration efficiency around key services processes built work seamlessly crm kimble drives forward-looking focus timely decision making intelligent insights guidance 2018 ranked best professional services automation software g2 crowd momentum grid
[ 2961, 7037 ]
Test
6,348
4
Great_Firewall:great firewall great firewall china gfw combination legislative actions technologies enforced people republic china regulate internet domestically role internet censorship china block access selected foreign websites slow cross-border internet traffic effect includes limiting access foreign information sources blocking foreign internet tools e.g google search facebook twitter wikipedia others mobile apps requiring foreign companies adapt domestic regulations besides censorship gfw also influenced development china internal internet economy nurturing domestic companies reducing effectiveness products foreign internet companies great firewall operated golden shield project bureau public information network security supervision mentioned one country two systems principle china special administrative regions hong kong macau affected project sars governmental legal systems therefore enjoy high degree autonomy nevertheless u.s. state department reported central government authorities closely monitored internet use regions term great firewall china portmanteau firewall great wall china first used print geremie barmé 1997 term started use beijing 1996 stephen guerin redfish group beijing-based web consultancy 1996 interviews guerin cnn andrea koppel npr marky kay magistad included guerin discussing china reversing firewall political ideological background gfw project considered one deng xiaoping ’ favorite sayings early 1980s open window fresh air flies blown saying related period economic reform china became known socialist market economy superseding political ideologies cultural revolution reform led china towards market economy opened market foreign investors nonetheless despite economic freedom values political ideas communist party china protected swatting flies unwanted ideologies internet china arrived 1994 inevitable consequence supporting tool socialist market economy gradually internet availability increasing internet become common communication platform tool trading information ministry public security took initial steps control internet use 1997 issued comprehensive regulations governing use key sections articles 4–6 1998 communist party china feared china democracy party cdp would breed powerful new network party elites might able control cdp immediately banned followed arrests imprisonment year gfw project started first part project lasted eight years completed 2006 second part began 2006 ended 2008 6 december 2002 300 people charge gfw project 31 provinces cities throughout china participated four-day inaugural comprehensive exhibition chinese information system exhibition many western high-tech products including internet security video monitoring human face recognition purchased estimated around 30,000–50,000 police employed gigantic project fang binxing known substantial contribution china internet censorship infrastructure dubbed father china great fire wall china view internet internet sovereignty notion internet inside country part country sovereignty governed country united states several western countries passed laws creating computer crimes beginning 1970s china legislation 1997 year china sole legislative body national people congress npc passed cl97 law criminalizes cyber crimes divided two broad categories crimes target computer networks crimes carried computer networks behavior illegal latter category includes among many things dissemination pornographic material usurping state secrets chinese judges critical cl97 calling ineffective unenforceable however npc claimed intentionally left law flexible could open future interpretation development given gaps law central government china relies heavily administrative body state council determine falls definitions determinations required go npc legislative process result cpc ended relying heavily state regulation carry cl97 latter definition online activities punishable cl97 crimes carried computer networks used justification great firewall cited government blocks isp gateway connections access anything internet definition also includes using internet distribute information considered harmful national security using internet distribute information considered harmful public order social stability chinese morality central government relies heavily state council regulators determine specific online behavior speech fall definitions reasons behind internet censorship china include part great firewall beginning 2003 china started golden shield project massive surveillance censoring system hardware provided mostly u.s. companies including cisco systems project completed 2006 carried buildings machines manned civilians supervised china national police force public security bureau psb main operating activities gatekeepers golden shield project include monitoring domestic websites email searching politically sensitive language calls protest damaging content found local psb officials dispatched investigate make arrests however late 2007 golden shield project proved operate sporadically best users long adapted internet blocking using proxy servers among strategies make communications circumnavigate blocked content february 2008 chinese government announced operation tomorrow effort crack youth usage internet cafés play online games view content declared illegal internet cafés extremely popular way getting online developing countries fewer people afford personal computer regulated chinese government local chinese government officials minors china age 18 allowed internet cafés although law widely ignored enforced spurred creation underground black web bars visited underage 2008 internet cafés required register every customer log used internet records may confiscated local government officials psb illustrate local regulation internet cafés one instance government official town gedong lawfully banned internet cafés operating town believed harmful minors frequented play online games including considered violent surf internet however internet cafés town simply went underground minors deterred visiting may 2015 china indefinitely blocked access chinese-language wikipedia contrast 2018 english-language wikipedia blocked rarely intermittently china 2017 discussed plans version wikipedia may 2019 language versions wikipedia blocked chinese government system blocks content preventing ip addresses routed consists custom dns proxy servers filtering mechanism researchers university california davis university new mexico said censorship system true firewall since banned material sometimes able pass several routers entire system without blocked filtering mechanism may differ one chinese isp another tend common possible reported methods included research evidence indicated suspicion great firewall china sense one surveilled online leads chilled speech self-censorship effective blocking internet content great firewall great firewall form trade protectionism allowed china grow internet giants tencent alibaba baidu china version many foreign web properties example tencent video youtube tencent weibo twitter qzone facebook wechat whatsapp ctrip orbitz others zhihu quora nearly one quarter global internet population 700 million users internet behind gfw considered parallel universe internet exists outside mainland chinese internet censorship programs censored web sites include among things blocked web sites indexed lesser degree chinese search engines sometimes considerable impact search results according new york times google set computer systems inside china try access web sites outside country site inaccessible added google china blacklist however unblocked web sites reindexed referring google first-hand experience great firewall hope international community reveal secrets simon davies founder london-based pressure group privacy international challenging google reveal technology used china behest way understand nature beast perhaps develop circumvention measures opening communications would dossier extraordinary importance human rights davies says google yet respond call great firewall blocks destination ip addresses domain names inspects data sent received basic censorship circumvention strategy use proxy nodes encrypt data circumvention tools combine two mechanisms 2008 english-language bbc website chinese language website unblocked 2017 china censored google including google maps alternate map applications available reporters without borders suspects countries cuba vietnam zimbabwe belarus obtained surveillance technology china although censorship countries less stringent china even one see booming sector well one dynamic china second largest information communication technology market according international data corporation market reach us 844 billion 2020 market big data expected become part industrial world china 2025 regardless strictness industrial internet architecture already place despite strict government regulations chinese people continue protest government attempt censor internet covert protesters set secure ssh vpn connections using tools ultrasurf also utilize widely available proxies virtual private networks fanqiang 翻墙 climb wall bypass gfw active protest absent chinese people post grievances online occasions successful 2003 death sun zhigang young migrant worker sparked intense widespread online response chinese public despite risk government punishment months later premier wen jiabao abolished chinese law led death sun ever since dissent regularly created turmoil internet china also january 2010 google announced longer censor web search results china even means might shut chinese operations altogether many chinese people went company chinese offices display grievances offer gifts flowers fruits cigarettes chinese corporate statutes mandate domestic foreign internet companies business mainland china cooperate great firewall efforts companies responsible content put websites well content users post website helps china promote self-censorship making censoring job less difficult allowing keep state licenses media chinese subsidiaries american companies yahoo google google services blocked google still presence china microsoft comply condition operating leadership companies regularly express distaste china great firewall policies vein consider necessary part business china better alternative would china business jerry yang founder yahoo additionally implied presence foreign internet companies china eventually help bring less internet restriction china critics argue gfw consequence china paranoia potential internet spreading opposition one-party rule arguments given china method limited internet impedes freedom speech holds economically speaking discouraging innovation disapproving communication important ideas prohibiting firms use certain services use also thought detrimental approach students professors since access resources promote sharing work ideas comprehensive learning another important argument gfw fear critics big countries begin following china approach whole purpose creation internet could put jeopardy like-minded countries successful imposing restrictions inhabitants globalized online companies free global exchange information could cease exist united states trade representative ustr “ national trade estimate report ” 2016 referred china digital great firewall china filtering cross-border internet traffic posed significant burden foreign suppliers claude barfield american enterprise institute expert international trade suggested u.s. government bring case firewall huge trade barrier world trade organization january 2017 8 24 trafficked websites china blocked great firewall created burden foreign suppliers rely websites sell products services.the lobby 2016 business climate survey showed 79 percent members reported negative impact business due internet censorship according stephen rosen gfw reflective chinese government fear civil disobedience rebellion among chinese population chinese communist party rule
[ 7232, 794, 96, 896, 1175, 3777, 6092, 3100, 2563, 8189, 4783, 4111, 6025, 7848, 1886, 2789, 7214, 1691, 6398, 1142, 3338, 4014, 5619, 3426 ]
Test
6,349
2
NASLite:naslite naslite free commercial linux distribution designed turn conventional x86-based computers pci interface simple network-attached storage device fits onto single 3½-inch high density floppy disk formatted 1.72mb naslite boots floppy disk runs 4mb ram disk allowing full capacity hard disk drives used storage naslite supports serving files clients running windows linux mac os x well others versions available support different networking protocols booting operating system cd-rom usb mass storage device hard disk drive versions naslite variants contain gpl 'd proprietary components gpl 'd components available end user per gplv2 naslite runs well obsolete hardware requires least computer pci interface minimum requirements 486dx pentium cpu 16 mb ram pci ethernet card ide hard disk drive floppy disk drive naslite turns target machine simple file server since file serving takes little processing speed opposed network speed hard drive speed able run comparatively old computers little processing power runs floppy disk hypothetically usually four ide channels used hard drives naslite three variants supporting different file serving protocols samba support serving microsoft windows client machines nfs serve unix based operating systems ftp anonymous ftp also supports remote administration via telnet though ssh includes web server display usage error logs since based linux naslite like linux distributions supports new larger hard drives often supported older machines bypassing bios directly accessing hard drive greatly increasing usefulness older computer serving large amounts data
[ 5200, 4759, 1629, 3444, 6711, 7251, 474, 7075, 5571, 1941, 578, 314, 5232, 2758, 1663, 2864, 6209, 6761, 2063, 343, 7214, 4824, 1052, 5523, 5259, 1893, 5530, 5704, 6317, 352, 3751, 6860, 7587, 7954, 6244 ]
Test
6,350
3
Master_of_the_Lamps:master lamps master lamps one first music video games activision published game 1985 several home computer systems master lamps death arabian prince father king shatters three enchanted oil lamps freeing three genies trapped within genies overrun palace contain prince must reassemble three broken lamps player role prince wearing white thawb red keffiyeh must journey seven dens genie den contains one lamp pieces gameplay alternates two modes first prince maneuvers flying carpet winding tunnel genie den practice requires player direct carpet diamond-shaped gates appear failure returns prince beginning tunnel den second mode player strikes gong thrice summon genie genie draws hookah blows ball smoke smoke emerges sequence tones player must repeat call-and-response pattern order play tone player must strike corresponding gong player strikes incorrect gong strikes correct gong early genie magic transports prince beginning tunnel seven dens first genie tone audible manifests colored quaver eighth note floats toward ground seven dens second genie tone inaudible player must match color note color corresponding gong seven dens third genie tone audible note appears player must recognize note pitch strike correct gong player passes trial gateway another tunnel opens passing musical trials three genies player navigates one final tunnel palace player succeeds prince reclaims palace antic 1986 called master lamps offbeat game program number unique elements stating become little monotonous magazine approved non-violent gameplay
[]
Test
6,351
3
Socket_FM2:socket fm2 socket fm2 cpu socket used amd desktop trinity richland apus connect motherboard well athlon x2 athlon x4 processors based fm2 launched september 27 2012 motherboards feature new fm2 cpu socket also utilize amd new a85x chipset socket similar fm1 based 31×31 grid pins 5×7 central void 3 pins missing corner additional key pins missing compared socket fm1 two key pins moved one removed leaving 904 pins available chipsets consult fusion controller hubs fch steamroller-based kaveri apus supported see socket fm2+ fm2r2 socket fp3 bga- 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
[ 2539, 6599, 2541, 5895, 4931, 7163, 2997, 5559, 1735, 3362, 2016, 5377, 913, 7826, 4694, 2751, 6545, 6373, 1961, 5063, 6655, 6562, 7484, 6307, 3145, 4090, 866, 5436, 780, 1143, 7782 ]
Test
6,352
9
Common_Lisp_Interface_Manager:common lisp interface manager common lisp interface manager clim common lisp-based programming interface creating user interfaces i.e. graphical user interfaces guis fully object-oriented programming user interface management system using common lisp object system clos based idea stream input output also facilities output device independence descended gui system dynamic windows symbolics lisp machines main development 1988 1993 clim 2.0 released 1993 clim designed portable across different common lisp implementations different windowing systems uses reflective architecture window system interface clim supports like dynamic windows so-called presentations clim available allegro cl lispworks macintosh common lisp symbolics genera free software implementation clim named mcclim several extensions clim used several applications like climacs emacs-like editor also provides mouse-sensitive lisp listener read–eval–print loop repl common lisp
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 6428, 5734, 1840, 2568, 1478, 4332, 2218, 4704, 405, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 2249, 1889, 1890, 5786, 1895, 5787, 4017, 5091, 1152, 1154, 1524, 795, 6876, 4759, 6888, 2639, ...
Validation
6,353
6
USB_flash_drive_security:usb flash drive security secure usb flash drives protect data stored access unauthorized users usb flash drive products market since 2000 use increasing exponentially consumers businesses increased demand drives manufacturers producing faster devices greater data storage capacities increasing number portable devices used business laptops notebooks personal digital assistants pda smartphones usb flash drives mobile devices companies particular risk sensitive data stored unsecured usb flash drives employees use devices transport data outside office consequences losing drives loaded information significant including loss customer data financial information business plans confidential information associated risk reputation damage usb flash drives pose two major challenges information system security data leakage owing small size ubiquity system compromise infections computer viruses malware spyware large storage capacity usb flash drives relative small size low cost means using data storage without adequate operational logical controls may pose serious threat information availability confidentiality integrity following factors taken consideration securing important assets average cost data breach source necessarily flash drive ranges less 100,000 2.5 million sandisk survey characterized data corporate end users frequently copy examples security breaches resulting usb drives include early days computer viruses malware spyware primary means transmission infection floppy disk today usb flash drives perform data software storage transfer role floppy disk often used transfer files computers may different networks different offices owned different people made usb flash drives leading form information system infection piece malware gets onto usb flash drive may infect devices drive subsequently plugged prevalence malware infection means usb flash drive documented 2011 microsoft study analyzing data 600 million systems worldwide first half 2011 study found 26 percent malware infections windows system due usb flash drives exploiting autorun feature microsoft windows finding line statistics monthly reporting commonly detected malware antivirus company eset lists abuse autorun.inf first among top ten threats 2011 windows autorun.inf file contains information programs meant run automatically removable media often usb flash drives similar devices accessed windows pc user default autorun setting windows versions prior windows 7 automatically run program listed autorun.inf file access many kinds removable media many types malware copy removable storage devices always program ’ primary distribution mechanism malware authors often build additional infection techniques examples malware spread usb flash drives include since security physical drive guaranteed without compromising benefits portability security measures primarily devoted making data compromised drive inaccessible unauthorized users unauthorized processes may executed malware one common approach encrypt data storage routinely scan usb flash drives computer viruses malware spyware antivirus program although methods possible software solutions bitlocker diskcryptor popular veracrypt allow contents usb drive encrypted automatically transparently also windows 7 enterprise windows 7 ultimate windows server 2008 r2 provide usb drive encryption using bitlocker go apple computer mac os x operating system provided software disc data encryption since mac os x panther issued 2003 see also disk utility additional software installed external usb drive prevent access files case drive becomes lost stolen installing software company computers may help track minimize risk recording interactions usb drive computer storing centralized database usb drives utilize hardware encryption microchips within usb drive provide automatic transparent encryption manufacturers offer drives require pin code entered physical keypad device allowing access drive cost usb drives significant starting fall due type usb drive gaining popularity hardware systems may offer additional features ability automatically overwrite contents drive wrong password entered certain number times type functionality provided software system since encrypted data simply copied drive however form hardware security result data loss activated accidentally legitimate users strong encryption algorithms essentially make functionality redundant encryption keys used hardware encryption typically never stored computer memory technically hardware solutions less subject cold boot attacks software-based systems reality however cold boot attacks pose little threat assuming basic rudimentary security precautions taken software-based systems security encrypted flash drives constantly tested individual hackers well professional security firms times january 2010 flash drives positioned secure found poorly designed provide little actual security giving access data without knowledge correct password flash drives compromised claimed fixed include companies reacted immediately kingston offered replacement drives different security architecture sandisk verbatim trek released patches commercial environments secure usb drives used central/remote management system may provide organizations additional level asset control significantly reducing risks harmful data breach include initial user deployment ongoing management password recovery data backup remote tracking sensitive data termination issued secure usb drives management systems available software service saas internet connectivity allowed behind-the-firewall solutions
[ 4025, 1254, 4759, 7244, 330, 6589, 5908, 5401, 740, 4536 ]
Test
6,354
9
PowerBuilder_Foundation_Classes:powerbuilder foundation classes powerbuilder foundation class library pfc set powerbuilder objects customized used develop class libraries objects used provide corporate departmental application consistency pfc also includes objects used utility purposes debugging pfc written powerbuilder delivered powerbuilder objects supporting powerscript source code uses advanced powerbuilder object oriented coding techniques features service-oriented design ensures application uses minimum amount computer resources library initially developed powersoft introduced powerbuilder 5 released library later open sourced sybase powerbuilder 10 released since couple forks occurred including one specifically support appeon web enabling tool powerbuilder sr. vendor product architecture
[]
Test
6,355
3
Sunway_SW26010:sunway sw26010 sw26010 260-core manycore processor designed national high performance integrated circuit design center shanghai implements sunway architecture 64-bit reduced instruction set computing risc architecture designed china sw26010 four clusters 64 compute-processing elements cpes arranged eight-by-eight array cpes support single instruction multiple data simd instructions capable performing eight double-precision floating-point operations per cycle cluster accompanied conventional general-purpose core called management processing element mpe provides supervisory functions cluster dedicated ddr3 sdram controller memory bank address space processor runs clock speed 1.45 ghz cpe cores feature 64 kb scratchpad memory data 16 kb instructions communicate via network chip instead traditional cache hierarchy mpe traditional setup 32 kb l1 instruction data caches 256 kb l2 cache finally on-chip network connects single system interconnection interface connects chip outside world sw26010 used sunway taihulight supercomputer march june 2018 world fastest supercomputer ranked top500 project system uses 40,960 sw26010s obtain 93.01 pflops linpack benchmark
[ 4408, 1023, 5947, 3014, 5371, 6865, 3905 ]
Test
6,356
9
FreeMat:freemat freemat free open-source numerical computing environment programming language similar matlab gnu octave addition supporting many matlab functions idl functionality features codeless interface external c c++ fortran code parallel distributed algorithm development via mpi plotting 3d visualization capabilities community support takes place moderated google groups
[ 5098, 3606, 2820, 4759, 3619, 5288, 5117, 5571, 4872, 578, 4705, 1569, 4067, 3981, 4070, 336, 7860, 3410, 256, 3915, 4999, 2803, 1435 ]
Test
6,357
3
SCO–SGI_code_dispute_of_2003:sco–sgi code dispute 2003 sco forum 2003 sco group sco showed several examples allegedly illegal copying copyrighted code linux open source community quickly debunked examples shown particular one example showed code unix indeed used sgi linux contributions linux maintainers stated code question fact already removed linux example revealed — infringing code question needlessly duplicated functions already present linux sgi analysts also responded matter confirmed code question never infringed sco forum held august 17 – 19 2003 sco publicly showed several alleged examples illegal copying copyright code linux time examples available people signed nda prohibited revealing information shown sco claimed infringements divided four separate categories literal copying obfuscation derivative works non-literal transfers example used sco demonstrate literal copying also known atemalloc example name original contributor revealed sco quick analysis code question pointed sgi time also revealed code already removed linux kernel duplicated already existing functions within hours open source community started several different analyses infringing code results analyses differ slightly confirm code question derived unix code analyses also pointed code could possibly originated unix necessarily prove infringement copyrights community determined particularly bad example code question never used mainstream distributions linux present ia-64 version relative sparseness worldwide ia-64 installations combined limited time code present linux makes chance actually encountering system running code slim possible code contributed linux originated unix system v original implementation happened early 1970s comparison original unix source code unix system v source reveal substantial differences two fact dennis ritchie one creators original versions unix acknowledged either ken thompson wrote original code unix system v code derived important original versions unix copyright claim source code time law required copyright claims effectively means early unix code protected copyright law additionally santa cruz operation sco group released source code early versions unix 4-clause bsd-like license allowing use source code open source products october 1 2003 sgi responded sco ’ allegations open letter linux community letter rich altmaier vice president software claims small code fragments indeed inadvertently included linux kernel
[ 7855, 7010, 6489, 6357, 2118, 578, 1824, 4985 ]
Test
6,358
7
MashApps:mashapps mashapps process-centric cloud applications small medium enterprises departmental deployments mashapps used solve different types business problems within enterprise integrations third party applications on-premises on-demand systems modeled without much dependency team mashup applications shared users organizations users looking mashapps business scenarios either build look similar solutions readily available google apps marketplace mashapps built online mashup enabler called mashapp composer building mashapp require programming languages like enterprise mashup markup language new mashapps assembled existing repository reusable mashup components like process library external web services
[]
Test
6,359
9
EGL_(programming_language):egl programming language egl enterprise generation language originally developed ibm available edt egl development tools open source project eclipse public license epl programming technology designed meet challenges modern multi-platform application development providing common language programming model across languages frameworks runtime platforms language borrows concepts familiar anyone using statically typed languages like java cobol c etc however borrows concept stereotype unified modeling language uml typically found statically typed programming languages nutshell egl higher-level universal application development language egl similar syntax common languages learned application developers similar previous programming background egl application development abstractions shield programmers technical interfaces systems middleware allowing focus building business functionality egl applications services written tested debugged egl source level satisfactorily functionally tested compiled cobol java javascript code support deployment business applications run following environments egl program part generatable logic part one entry point program part contains main function represents logic runs program start program include functions access functions outside program function main invoke functions program functions composed set egl statements variables constants egl record part defines set data elements example record name customerrecord defined 6 fields egl specialized type record called sqlrecord used exchange data relational database egl service part contains public functions meant accessed applications systems example service two functions defined main component rich ui application rich ui handler part parts generated javascript december 2008 ibm introduced new technology egl rich ui simplify creation web 2.0-style rich internet applications technology simplifies development hiding complexities ajax javascript rest soap developer enables focus business requirement underlying technologies egl programming tools available eclipse-based commercial product rational business developer also egl edition rational developer system z. egl target language modernization legacy applications language semantics affinity procedural languages legacy 4th generation languages tools searching large egl code bases comparing individual egl files changes detecting duplicated code available semantic designs
[ 4798, 2451, 7305, 4759, 850, 578, 7315, 1435, 2807 ]
Test
6,360
2
Coherent_(operating_system):coherent operating system coherent clone unix operating system ibm pc compatibles microcomputers developed sold now-defunct mark williams company mwc historically operating system proprietary product became open source 2015 released 3-clause bsd license coherent unix mark williams company rights either unix trademark t/bell labs source code early years existence mwc received visit delegation looking determine whether mwc infringing unix property delegation included dennis ritchie concluded hard believe coherent basic applications created without considerable study os code details applications however also stated much operating system written alumni university waterloo tom duff dave conroy randall howard johann george trevor john thompson significant contributions also made people nigel bree auckland new zealand later author ghost coherent originally written pdp-11 range minicomputers 1980 ported various early 1980s microcomputer systems including ibm pc compatibles machines based zilog z8000 motorola 68000 initially sold oems starting 1983 available consumer market mwc directly point coherent 2.3 offered roughly functionality version 7 unix pc hardware including nroff formatter bsd extensions offered competing unix/clone vendors compared competitors small system distributed seven double-sided floppy disks costing us 500 license byte 1984 called coherent highly compatible unix version 7 lookalike 1985 criticized difficulty installation stated unix clone coherent amazingly complete ... easy port programs ... price 495 bargain early 1990s reviews coherent pointed system much smaller contemporary unix offerings well less expensive us 99.95 lacking functionality software support pc magazine called coherent 3.0 time capsule captured state unix late 1970s without support mice lans scsi disks good learning basic unix programming business automation review auug newsletter positive favorably comparing coherent mks toolkit minix xenix suggesting might fill niche low-end training platform coherent able run intel-based pcs intel 8088 286 386 486 processors coherent version 3 intel-based pcs required least 286 coherent version 4 intel-based pcs required least 386 like true unix coherent able multitask support multiple users version 4 released 1992 coherent also support x11 mgr windowing systems later versions coherent version 4 higher supported features common modern unix-like systems including version microemacs access dos fat16 file systems optimizing c compiler modified version taylor uucp final releases coherent also fully supported ibcs coff binary standard allowed binary compatibility sco unix applications including wordperfect lotus 1-2-3 several microsoft applications including quickbasic microsoft word multiplan last 386 versions supported virtual memory demand paging zilog z8000 port coherent also used canceled commodore 900 system 1983 ncsc subsidiary nixdorf announced port coherent ibm mainframes form unix compatibility subsystem ibm dos/vs dos/vse nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short mark williams company closed 1995 january 3 2015 coherent sources released 3-clause bsd license
[ 1807, 5362, 4670, 6085, 5048, 4344, 1493, 56, 5079, 4733, 6489, 3675, 443, 2266, 1522, 4751, 4398, 473, 5481, 2294, 2300, 858, 4447, 6577, 3751, 6952, 1614, 7702, 4478, 554, 8066, 2379, 900, 6267, 5216, 5571, 578, 5232, 5597, 8120, 5964...
Test
6,361
1
Lossless-Join_Decomposition:lossless-join decomposition computer science concept lossless-join decomposition central removing redundancy safely databases preserving original data also called nonadditive decompose relation formula_1 relations formula_2 lossless-join natural join two smaller relations yields back original relation .e formula_3 formula_1 split formula_5 formula_6 decomposition lossless least one two following criteria met projecting formula_5 formula_6 joining back results relation started let formula_1 relation schema let set functional dependencies formula_1 let formula_5 formula_6 form decomposition formula_1 decomposition lossless-join decomposition formula_1 least one following functional dependencies stands closure every attribute attribute sets
[ 2054 ]
Test
6,362
9
Lucee:lucee lucee open source software implements lightweight dynamically-typed scripting language java virtual machine jvm facilitating rapid development web applications compile directly java bytecode lucee compatible contemporary cfml script tag language variants provides configurable support legacy cfml lucee language supports multiple development paradigms including object orientation inheritance interfaces functional constructs like higher-order functions closures codice_1 codice_2 lucee created lucee association switzerland forked version 4.2 railo server developed lucee built-in support microsoft sql server mysql oracle postgresql many popular relational database engines lucee also supports database jdbc driver available lucee built-in support calling consuming data returned existing web services along ability easily configure expose web services consumed lucee supports three types web services lucee built-in support object relational mapping orm framework hibernate facilitating hibernate usage lucee code without complex explicit configuration lucee built-in support multiple caching systems including infinispan ehcache memcached extended additional systems cache implementations configured within lucee server used within application—both explicitly implicitly—for caching database results function call results external http request results serialized session storage flexible backing store in-process ram-based file-system abstraction lucee supports multiple virtual file systems—built-in abstractions various local remote resources—including zip http ftp s3 ram allow lucee server developer treat access abstracted resource manner local file system lucee derived coldfusion markup language cfml therefore support tag-based script-based versions cfml examples assign string hello world value variable codice_3 output value response buffer typically display web browser lucee project led lucee association switzerland non-profit swiss association association consists members help fund guide project project also enterprise corporate individual supporters supporters members lucee association help fund promote project exchange certain benefits
[ 4384, 2456, 6704, 103, 7715, 3186, 4773, 6095, 6986, 8189, 5571, 5490, 2752, 3543, 1564, 4964, 7838, 6462, 5956, 7213, 7689, 7315, 6594 ]
Validation
6,363
5
TCP/IP_stack_fingerprinting:tcp/ip stack fingerprinting tcp/ip stack fingerprinting passive collection configuration attributes remote device standard layer 4 network communications combination parameters may used infer remote machine operating system aka os fingerprinting incorporated device fingerprint certain parameters within tcp protocol definition left implementation different operating systems different versions operating system set different defaults values collecting examining values one may differentiate among various operating systems implementations tcp/ip tcp/ip fields may vary include following values may combined form 67-bit signature fingerprint target machine inspecting initial ttl window size fields often enough order successfully identify operating system eases task performing manual os fingerprinting protection fingerprint doorway attack achieved limiting type amount traffic defensive system responds examples include blocking address masks timestamps outgoing icmp control-message traffic blocking icmp echo replies security tool alert potential fingerprinting match another machine fingerprinter configuration detecting fingerprint disallowing tcp/ip fingerprinting provides protection vulnerability scanners looking target machines running certain operating system fingerprinting facilitates attacks blocking icmp messages one array defenses required full protection attacks targeting icmp datagram obfuscator running top ip internet layer acts scrubbing tool confuse tcp/ip fingerprinting data exist ms windows linux freebsd list tcp/os fingerprinting tools
[ 2737, 2466, 1461, 7986, 481, 7637, 4914, 1942, 2894, 578, 7910, 3775 ]
Test
6,364
1
Associative_model_of_data:associative model data associative model data data model database systems data models relational model object data model record-based models involve encompassing attributes thing car record structure attributes might registration colour make model etc associative model everything “ discrete independent existence ” modeled entity relationships modeled associations granularity data represented similar schemes presented chen entity-relationship model bracchi paolini pelagatti binary relations senko entity set model number claims made model simon williams book associative model data distinguish associative model traditional models associative database management system data metadata data data stored two types things associative model would use two structures store piece information flight ba1234 arrived london heathrow 12-dec-05 10:25 seven items four nouns flight ba1234 london heathrow 12-dec-05 10:25 three verbs arrived three links needed store data first link flight ba1234 source arrived verb london heathrow target second link first link source verb item 12-dec-05 target link begins ellipsis ... previous link source third link second link source verb 10:25 target alternative way write thing using parentheses associative database may regarded comprising two tables one items one links item link arbitrary number called surrogate identifier
[ 1905, 3928, 6543, 2937, 7999, 4252, 1768, 2054, 5419, 7757, 5338, 5778, 7303, 784, 4463, 2265 ]
Test
6,365
2
Georg_C._F._Greve:georg c. f. greve georg c. f. greve born 10 march 1973 helgoland germany software developer physicist author currently co-founder president vereign working technology politics since founded free software foundation europe fsfe 2001 greve working full-time president fsfe since early 2001 june 2009 handed presidency fsfe karsten gerloff responsibilities fsfe included coordination general assembly supporting local representatives work working political legal issues well projects giving speeches informing journalists spread knowledge free software addition georg greve also worked consultant representing google ooxml standardisation process iso project reviewer european commission greve married currently lives switzerland 2010 greve awarded cross merit ribbon federal republic germany verdienstkreuz bande greve degree physics biophysics physical oceanography astronomy minor fields study computer science department university hamburg interdisciplinary diploma thesis written field nanotechnology scanning probe microscopy greve first software development 12 years old first publication program professional journal 1992 partly financed studies managed software development evaluate squid-sensor data biomagnetometic laboratory university medical center hamburg-eppendorf hamburg germany 1993 came across free software gnu project linux 1998 european speaker gnu project began writing brave gnu world monthly column free computer software featuring interesting gnu projects month published internet many ten languages international printed magazines including german linux-magazin name brave gnu world reference aldous huxley novel brave new world early 2001 initiated free software foundation europe fsfe fsf europe first free software foundation outside united states america transnational free software foundation greve invited expert “ commission intellectual property rights ” uk government represented coordination circle german civil society first phase united nations un world summit information society wsis part german governmental delegation also networked civil society working groups european level well thematic working group patents copyrights trademarks pct free software 2010 2017 served ceo well president later member board kolab systems ag küsnacht switzerland developers kolab server late 2017 greve known advocate open source co-founded company called vereign enable authentic communication blockchain federated networks claus h. bressmer
[ 707, 1523, 2985, 8158, 6876, 3174, 1351, 1637, 6981, 2559, 7823, 4872, 3868, 578, 1563, 7463, 5757, 7559, 3981, 4070, 3219, 761, 2599, 1406, 5515, 6048, 2698, 6674, 5787, 966, 2170, 4020 ]
Test
6,366
0
Mindnet:mindnet mindnet name several automatically acquired databases lexico-semantic relations developed members natural language processing group microsoft research 1990s considered one world largest lexicons databases could make automatic semantic descriptions along wordnet framenet hownet integrated linguistic database particularly distinguished wordnet way created automatically dictionary mindnet designed continuously extended first built longman dictionary contemporary english ldoce later included american heritage full text microsoft encarta system analyze linguistic representations arbitrary text underlying technology based parser used microsoft word grammar checker deployed natural language query engine microsoft encarta 99 encyclopedia
[]
Test
6,367
2
Berkeley_Software_Distribution:berkeley software distribution berkeley software distribution bsd operating system based research unix developed distributed computer systems research group csrg university california berkeley today bsd often refers descendants freebsd openbsd netbsd dragonfly bsd bsd initially called berkeley unix based source code original unix developed bell labs 1980s bsd widely adopted workstation vendors form proprietary unix variants dec ultrix sun microsystems sunos due permissive licensing familiarity many technology company founders engineers although proprietary bsd derivatives largely superseded 1990s unix svr4 osf/1 later releases provided basis several open-source operating systems including freebsd openbsd netbsd dragonfly bsd darwin trueos turn used proprietary operating systems including apple macos ios derived microsoft windows used part tcp/ip code earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd 4.3bsd released june 1986 determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability addition portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd used proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained permissive nature bsd license allowed many operating systems open-source proprietary incorporate bsd source code example microsoft windows used bsd code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 darwin basis apple macos ios based 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also incorporate bsd code starting 8th edition versions research unix bell labs close relationship bsd began 4.1cbsd vax used basis research unix 8th edition continued subsequent versions 9th edition incorporated source code improvements 4.3bsd result later versions research unix closer bsd system v. usenet posting 2000 dennis ritchie described relationship bsd research unix eric s. raymond summarizes longstanding relationship system v bsd stating divide roughly longhairs shorthairs programmers technical people tended line berkeley bsd business-oriented types system v. 1989 david a. curry wrote differences bsd system v. characterized system v often regarded standard unix however described bsd popular among university government computer centers due advanced features performance berkeley unix first unix include libraries supporting internet protocol stacks berkeley sockets unix implementation ip predecessor arpanet ncp ftp telnet clients produced university illinois 1975 available berkeley however memory scarcity pdp-11 forced complicated design performance problems integrating sockets unix operating system file descriptors became almost easy read write data across network access disk laboratory eventually released streams library incorporated much functionality software stack different architecture wide distribution existing sockets library reduced impact new api early versions bsd used form sun microsystems sunos founding first wave popular unix workstations bsd operating systems run much native software several operating systems architecture using binary compatibility layer much simpler faster emulation allows instance applications intended linux run effectively full speed makes bsds suitable server environments also workstation ones given increasing availability commercial closed-source software linux also allows administrators migrate legacy commercial applications may supported commercial unix variants modern operating system retaining functionality applications replaced better alternative current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system several operating systems based bsd including freebsd openbsd netbsd midnightbsd dragonfly bsd netbsd freebsd created 1993 initially derived 386bsd also known jolix merged 4.4bsd-lite source code 1994 openbsd forked netbsd 1995 dragonfly bsd forked freebsd 2003 bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix nextstep later became foundation apple inc. macos
[ 4297, 1445, 10, 5726, 13, 5745, 7182, 4344, 4347, 1493, 65, 5783, 1522, 1523, 7242, 4397, 126, 4423, 1574, 3032, 4441, 5865, 4447, 163, 4454, 3062, 1607, 1614, 3073, 7325, 4478, 190, 5912, 204, 1648, 5933, 1655, 5941, 5948, 1680, 7396, ...
Test
6,368
9
SpiderMonkey:spidermonkey spidermonkey code name first javascript engine written brendan eich netscape communications later released open-source currently maintained mozilla foundation eich wrote javascript ten days 1995 recruited netscape promise 'doing scheme browser idea using scheme abandoned engineering management decided language must ‘ look like java ’ fall 1996 eich needing pay substantial technical debt left first year stayed home two weeks rewrite mocha codebase became known spidermonkey mocha original working name language name spidermonkey may chosen reference movie beavis butt-head america character tom anderson mentions title characters whacking like couple spider monkeys 2011 eich transferred management spidermonkey code dave mandelin spidermonkey implements ecma-262 edition 5.1 ecmascript several added features ecma-357 ecmascript xml e4x dropped early 2013 even though spidermonkey used firefox provide host environments document object model dom mozilla projects support dom gecko provides host environment spidermonkey written c/c++ contains interpreter ionmonkey jit compiler garbage collector tracemonkey first jit compiler written javascript language compiler first released part spidermonkey firefox 3.5 providing performance improvements ranging 20 40 times faster baseline interpreter firefox 3 instead compiling whole functions tracemonkey tracing jit operates recording control flow data types interpreter execution data informed construction trace trees highly specialized paths native code improvements jägermonkey eventually made tracemonkey obsolete especially development spidermonkey type inference engine tracemonkey absent spidermonkey firefox 11 onward jägermonkey internally named methodjit whole-method jit compiler designed improve performance cases tracemonkey could generate stable native code first released firefox 4 eventually entirely supplanted tracemonkey replaced ionmonkey jägermonkey operated differently compilers class typical compilers worked constructing optimizing control flow graph representing function jägermonkey instead operated iterating linearly forward spidermonkey bytecode internal function representation although prohibits optimizations require instruction reordering jägermonkey compiling advantage fast useful javascript since recompiling due changing variable types frequent mozilla implemented number critical optimizations jägermonkey importantly polymorphic inline caches type inference difference tracemonkey jägermonkey jit techniques need explained hacks.mozilla.org article in-depth explanation technical details provided chris leary one spidermonkey developers blog post technical information found developer blogs dvander dmandelin ionmonkey name mozilla current javascript jit compiler aims enable many new optimizations impossible prior jägermonkey architecture ionmonkey traditional compiler translates spidermonkey bytecode control flow graph using static single assignment form ssa intermediate representation architecture enables well-known optimizations programming languages used javascript including type specialization function inlining linear-scan register allocation dead code elimination loop-invariant code motion compiler emit fast native code translations javascript functions arm x86 x86-64 platforms default engine since firefox 18 odinmonkey name mozilla new optimization module asm.js easily compilable subset javascript odinmonkey jit compiler uses current jit compiler included firefox release 22 spidermonkey intended embedded applications provide host environments javascript incomplete list follows spidermonkey includes javascript shell interactive javascript development command-line invocation javascript program files
[ 10, 6802, 16, 6458, 5055, 54, 4352, 422, 1128, 3663, 7587, 445, 1152, 4755, 6172, 7975, 1190, 2658, 3719, 5506, 3398, 5172, 7687, 5887, 1616, 183, 893, 5204, 5549, 3092, 562, 5571, 7734, 2040, 7015, 2049, 4525, 237, 6660, 7028, 7032, ...
Validation
6,369
2
BSD_Daemon:bsd daemon bsd daemon nicknamed beastie generic mascot bsd operating systems bsd daemon named software daemons class long-running computer programs unix-like operating systems play words takes cartoon shape demon bsd daemon nickname beastie slurred phonetic pronunciation bsd beastie customarily carries trident symbolize software daemon forking processes freebsd web site noted evi nemeth 1988 remarks cultural-historical daemons unix system administration handbook ancient greeks concept 'personal daemon similar modern concept 'guardian angel ... rule unix systems seem infested daemons demons copyright official bsd daemon images held marshall kirk mckusick early bsd developer worked bill joy freely licensed mascot individual personal use within bounds good taste example bad taste picture bsd daemon blowtorching solaris logo use requires copyright notice attribution reproduction daemon quantity t-shirts cdroms requires advance permission mckusick restricts use implementations bsd company logo although companies bsd-based products scotgold wind river systems gotten kind permission mckusick said early 1990s almost lost daemon certain large company failed show due diligence protecting 've taken due diligence seriously since request use license creative commons mckusick replied prefer bsd daemon used context bsd software reason carefully control copyright bsd daemon image ensure image used inappropriately agreed allow small image appear wikipedia larger ones also going put creative commons copyright bsd daemon first drawn 1976 comic artist phil foglio developer mike o'brien working bonded locksmith time opened wall safe foglio chicago apartment roommate split town without leaving combination return foglio agreed draw t-shirt artwork o'brien gave polaroid snaps pdp-11 system running unix along notions visual puns pipes demons/daemons forks bit bucket named /dev/null etc foglio drawing showed four happy little red daemon characters carrying tridents climbing falling water pipes front caricature pdp-11 used first national unix meeting us held urbana illinois bell labs bought dozens t-shirts featuring drawing subsequently appeared unix t-shirts decade usenix purchased reproduction rights foglio artwork 1986 original drawing apparently lost shortly sent digital equipment corporation use advertisement known copies photographs surviving t-shirts later popular versions bsd daemon drawn animation director john lasseter beginning early greyscale drawing cover unix system manager manual published 1984 usenix 4.2bsd author/editor sam leffler technical staff member csrg lasseter employees lucasfilm time four years lasseter drew widely known take bsd daemon cover mckusick co-authored 1988 book design implementation 4.3bsd operating system lasseter drew somewhat lesser-known running bsd daemon 4.4bsd version book 1994 1994 2004 netbsd project used artwork shawn mueller logo featuring four bsd daemons pose similar famous photo raising flag iwo jima however logo seen inappropriate international project superseded abstract flag logo chosen 400 entries competition early versions openbsd 2.3 2.4 used bsd daemon halo briefly used daemon police officer version 2.5 however openbsd switched puffy blowfish mascot freebsd project used 1988 lasseter drawing logo mascot 12 years however questions arose graphic effectiveness logo daemon unique freebsd since historically used bsd variants members freebsd core team considered inappropriate corporate marketing purposes lithographically scanned lasseter drawing line art however drawn neither scaled easily wide range sizes rendered appealingly two three colours contest create new freebsd logo began february 2005 scalable graphic somewhat echoes bsd daemon head chosen following october although little red fellow kept official project mascot walnut creek cdrom also produced two variations daemon cdrom covers freebsd 1.0 1.1 cdrom covers used 1988 lasseter drawing freebsd 2.0 cdrom used variant different colored specifically green tennis shoes distributions used image different colored tennis shoes years starting freebsd 2.0.5 walnut creek cdrom covers used daemon walking cdrom starting freebsd 4.5 freebsd mall used mirrored image walnut creek 2.0 image walnut creek 2.0 image also appeared cover different freebsd handbook editions mid-1990s marketer walnut creek cdrom called mascot chuck perhaps referring brand name kind shoes worn character name strongly deprecated copyright holder said bsd daemon proud fact name bsd daemon insist name call beastie ascii art image bsd daemon felix lee appeared startup menu freebsd version 5.x still set startup image later versions also used daemon_saver screensaver
[ 5268, 3838, 1341, 7514, 6794, 5373, 6085, 3856, 908, 8186, 481, 3457, 1279, 5571, 1193, 578, 738, 6367, 2583, 6918, 594, 4441, 6477, 2512, 424, 6046, 6489, 6583, 443 ]
Validation
6,370
4
Lethic_botnet:lethic botnet lethic botnet initially discovered around 2008 botnet consisting estimated 210 000 310 000 individual machines mainly involved pharmaceutical replica spam around early january 2010 botnet dismantled neustar employees contacted various lethic internet service providers bid take control botnet command control servers move temporarily caused botnets spam decrease trickle original volume february 2010 owners botnet managed re-establish control botnet use new command control servers located united states takedown decreased spam volume botnet however february 2010 botnets amount spam third original april 2010 botnet estimated 1.5 share spam market sending 2 billion spam messages day
[ 2173, 2632, 2376, 1632, 6715, 7441, 3281, 651, 7186, 2577, 5401, 6740, 5675, 7657, 1766, 51, 7294, 2693, 2789, 7307, 3154, 7600, 2535, 4110, 6328 ]
Validation
6,371
3
List_of_devices_using_Mediatek_SoCs:list devices using mediatek socs page lists every major device using mediatek system-on-a-chip soc organized chip devices uses based 32-bit arm7ej-s risc processor smartwatches mt6223c direct support cif camera based 32-bit arm7ej-s risc processor mt6238 support 3mp camera soc support java applications midp-2.1 cldc-1.1 instruction sets mediatek first soc compatible 3g networks smartwatches smartwatches
[ 6082, 6421, 7890, 722, 2926, 5740, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6165, 463, 804, 5472, 469, 4041, 5473, 3008, 3365, 6910, 5845, 7654, 6919, 3039, 1977, 2339, 2711, 550, 3786, 568, 5576, 7364, 1284, 4879, 7376, 5585, 4537, ...
Test
6,372
4
Known-plaintext_attack:known-plaintext attack known-plaintext attack kpa attack model cryptanalysis attacker access plaintext called crib encrypted version ciphertext used reveal secret information secret keys code books term crib originated bletchley park british world war ii decryption operation usage crib adapted slang term referring cheating e.g. cribbed answer test paper crib originally literal interlinear translation foreign-language text—usually latin greek text—that students might assigned translate original language idea behind crib cryptologists looking incomprehensible ciphertext clue word phrase might expected ciphertext would wedge test break otherwise random attacks cipher managed sometimes produce words preferably phrases would know might right track words phrases appeared would feed settings used reveal back whole encrypted message good effect case enigma german high command meticulous overall security enigma system understood possible problem cribs day-to-day operators hand less careful bletchley park team would guess plaintext based upon message sent recognizing routine operational messages instance daily weather report transmitted germans time every day due regimented style military reports would contain word wetter german weather location every message knowing local weather conditions helped bletchley park guess parts plaintext well operators would send standard salutations introductions officer stationed qattara depression consistently reported nothing report heil hitler occurring end message another well-known example bletchley park world war ii strenuous efforts made use even force germans produce messages known plaintext example cribs lacking bletchley park would sometimes ask royal air force seed particular area north sea mines process came known gardening obvious reference enigma messages soon sent would likely contain name area harbour threatened mines germans could accommodating regard whenever turned german double-cross agents sent message written british respective handlers frequently obligingly re-encrypted message word word enigma onward transmission berlin captured german revealed interrogation enigma operators instructed encode numbers spelling alan turing reviewed decrypted messages determined number eins one common string plaintext automated crib process creating eins catalogue assumed eins encoded positions plaintext catalogue included every possible position various rotors starting positions keysettings enigma polish cipher bureau likewise exploited cribs anx method world war ii germans use german followed x spacer form text anx united states britain used one-time tape systems 5-uco sensitive traffic devices immune known-plaintext attack however point-to-point links required massive supplies one time tapes networked cipher machines considered vulnerable cribs various techniques used disguise beginning ends message including cutting messages half sending second part first adding nonsense padding ends latter practice resulted world wonders incident kl-7 introduced mid-1950s first u.s. cipher machine considered safe known-plaintext attack classical ciphers typically vulnerable known-plaintext attack example caesar cipher solved using single letter corresponding plaintext ciphertext decrypt entirely general monoalphabetic substitution cipher needs several character pairs guessing fewer 26 distinct pairs
[ 1353, 1641, 2566, 1376, 2861, 4805, 6657, 5776, 7862, 1320, 7771, 5185, 5796 ]
Validation
6,373
3
Socket_AM2:socket am2 socket am2 renamed socket m2 prevent using name cyrix mii processors cpu socket designed amd desktop processors including performance mainstream value segments released may 23 2006 replacement socket 939 am2 processors incompatible 939 motherboards vice versa although 940 pins incompatible socket 940 socket am2 supports ddr2 sdram memory ddr memory previous socket 939 supported anandtech reported socket am2 system performance 7 faster socket 939 equivalents applications 2 faster despite 30 greater memory bandwidth due ddr2 support first processor cores support socket am2 single-core orleans athlon 64 manila sempron dual-core windsor athlon 64 x2 athlon 64 fx processors socket am2 include sse3 instructions developed 90 nanometer technology later models featured 65 nanometer technology socket am2 also supports newer amd phenom processors originally built socket am2+ backward compatible am2 however depended upon system/motherboard manufacturer supply bios firmware update operate processor socket am2 part amd generation cpu sockets included socket f servers socket s1 mobile computing also single-socket opteron processors available am2 technical documentation readily available earlier generations amd processor sockets am2 processor functional data sheet amd document number 31117 made publicly available 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable multiple sockets announced theory pin-compatible socket am2 differ terms features socket am2+ intermediate successor socket am2 features split power planes hypertransport 3.0 socket am2+ chips plug socket am2 motherboard although certain motherboard manufacturers support operate hypertransport 2.0 socket am3 processors able run socket am2 am2+ motherboards appropriate bios updates vice versa am3 processors new memory controller supporting ddr2 ddr3 sdram allowing backwards compatibility am2 am2+ motherboards since am2 am2+ processors lack new memory controller work am3 motherboards
[ 2539, 5799, 2541, 5895, 6599, 4931, 7163, 2997, 3362, 1735, 5377, 6351, 913, 7826, 2751, 6545, 5063, 6655, 6562, 7484, 3145, 4090, 866, 5436, 780, 1143 ]
Validation
6,374
3
Adjust_flag:adjust flag adjust flag cpu flag flags register x86-compatible cpus preceding 8080-family also called auxiliary flag auxiliary carry flag ac flag bit located position 4 cpu flag register indicates arithmetic carry borrow generated four least significant bits lower nibble primarily used support binary-coded decimal bcd arithmetic auxiliary flag set 1 add operation carry low nibble lowest four bits high nibble upper four bits borrow high nibble low nibble low-order 8-bit portion subtraction otherwise carry borrow occurs flag cleared reset set 0
[ 8033, 2567, 352, 421 ]
Validation
6,375
3
Peripheral_pin_controller:peripheral pin controller peripheral pin controller ppc feature intel strong arm processor family enable disable i/o ports also allows user make uses pins normally dedicated peripherals peripheral disabled pins available general purpose use set predetermined alternate uses serial ports 1 4
[ 1237 ]
Test
6,376
4
Automotive_security:automotive security automotive security refers branch computer security focused cyber risks related automotive context increasingly high number ecus vehicles alongside implementation multiple different means communication towards vehicle remote wireless manner led necessity branch cybersecurity dedicated threats associated vehicles confused automotive safety implementation multiple ecus electronic control units inside vehicles began early '70s thanks development integrated circuits microprocessors made economically feasible produce ecus large scale since number ecus increased 100 per vehicle units nowadays control almost everything vehicle simple tasks activating wipers safety-related ones like brake-by-wire abs anti-lock braking system autonomous driving also strongly reliant implementation new complex ecus adas alongside sensors lidars radars control units inside vehicle ecus connected cabled wireless communication networks bus controller area network bus media oriented system transport flexray rf radio frequency many implementations tpmss tire pressure monitoring systems important notice many ecus require data received networks arrive various sensors operate use data modify behavior vehicle e.g. cruise control modifies vehicle speed depending signals arriving button usually located steering wheel since development cheap wireless communication technologies bluetooth lte wi-fi rfid similar automotive producers oems designed ecus implement technologies goal improving experience driver passengers safety-related systems onstar general motors telematic units communication smartphones vehicle speakers bluetooth android auto apple carplay rkes remote keyless entry systems examples vehicle become externally connected devices cases internet furthermore since 2016 development implementation marketed vehicles v2x technologies long- short-range communication interfaces vehicle become considerably bigger although implementation new technologies devices improved safety driving experience vehicle increasingly high number externally-communicating units inside vehicle led increment dimension attack surfaces vehicle electronic control units nowadays capability modifying behavior vehicle necessary ensure attacker capabilities take control critical systems inside vehicle due last ten fifteen years new concept automotive security started become important designing new vehicles threat models automotive world based real-world theoretically possible attacks real-world attacks aim safety people around car modifying cyber-physical capabilities vehicle e.g. steering braking accelerating without requiring actions driver theoretical attacks supposed focus also privacy-related goals obtaining gps data vehicle capturing microphone signals similar regarding attack surfaces vehicle usually divided long-range short-range local attack surfaces lte dsrc considered long-range ones bluetooth wi-fi usually considered short-range although still wireless finally usb obd-ii attack surfaces require physical access car defined local attacker able implement attack long-range surface considered stronger dangerous one requires physical access vehicle 2015 possibility attacks vehicles already market proven possible miller valasek managed disrupt driving jeep cherokee remotely connecting remote wireless communication common network used vehicles one mainly used safety-related communication due real-time properties simplicity cheapness reason majority real-world attacks implemented ecus connected type network majority attacks demonstrated either actual vehicles testbeds fall one following categories sniffing computer security field generally refers possibility intercepting logging packets generally data network case since bus network every node listens communication network useful attacker read data learn behavior nodes network implementing actual attack usually final goal attacker simply sniff data since packets passing type network usually valuable read dos information security usually described attack objective making machine network unavailable dos attacks ecus connected buses done network abusing arbitration protocol used always win arbitration targeting single ecu abusing error handling protocol second case attacker flags messages victim faulty convince victim broken therefore shut network spoofing attacks comprise cases attacker falsifying data sends messages pretending another node network automotive security usually spoofing attacks divided masquerade replay attacks replay attacks defined attacker pretends victim sends sniffed data victim sent previous moment masquerade contrary spoofing attacks data payload created attacker increasing complexity devices networks automotive context requires application security measures limit capabilities potential attacker since early 2000 many different countermeasures proposed cases applied following list common security measures
[ 623, 3932, 6694, 6515, 5372, 3681, 3448, 2105, 1461, 651, 2566, 2747, 5485, 6725, 1376, 3794, 5401, 2310, 6823, 2944, 2491, 5149, 3726, 1584, 4440, 6756, 3486, 6574, 2789, 74, 7865, 7319, 3680, 1805 ]
Test
6,377
3
The_Castle_(video_game):castle video game castle computer game released ascii corporation 1986 fm-7 x1 computers later ported msx nec branded personal computers got single console port sg-1000 game set within castle containing 100 rooms contain one puzzles object game navigate castle rescue princess player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block additionally player progress blocked many doors requiring key color unlock key removed player inventory upon use prince must standing platform next door able unlock simply jump fall press door player navigate castle help map obtained early game map provide player matrix 10x10 rooms highlight room princess located rooms visited player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers followed castlequest also known castle excellent japan games notable early examples metroidvania genre
[ 4023 ]
Test
6,378
3
List_of_applications_of_ARM_cores:list applications arm cores list applications arm cores lists products using various arm microprocessor cores sorted generation release name
[ 1066, 6788, 6082, 6421, 7890, 722, 4317, 2926, 5740, 1473, 7905, 5750, 5752, 5405, 5406, 3306, 7919, 1864, 4726, 67, 7588, 446, 451, 6874, 6165, 6517, 463, 804, 1167, 5472, 469, 4041, 472, 3008, 3365, 3012, 3704, 1556, 6910, 5493, 3025,...
Test
6,379
4
FIPS_140-3:fips 140-3 federal information processing standard fips publication 140-3 announced update u.s. government computer security standard used accredit cryptographic modules title standard security requirements cryptographic modules fips 140-2 remains currently approved version efforts update fips 140-2 date back early 2000s fips 140-3 2013 draft scheduled signature secretary commerce august 2013 however never happened draft subsequently abandoned 2014 nist released substantially different draft fips 140-3 version effectively directing use international organization standardization/international electrotechnical commission iso/iec standard 19790:2012 replacement fips 140-2 2014 draft fips 140-3 also abandoned august 12 2015 nist formally released statement federal register asking comments potential use portions iso/iec 19790:2014 update fips 140-2 reference 2014-version iso/iec 19790 inadvertent error federal registry posting 2012 recent version update process fips 140 hamstrung deep technical issues topics hardware security apparent disagreement us government path forward abandoned 2013 draft fips 140-3 required mitigation non-invasive attacks validating higher security levels introduced concept public security parameter allowed deference certain self-tests specific conditions met strengthened requirements user authentication integrity testing remains unclear whether issues addressed ultimately approved release fips 140-3 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components federal agencies departments validate module use covered existing fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment csec canadian government security programs overseen nist csec focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes march 22 2019 united states secretary commerce wilbur ross approved fips 140-3 security requirements cryptographic modules succeed fips 140-2 according announcement fips 140-3 become effective september 22 2019 validated cryptographic module validation program cmvp fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time
[ 6049, 298, 1353, 1805 ]
Test
6,380
2
MS-DOS:ms-dos ms-dos acronym microsoft disk operating system operating system x86-based personal computers mostly developed microsoft collectively ms-dos rebranding ibm pc dos operating systems attempting compatible ms-dos sometimes referred dos also generic acronym disk operating system ms-dos main operating system ibm pc compatible personal computers 1980s early 1990s gradually superseded operating systems offering graphical user interface gui various generations graphical microsoft windows operating system ibm licensed re-released august 12 1981 pc dos 1.0 use pcs although ms-dos pc dos initially developed parallel microsoft ibm two products diverged twelve years 1993 recognizable differences compatibility syntax capabilities lifetime several competing products released x86 platform ms-dos went eight versions development ceased 2000 initially ms-dos targeted intel 8086 processors running computer hardware using floppy disks store access operating system application software user data well progressive version releases delivered support mass storage media ever greater sizes formats along added feature support newer processors rapidly evolving computer architectures ultimately key product microsoft growth programming language company diverse software development firm providing company essential revenue marketing resources also underlying basic operating system early versions windows ran gui flexible operating system consumes negligible installation space ms-dos renamed form 86-dos owned seattle computer products written tim paterson development 86-dos took six weeks basically clone digital research cp/m 8080/z80 processors ported run 8086 processors two notable differences compared cp/m improved disk sector buffering logic introduction fat12 instead cp/m filesystem first version shipped august 1980 microsoft needed operating system ibm personal computer hired tim paterson may 1981 bought 86-dos 1.10 75,000 july year microsoft kept version number renamed ms-dos also licensed ms-dos 1.10/1.14 ibm august 1981 offered pc dos 1.0 one three operating systems ibm 5150 ibm pc within year microsoft licensed ms-dos 70 companies designed os could run 8086-family computer computer would distinct hardware version ms-dos similar situation existed cp/m ms-dos emulating solution cp/m adapt different hardware platforms end ms-dos designed modular structure internal device drivers minimally primary disk drives console integrated kernel loaded boot loader installable device drivers devices loaded integrated boot time oem would use development kit provided microsoft build version ms-dos basic i/o drivers standard microsoft kernel would typically supply disk end users along hardware thus many different versions ms-dos different hardware major distinction ibm-compatible isa machine ms-dos compatible machine machines like tandy 2000 ms-dos compatible ibm-compatible could run software written exclusively ms-dos without dependence peripheral hardware ibm pc architecture design would worked well compatibility application programs used ms-dos services perform device i/o indeed design philosophy embodied windows nt see hardware abstraction layer however ms-dos early days greater speed attainable programs direct control hardware particular importance especially games often pushed limits contemporary hardware soon ibm-compatible architecture became goal long 8086-family computers closely emulated ibm hardware single version ms-dos fixed hardware platform needed market version version ms-dos discussed dozens oem versions ms-dos relevant systems designed case similar function capability standard version ibm pc—often same-numbered version always since oems used proprietary version numbering schemes e.g labeling later releases ms-dos 1.x 2.0 vice versa —with notable exceptions microsoft omitted multi-user support ms-dos microsoft unix-based operating system xenix fully multi-user company planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run motorola 68000 zilog z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft advertised ms-dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting breakup bell system however computer systems started selling unix system v. believing could compete unix market microsoft abandoned xenix 1987 transferred ownership xenix santa cruz operation sco march 25 2014 microsoft made code scp ms-dos 1.25 mixture altos ms-dos 2.11 televideo pc dos 2.11 available public microsoft research license agreement makes code source-available open source defined open source initiative free software foundation standards microsoft would later re-license code mit license september 28 2018 making versions free software april fool day joke 2015 microsoft mobile launched windows phone application called ms-dos mobile presented new mobile operating system worked similar ms-dos microsoft licensed released versions ms-dos different names like lifeboat associates software bus 86 a.k.a sb-dos compaq-dos ncr-dos z-dos eventually enforced ms-dos name versions ibm one originally called ibm personal computer dos later shortened ibm pc dos competitors released compatible dos systems dr dos pts-dos could also run dos applications former eastern bloc ms-dos derivatives named dcp 3.20 3.30 existed late 1980s produced east german electronics manufacturer veb robotron following versions ms-dos released public microsoft dos released oem channel digital research released dr dos 5.0 retail upgrade pc dos 5.00.1 ibm-microsoft agreement started end ibm entered retail dos market ibm dos 5.00.1 5.02 6.00 pc dos 6.1 6.3 7 2000 7.1 localized versions ms-dos existed different markets western issues ms-dos evolved around set tools drivers localized message languages differing sets supported codepages keyboard layouts language versions considerably different western issues adapted run localized pc hardware additional bios services available western pcs support multiple hardware codepages displays printers support dbcs alternative input methods graphics output affected issues include japanese dos/v korean arabic ados 3.3/5.0 hebrew hdos 3.3/5.0 russian rdos 4.01/5.0 well eastern european versions dos microcomputers based intel 8086 8088 processors including ibm pc clones initial competition pc dos/ms-dos line came digital research whose cp/m operating system inspired ms-dos fact remains controversy whether qdos less plagiarised early versions cp/m code digital research released cp/m-86 months ms-dos offered alternative ms-dos microsoft licensing requirements higher price executable programs cp/m-86 ms-dos interchangeable many applications sold ms-dos cp/m-86 versions ms-dos became preponderant later digital research operating systems could run ms-dos cp/m-86 software ms-dos originally supported simple .com modelled similar binary incompatible format known cp/m-80 cp/m-86 instead supported relocatable format using file extension .cmd avoid name conflicts cp/m-80 ms-dos .com files ms-dos version 1.0 added advanced relocatable .exe executable file format machines early days ms-dos differing system architectures certain degree incompatibility subsequently vendor lock-in users began using ms-dos machines compelled continue using version customized hardware face trying get proprietary hardware software work new system business world 808x-based machines ms-dos tied faced competition unix operating system ran many different hardware architectures microsoft sold version unix pc called xenix emerging world home users variety computers based various processors serious competition ibm pc apple ii early apple macintosh commodore 64 others use 808x processor many 808x machines different architectures used custom versions ms-dos first machines competition time ibm pc hardware configuration became dominant 808x market software written communicate directly pc hardware without using standard operating system calls ran much faster true pc-compatibles non-pc-compatible 808x machines small market fast software written alone market remained open ibm pcs machines closely imitated architecture running either single version ms-dos compatible pcs equivalent ibm pc dos clones cost much less ibm-branded machines similar performance became widely used home users ibm pcs large share business computer market microsoft ibm together began intended follow-on ms-dos/pc dos called os/2 os/2 released 1987 microsoft began advertising campaign announcing dos dead stating version 4 last full release os/2 designed efficient multi-tasking standard operating systems since 1963 offered number advanced features designed together similar look feel seen legitimate heir kludgy dos platform ms-dos grown spurts many significant features taken duplicated microsoft products operating systems ms-dos also grew incorporating direct licensing feature duplicating functionality tools utilities developed independent companies norton utilities pc tools microsoft anti-virus qemm expanded memory manager stacker disk compression others period digital research competing operating system market computers like amstrad pc1512 sold floppy disks two operating systems one could used time ms-dos cp/m-86 derivative digital research produced dos plus compatible ms-dos 2.11 supported cp/m-86 programs additional features including multi-tasking could read write disks cp/m ms-dos format os/2 protracted development digital research released ms-dos compatible dr dos 5.0 included features available third-party add-ons ms-dos unwilling lose portion market microsoft responded announcing pending release ms-dos 5.0 may 1990 effectively killed dr dos sales actual release ms-dos 5.0 june 1991 digital research brought dr dos 6.0 sold well pre-announcement ms-dos 6.0 stifled sales dr dos microsoft accused carefully orchestrating leaks future versions ms-dos attempt create industry called fud fear uncertainty doubt regarding dr dos example october 1990 shortly release dr dos 5.0 long eventual june 1991 release ms-dos 5.0 stories feature enhancements ms-dos started appear infoworld pc week brad silverberg vice president systems software microsoft general manager windows ms-dos business unit wrote forceful letter pc week november 5 1990 denying microsoft engaged fud tactics serve customers better decided forthcoming version 5.0 denying microsoft copied features dr dos feature enhancements ms-dos version 5.0 decided development begun long heard dr dos 5.0 similar features 50 million ms-dos users n't surprising dri heard requests customers – schulman et al 1994 pact microsoft ibm promote os/2 began fall apart 1990 windows 3.0 became marketplace success much microsoft contributions os/2 also went creating third gui replacement dos windows nt ibm already developing next version os/2 carried development platform without microsoft sold alternative dos windows response digital research dr dos 6.0 bundled superstor disk compression microsoft opened negotiations stac electronics vendor popular dos disk compression tool stacker due diligence process stac engineers shown microsoft part stacker source code stac unwilling meet microsoft terms licensing stacker withdrew negotiations microsoft chose license vertisoft doubledisk using core doublespace disk compression ms-dos 6.0 6.20 released 1993 including microsoft doublespace disk compression utility program stac successfully sued microsoft patent infringement regarding compression algorithm used doublespace resulted 1994 release ms-dos 6.21 disk compression removed shortly afterwards came version 6.22 new version disk compression system drivespace different compression algorithm avoid infringing code prior 1995 microsoft licensed ms-dos windows computer manufacturers three types agreement per-processor fee system company sold per-system fee system particular model per-copy fee copy ms-dos installed largest manufacturers used per-processor arrangement lowest fee arrangement made expensive large manufacturers migrate operating system dr dos 1991 u.s. government federal trade commission began investigating microsoft licensing procedures resulting 1994 settlement agreement limiting microsoft per-copy licensing digital research gain settlement years later successor interest caldera sued microsoft damages caldera v. microsoft lawsuit believed settlement ran order 150 million revealed november 2009 release settlement agreement 280 million microsoft also used variety tactics ms-dos several applications development tools operating perfectly running genuine ms-dos pc dos would break run another vendor implementation dos notable examples practice included introduction windows 3.0 1990 easy usability graphical user interface severely diminished usage ms-dos based command line release windows 95 continuing windows 9x product line windows integrated version ms-dos used bootstrapping troubleshooting backwards-compatibility old dos software particularly games longer released standalone product windows 95 dos called ms-dos 7 booted separately without windows gui capability retained windows 98 second edition windows removed capability boot underlying ms-dos 8.0 alone hard disk retained ability make dos boot floppy disk called emergency boot disk hacked restore full access underlying dos contrast windows 9x series windows nt-derived 32-bit operating systems developed alongside 9x series windows nt 2000 xp newer contain ms-dos part operating system nt built subsystem running dos entirely different independent operating system provide subset dos emulation run dos applications provide dos-like command prompt windows 64-bit versions windows nt line provide dos emulation run dos applications natively windows xp contains copy windows boot disk stripped bootstrap accessible formatting floppy ms-dos startup disk files like driver cd-rom support deleted windows bootdisk startup files autoexec.bat config.sys longer content modified disk base creating ms-dos image windows xp deleted files recovered undelete tool booting ms-dos startup disk made windows xp format tool version reports windows millenium ms-dos 8.0 used base windows 98 never released stand alone product windows vista files startup disk dated april 18 2005 otherwise unchanged including string ms-dos version 8 copyright 1981–1999 microsoft corp inside codice_1 starting windows 10 ability create dos startup disk removed either virtual machine running ms-dos older version virtual machine dual boot must used format floppy disk image must obtained external source solutions include using dos compatible alternatives freedos even copying required files boot sector ms-dos 6.22 last standalone version produced microsoft intel 8088 intel 8086 intel 80286 processors remain available download via msdn volume license oem license partner websites customers valid login credentials ms-dos still used embedded x86 systems due simple architecture minimal memory processor requirements though current products switched still-maintained open-source alternative freedos 2018 microsoft released source code ms-dos 1.25 2.0 github purpose according microsoft mainly education experimentation historic operating systems new programmers gain understanding low-level software works historic current due historical nature software microsoft accept pull requests code pull requests modified translated documentation accepted users however allowed fully encouraged fork repository containing ms-dos source code make modifications whatever like versions ms-dos obtained operation modification abandonware sites winworldpc versions microsoft windows ms-dos-like command-line interface cli called command prompt could run many dos variously win32 os/2 1.x posix command line utilities command-line session allowing piping commands user interface icon windows 2000 followed native ms-dos interface 16-bit versions windows 3.11 ran graphical user interface gui top ms-dos windows 95 98 98 se ms-dos part superficially integrated treating operating systems complete package though dos component could actually stand alone command line accessed dos command line usually codice_1 windows module winoldap.mod new line windows windows nt boot kernel whose sole purpose load windows one run win32 applications loader system manner os/2 unix consumer windows launch character-mode sessions command session permits running various supported command line utilities win32 ms-dos os/2 1.x posix emulators ms-dos os/2 posix use host window way win16 applications use win32 explorer using host window allows one pipe output emulations ms-dos emulation done ntvdm nt virtual dos machine modified softpc former product similar virtualpc running modified ms-dos 5 ntio.sys ntdos.sys output handled console dlls program prompt codice_3 codice_4 codice_5 see output 64-bit windows either dos emulation dos commands come 32-bit windows dos version returns 5.00 5.50 depending api function used determine utilities ms-dos 5.00 run emulation without modification early beta programs nt show ms-dos 30.00 programs running ms-dos 30.00 would assume os/2 control os/2 emulation handled os2ss.exe os2.exe doscalls.dll os2.exe version os/2 shell cmd.exe passes commands os2ss.exe input-output windows nt shell windows 2000 last version nt support os/2 emulation os/2 1.30 posix emulated posix shell emulated shell commands handled directly cmd.exe command prompt often called ms-dos prompt part official name windows 9x early versions windows nt nt 3.5 earlier part softpc emulation dos redirects output actually codice_1 16-bit commands run ntvdm codice_7 codice_8 initialisation determined codice_9 optionally permitting use win32 console applications internal commands codice_10 directive win32 console applications use codice_3 command prompt shell confusion exist os/2 separate dos os/2 prompts running dos program os/2 launch separate dos window run application versions windows itanium longer sold microsoft x86-64 architectures longer include ntvdm therefore longer natively run ms-dos 16-bit windows applications alternatives form virtual machine emulators microsoft virtual pc well vmware dosbox others 1983 onwards various companies worked graphical user interfaces guis capable running pc hardware however required duplicated effort provide much consistency interface design even products company later 1985 microsoft windows 1.0 released microsoft first attempt providing consistent user interface applications early versions windows ran top ms-dos first windows met little success also true companies efforts well example gem version 3.0 windows gained market acceptance windows 9x used dos boot process launch protected mode basic features related file system long file names available dos running subsystem windows windows nt runs independently dos includes ntvdm component simulating dos environment legacy applications ms-dos compatible systems include microsoft manufactured ibm pc dos ibm ms-dos identical products eventually diverged starting ms-dos version 6.0 digital research follow microsoft version numbering scheme example ms-dos 4 released july 1988 followed dr dos 5.0 may 1990 ms-dos 5.0 came april 1991 dr dos 6.0 released following june products collectively referred dos even though disk operating system generic term used systems unrelated x86 ibm pc ms-dos also generic reference dos ibm pc compatible computers microsoft control windows platform programming practices intentionally made windows appear ran poorly competing versions dos crippled ability dos makers continue compete ms-dos digital research release interim releases circumvent windows limitations inserted artificially designed specifically provide microsoft competitive advantage
[ 7146, 4291, 1442, 4295, 7161, 2910, 13, 7172, 21, 1472, 5743, 5745, 2932, 35, 2949, 7206, 63, 65, 7213, 5783, 5784, 1508, 7223, 5794, 2978, 1522, 2983, 1534, 7246, 4397, 4417, 126, 5833, 127, 7269, 3039, 7288, 5862, 5865, 5872, 4454, ...
Validation
6,381
5
Microsoft_Media_Server:microsoft media server microsoft media server mms microsoft proprietary network-streaming protocol serves transfer unicast data windows media services previously called netshow services mms transported via udp tcp mms default port udp/tcp 1755 microsoft deprecated mms favor rtsp tcp/udp port 554 2003 release windows media services 9 series continued support mms time interest backward compatibility support protocol finally dropped windows media services 2008 several years developers sdp multimedia download-tool reverse engineered mms protocol published unofficial documentation however microsoft finally released protocol specification february 2008
[ 7148, 4026, 6696, 2185, 2281, 555, 7168, 7169, 5378, 20, 6531, 6991, 7176, 7637, 4415, 7734, 3383, 7093, 4352, 7850, 1970, 422, 7494, 7765, 3827, 6495 ]
Test
6,382
4
Claria_Corporation:claria corporation claria corporation formerly gator corporation software company based redwood city california invented “ behavioral marketing ” highly effective controversial new form online advertising founded 1998 denis coleman co-founder symantec stanford mba sasha zorovic engineer mark pennell based work zorovic done stanford march 1999 jeff mcfadden hired ceo zorovic effectively forced name later used interchangeably gain advertising network claimed serviced 50 million users claria exited adware business end second quarter 2006 eventually shut completely october 2008 gator also known gain adserver products collected personal information unknowing users including websites visited portions credit card numbers target display ads computers web surfers billed leader online behavioral marketing company changed name claria corporation october 30 2003 effort better communicate expanding breadth offerings provide consumers advertisers according ceo president jeff mcfadden originally released 1999 gator frequently installed together programs offered free charge go zilla kazaa development programs partially funded revenue advertising displayed gator mid-2003 gator installed estimated 35 million pcs even though gator installed uninstall available via add/remove programs control panel microsoft windows many spyware removal tools also detect remove gator end user license agreement attempts disallow manual removal prohibiting unauthorized means uninstallation gator software undercut fundamental ad-supported nature many internet publishers replacing banner ads web sites thereby depriving content provider revenue necessary continue providing content june 2002 number large publishers including new york post new york times dow jones company sued gator software practice replacing ads lawsuits settled court february 2003 gator attempted combat spyware labels litigation september 2003 company threatened sites pc pitstop libel lawsuits part settlement signed sept. 30 2003 pc pitstop -- scans computers hostile otherwise undesirable code -- removed pages spyware information center titles gator spyware gator boycott list february 2004 gator made confidential settlement litigation brought seven top newspaper publishers including washington post new york post new york times dow jones washington post l.l bean extended stay america suits similarly settled gator corporation released suite free internet applications performed various tasks however installing applications user would continually shown ads gain network even programs running foreground suite included using software user shown advertisements according computer associates spyware information center applications suite classified adware spyware display ads unrelated product primary user interface visible programs employ user internet connection report behavior information back claria although user explicit consent always required install applications claria took advantage fact users choose bothering educate installing cases install process users must choose whether install free version serves lots ads described pay 30 version serves ads since announcement shut ad network claria stopped accepting payment ad free versions despite unpopular reputation claria corporation received backing major venture capital firms including greylock technology crossover ventures u.s. venture partners andy bechtolsheim early investor filed 150 million ipo april 2004 stating income 35 million revenues 90 million 2003 investors concerned practices might illegal least utah time another concern revenue came one partner yahoo overture claria withdrew filing august 2004 july 2005 microsoft corporation came fire revealed anti-spyware product would longer quarantine claria software spyware though still offered users option remove software microsoft reportedly contemplating purchase claria many consumers felt conflict interest spyware-reporting agencies computer associates panda software truprevent technologies still label claria products adware spyware march 2006 claria claimed would exiting adware business focusing personalized search technology july 1 2006 claria ceased displaying pop-up ads around time new company nebuad formed former claria employees another approach targeted advertisements april 21 2008 claria sold gator.com domain october 2008 rebranded jelly cloud company quietly shut today claria former senior management team occupy variety leadership roles throughout online marketing industry scott vandevelde claria last ceo former chief revenue officer chief revenue officer dotomi online advertising firm specializing personalized media scott eagle claria former chief operating officer chief marketing officer joined eharmony online dating company chief marketing officer former ceo jeff mcfadden vp business development zen marketing former vp business development mitchell weisman part leadership team lifestreet corporation largest ad network facebook tony martin claria former vp engineering ran engineering operations project playlist claria former vp engineering analytics dominic bennett claria senior director finance dennis jang part leadership team turn leading online advertising dsp vp engineering vp finance respectively co-founder former claria cto mark pennell senior software engineer apple 2016 claria core engineering team works apple
[ 496, 502, 142, 4759, 2241, 2444 ]
Test
6,383
7
Explicit_multi-threading:explicit multi-threading random-access machine ram abstract machine model used computer science study algorithms complexity standard serial computing pram computational model abstract parallel machine model introduced similarly study parallel algorithms complexity parallel computing yet built researchers developed large body knowledge parallel algorithms pram model parallel algorithms also known simple standards approaches parallel algorithms large body parallel algorithms knowledge pram model relative simplicity motivated building computers whose programming guided parallel algorithms since productivity parallel programmers long considered crucial success parallel computer simplicity algorithms important multi-core computers built around two processor cores integrated single integrated circuit die widely used across many application domains including general-purpose computing explicit multi-threading xmt computing paradigm building programming multi-core computers tens hundreds thousands processor cores experimental work published 2011 2012 demonstrates significantly greater speedups advanced pram algorithms xmt prototypes problems state-of-the-art multi-core computers work published 2018 shows lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems inductive lock-step approach stands contrast multi-threaded programming approaches many core systems known challenging programmers xmt paradigm introduced uzi vishkin explicit multi-threading xmt computing paradigm integrates several levels abstraction work-time wt sometimes called work-depth framework introduced provides simple way conceptualizing describing parallel algorithms wt framework parallel algorithm first described terms parallel rounds round operations performed characterized several issues suppressed example number operations round need clear processors need mentioned information may help assignment processors jobs need accounted second suppressed information provided inclusion suppressed information fact guided proof scheduling theorem due wt framework useful since greatly simplify initial description parallel algorithm inserting details suppressed initial description often difficult example wt framework adopted basic presentation framework parallel algorithms books pram model well class notes explains simple connection wt framework rudimentary ice abstraction noted xmt paradigm programmed using xmtc parallel multi-threaded programming language small extension programming language c. xmt paradigm include programmer ’ workflow starts casting algorithm wt framework proceeds programming xmtc xmt multi-core computer systems provides run-time load-balancing multi-threaded programs incorporating several patents one generalizes program counter concept central von neumann architecture multi-core hardware january 2007 64-processor computer named paraleap demonstrates overall concept completed xmt concept presented xmt 64-processor computer since making parallel programming easy one biggest challenges facing computer science today demonstration also sought include teaching basics pram algorithms xmtc programming students ranging high-school graduate school experimental work reported maximum flow problem two papers graph connectivity connectivity graph theory graph biconnectivity biconnected graph graph triconnectivity triconnected component problems demonstrated advanced algorithms parallel algorithmic literature xmt paradigm offer 8 times 100 times greater speedups problems state-of-the-art multi-core computers reported speedup obtained comparing clock cycles xmt prototype relative fastest serial algorithm running fastest serial machines xmt prototyping culminated establishing lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems 2018 result sharpens contrast xmt programming multi-threaded programming approaches employed nearly many-core systems whose race conditions demands tend challenge sometimes even fail programmers
[ 4864 ]
Test
6,384
3
Call_gate_(Intel):call gate intel call gate mechanism intel x86 architecture changing privilege level process executes predefined function call using call far instruction call gates intended allow less privileged code call code higher privilege level type mechanism essential modern operating systems employ memory protection since allows user applications use kernel functions system calls way controlled operating system call gates use special selector value reference descriptor accessed via global descriptor table local descriptor table contains information needed call across privilege boundaries similar mechanism used interrupts assuming call gate set already operating system kernel code simply call far necessary segment selector offset field ignored processor perform number checks make sure entry valid code operating sufficient privilege use gate assuming checks pass new cs/eip loaded segment descriptor continuation information pushed onto stack new privilege level old ss old esp old cs old eip order parameters may also copied old stack new stack needed number parameters copy located call gate descriptor kernel may return user space program using ret far instruction pops continuation information stack returns outer privilege level os/2 early user call gates transfer application code running ring 3 privileged code running ring 2 kernel code ring 0 windows 95 executes drivers process switching ring 0 applications including api dll kernel32.dll krnl386.exe executed ring 3 driver vwin32.vxd provides key operating system primitives ring 0 allows calling driver functions 16-bit applications msdos win16 address obtained calling int 2fh 1684h ax register identify vxd entry point requested bx register set 16-bit vxd id upon return int instruction es.di registers contain far pointer called transfer control vxd running ring 0 descriptor pointed es actually call gate 32-bit applications however need access windows 95 driver code call undocumented vxdcall function kernel32.dll essentially calls int 30h changes ring mode modern x86 operating systems transitioning away call far call gates introduction x86 instructions system call sysenter/sysexit intel syscall/sysret amd new faster mechanism introduced control transfers x86 programs architectures support call gates use rare even new instructions software interrupts traps preferred portability even though call gates significantly faster interrupts call gates flexible sysenter/sysexit syscall/sysret instructions since unlike latter two call gates allow changing arbitrary privilege level arbitrary albeit higher equal privilege level fast sys* instructions allow control transfers ring 3 0 vice versa preserve system security global descriptor table must held protected memory otherwise program able create call gate use raise privilege level call gates used software security exploits ways found around protection one example e-mail worm gurong.a written exploit microsoft windows operating system uses \device\physicalmemory install call gate
[ 5962, 4759, 5571, 3751, 1880, 858 ]
Test