node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,385 | 3 | Vanguard_(microkernel):vanguard microkernel vanguard discontinued experimental microkernel developed apple computer research group atg early 1990s based v-system vanguard introduced standardized object identifiers unique message chaining system improved performance vanguard used apple commercial products development ended 1993 ross finlayson project principal investigator left apple vanguard generally similar v-system added support true object oriented programming operating system meant kernel server interfaces exported objects could inherited extended new code change real effect system primarily change source code makes programming easier instance vanguard i/o class supported number different servers networking file servers instance new applications could interact importing i/o interface calling methods also made writing new servers much easier standard program well able share code easily key concept almost microkernels breaking single large kernel set communicating servers instead single large program control entire hardware side computer system sorts duties handed smaller programs given rights control different parts machine instance particular server might given control networking hardware another task managing hard drives another server would handle file system calling lower-level servers user applications ask services sending messages servers using form inter-process communications ipc opposed asking kernel work via syscall trap v ipc system appears conceptually modeled remote procedure calls rpc client application perspective client application imported interface definition file containing information calls supported kernel applications used definition package requests called kernel would immediately take examine results pass information right handler potentially within kernel results handed back kernel client general terms operation system appears client application similar working normal monolithic kernel although results passed back might come third party handler essentially invisible client servers handling requests operated similar fashion clients opening connections kernel pass data however servers generally spawned new threads required handle longer-lasting requests handled responses posted thread could de-allocated servers could go receive mode awaiting requests contrast microkernel systems based model asynchronous communications opposed synchronous procedure calls canonical microkernel system mach modeled messages i/o several important side-effects primary among normal task schedulers unix-like systems normally block client waiting i/o request way actions pausing restarting applications waiting messages already built underlying system downside approach scheduler fairly heavyweight calling serious performance bottleneck led extensive development efforts improve performance v-system model message passing overhead reduced process scheduler consulted question next run – server called downside v approach requires work server side response may take time process one major addition ipc system vanguard opposed v concept message chains allowing single message sent several interacting servers single round-trip theory chaining could improve performance common multi-step operations consider case client application wishes read file normally would require one message kernel find file server three additional messages file server one resolve file name object id another open id finally another read file using vanguard chaining single message could constructed client contained requests message would sent kernel passed file server would handle three requests finally returning data much performance problem normally associated microkernel systems due context switches messages passed back forth applications example running v system would total eight context switches two request client switched kernel vanguard using chain would reduce three switches one client kernel another kernel file server finally server back client cases overhead context switch greater time takes actually run request vanguard chaining mechanism could result real-world performance improvements v also introduced simple distributed name service name service stored well known character names representing various objects distributed v system instance 2nd floor laser printer applications could ask name server objects name would handed back identifier would allow interact object name service separate server managed code kernel contrast full-blown name server spring operating system knew objects inside system also used servers system translate private names – file names ip addresses instance v-system objects servers referred via ad hoc private key sort say 32-bit integer clients would pass keys servers order maintain conversation specific task instance application might ask kernel file system handed 32-bit key representing program id use key send message file system asking open file addresses would result 64-bit key handed back keys example proprietary servers common key format used across system sort name resolving common v authors decided make keys first-class citizens vanguard instead using whatever object id servers happened use vanguard servers expected understand return globally unique 128-bit key first 64-bits containing server identifier second identifying object server server id maintained kernel allowing hand message network server referenced remote machine client invisible clear id handed randomly avoid guessing ill-intentioned software | [
1959,
5275,
6921,
7823,
5571,
3751,
5021,
7775,
4175,
3544,
4399,
7554
] | Test |
6,386 | 1 | Comparison_of_database_tools:comparison database tools following tables compare general technical information number available please see individual product articles information article neither all-inclusive necessarily date systems listed light purple background longer active development legend legend legend | [
3255,
2906,
1082,
6098,
1096,
2571,
3652,
4001,
1128,
7937,
1132,
7213,
5780,
6144,
779,
1902,
7598,
4747,
1905,
7957,
1155,
6878,
4759,
7618,
7248,
3005,
6184,
6538,
4054,
2304,
2663,
7999,
4798,
4064,
6932,
7303,
169,
4457,
5882,
6594,
... | Test |
6,387 | 3 | Apache_Flink:apache flink apache flink open-source stream-processing framework developed apache software foundation core apache flink distributed streaming data-flow engine written java scala flink executes arbitrary dataflow programs data-parallel pipelined manner flink pipelined runtime system enables execution bulk/batch stream processing programs furthermore flink runtime supports execution iterative algorithms natively flink provides high-throughput low-latency streaming engine well support event-time processing state management flink applications fault-tolerant event machine failure support exactly-once semantics programs written java scala python sql automatically compiled optimized dataflow programs executed cluster cloud environment flink provide data-storage system provides data-source sink connectors systems amazon kinesis apache kafka alluxio hdfs apache cassandra elasticsearch apache flink developed apache license 2.0 apache flink community within apache software foundation project driven 25 committers 340 contributors data artisans company founded original creators apache flink 12 apache flink committers currently employed data artisans apache flink dataflow programming model provides event-at-a-time processing finite infinite datasets basic level flink programs consist streams transformations “ conceptually stream potentially never-ending flow data records transformation operation takes one streams input produces one output streams result. ” apache flink includes two core apis datastream api bounded unbounded streams data dataset api bounded data sets flink also offers table api sql-like expression language relational stream batch processing easily embedded flink datastream dataset apis highest-level language supported flink sql semantically similar table api represents programs sql query expressions upon execution flink programs mapped streaming dataflows every flink dataflow starts one sources data input e.g. message queue file system ends one sinks data output e.g. message queue file system database arbitrary number transformations performed stream streams arranged directed acyclic dataflow graph allowing application branch merge dataflows flink offers ready-built source sink connectors alluxio apache kafka amazon kinesis hdfs apache cassandra flink programs run distributed system within cluster deployed standalone mode well yarn mesos docker-based setups along resource management frameworks apache flink includes lightweight fault tolerance mechanism based distributed checkpoints checkpoint automatic asynchronous snapshot state application position source stream case failure flink program checkpointing enabled upon recovery resume processing last completed checkpoint ensuring flink maintains exactly-once state semantics within application checkpointing mechanism exposes hooks application code include external systems checkpointing mechanism well like opening committing transactions database system flink also includes mechanism called savepoints manually-triggered checkpoints user generate savepoint stop running flink program resume program application state position stream savepoints enable updates flink program flink cluster without losing application state flink 1.2 savepoints also allow restart application different parallelism—allowing users adapt changing workloads flink datastream api enables transformations e.g filters aggregations window functions bounded unbounded streams data datastream api includes 20 different types transformations available java scala simple example stateful stream processing program application emits word count continuous input stream groups data 5-second windows import org.apache.flink.streaming.api.scala._ import org.apache.flink.streaming.api.windowing.time.time case class wordcount word string count int object windowwordcount apache beam “ provides advanced unified programming model allowing developer implement batch streaming data processing jobs run execution engine. ” apache flink-on-beam runner feature-rich according capability matrix maintained beam community data artisans conjunction apache flink community worked closely beam community develop flink runner flink dataset api enables transformations e.g. filters mapping joining grouping bounded datasets dataset api includes 20 different types transformations api available java scala experimental python api flink dataset api conceptually similar datastream api flink table api sql-like expression language relational stream batch processing embedded flink java scala dataset datastream apis table api sql interface operate relational table abstraction tables created external data sources existing datastreams datasets table api supports relational operators selection aggregation joins tables tables also queried regular sql table api sql offer equivalent functionality mixed program table converted back dataset datastream logical plan defined relational operators sql queries optimized using apache calcite transformed dataset datastream program flink forward annual conference apache flink first edition flink forward took place 2015 berlin two-day conference 250 attendees 16 countries sessions organized two tracks 30 technical presentations flink developers one additional track hands-on flink training 2016 350 participants joined conference 40 speakers presented technical talks 3 parallel tracks third day attendees invited participate hands-on training sessions 2017 event expands san francisco well conference day dedicated technical talks flink used enterprise flink system internals ecosystem integrations flink future platform features keynotes talks flink users industry academia hands-on training sessions apache flink speakers following organizations presented flink forward conferences alibaba amadeus bouygues telecom capital one cloudera data artisans emc ericsson hortonworks huawei ibm google mapr mongodb netflix new relic otto group red hat researchgate uber zalando 2010 research project stratosphere information management cloud funded german research foundation dfg started collaboration technical university berlin humboldt-universität zu berlin hasso-plattner-institut potsdam flink started fork stratosphere distributed execution engine became apache incubator project march 2014 december 2014 flink accepted apache top-level project release dates apache incubator release dates pre-apache stratosphere release dates | [
6506,
7238,
894,
4303,
1333,
5728,
7805,
2741,
7444,
7896,
917,
5571,
5007,
3463,
3542,
3204,
1286,
4511,
6821,
3120,
5054,
7189,
840,
1392,
3031,
5408,
3558,
5677,
5947,
3479,
5064,
5863,
5075,
6137,
7488,
4268,
7857,
5874,
5965,
3915,
... | Test |
6,388 | 6 | Logic_File_System:logic file system logic file system research file system replaces pathnames expressions propositional logic allows file metadata queried superset boolean syntax commonly used modern search engines actual name logic information systems file system abbreviated lisfs avoid confusion log-structured file system lfs implementation logic file system available lisfs website intended used unix-like operating systems bit difficult install needs several non-standard ocaml modules | [
1269,
5571
] | Test |
6,389 | 3 | Apple_A9X:apple a9x apple a9x 64-bit arm-based system chip soc designed apple inc first appeared ipad pro announced september 9 2015 released november 11 2015 a9x m9 motion coprocessor embedded new innovation seen previous chip generations variant a9 apple claims 1.8 times cpu performance 2 times gpu performance predecessor a8x a9x features apple-designed 64-bit armv8-a dual-core cpu called twister offers double memory bandwidth double storage performance apple a8x unlike a9 a9x contain l3 cache due significant dram bandwidth a9x paired 4 gb lpddr4 memory 12.9 ipad pro 2 gb lpddr4 memory 9.7 ipad pro total bandwidth 51.2 gb/s high bandwidth necessary feed soc 12-core powervr 7 series gpu ram included a9x package unlike sibling a9 a9x uses nand interface a9 uses apple-designed nvme-based controller communicates pcie connection ipad pro nand design akin pc-class ssd embedded flash memory common mobile devices gives ipad pro significant storage performance advantage competitors often use msata emmc connect storage systems | [
6788,
3940,
6421,
7890,
5732,
722,
1799,
1094,
4320,
2926,
4690,
5037,
5740,
1473,
734,
5750,
5752,
405,
5405,
5406,
1864,
6125,
2954,
1123,
7572,
6482,
6847,
67,
6142,
2609,
1895,
4373,
7226,
4376,
2978,
5091,
446,
4749,
5450,
7601,
45... | Test |
6,390 | 1 | Database_publishing:database publishing database publishing area automated media production specialized techniques used generate paginated documents source data residing traditional databases common examples mail order catalogues direct marketing report generation price lists telephone directories database content form text pictures also contain metadata related formatting special rules may apply document generation process database publishing incorporated larger workflows component documents created approved revised released basic idea using database contents like article price information fill pre-formatted template documents templates typically created normal desktop layout application certain boxes text designated placeholders placeholders targeted new content flows database allows quick generation final output case changes database quickly perform updates limited manual intervention another model database publishing found many web-to-print sites users browse templates online catalog business cards brochures personalize selected template filling form view rendered result case initial source data user input captured database user revisits site later resume editing left form pre-filled database-stored variables user entered main layout applications workflow datalogics pager adobe framemaker indesign quarkxpress xyvision arbortext advanced print publisher formerly 3b2 generally layout applications corresponding server version receives commands via web interfaces rather desktop interaction quarkxpress server adobe indesign server take full advantage design features available respective desktop versions applications make broad spectrum features available extension integration vertical products developed either internally form scripting e.g javascript applescript indesign externally api corresponding developer kits variants database publishing rendering content direct pdf output approach prevents manual intervention final output since pdf comfortably editable may perceived limitation situations like report generation manual editability needed desired | [
1905,
2451,
6604,
7330,
7341,
6345,
5561,
906,
5217,
6098,
4054,
6636,
2663,
2124,
6737,
6739,
3119,
3801,
7999,
5943,
6752,
2054,
6932,
6386,
684,
7937,
7303,
6144,
4457,
6320,
1902,
6594
] | Test |
6,391 | 4 | Business_continuity_planning:business continuity planning business continuity planning business continuity resiliency planning process creating systems prevention recovery deal potential threats company addition prevention goal enable ongoing operations execution disaster recovery organization resistance failure ability ... withstand changes environment still function often called resilience capability enables organizations either endure environmental changes without permanently adapt organization forced adapt new way working better suits new environmental conditions event could negatively impact operations included plan supply chain interruption loss damage critical infrastructure major machinery computing /network resource bcp subset risk management us government entities refer process continuity operations planning coop business continuity plan outlines range disaster scenarios steps business take particular scenario return regular trade bcp written ahead time also include precautions put place usually created input key staff well stakeholders bcp set contingencies minimize potential harm businesses adverse scenarios 2005 analysis disruptions adversely affect operations corporations investments resilience give competitive advantage entities prepared various contingencies extended then-common business continuity planning practices business organizations council competitiveness embraced resilience goal adapting change apparently slower evolutionary manner sometimes many years decades described resilient term strategic resilience used go beyond resisting one-time crisis rather continuously anticipating adjusting case change becomes desperately obvious approach sometimes summarized preparedness protection response recovery business continuity intended outcome proper execution business continuity planning disaster recovery payoff cost-effective buying spare machines servers performing backups bringing off-site assigning responsibility performing drills educating employees vigilant major cost planning preparation audit compliance management documents automation tools available reduce time cost associated manually producing information several business continuity standards published various standards bodies assist checklisting ongoing tasks planners must information analysis phase consists quantifying loss ratios must also include dollars defend lawsuit estimated dollar spent loss prevention prevent seven dollars disaster-related economic loss business impact analysis bia differentiates critical urgent non-critical non-urgent organization functions/activities function may considered critical dictated law function two values assigned maximum time constraints long enterprise key products services unavailable undeliverable stakeholders perceive unacceptable consequences named according iso 22301 terms maximum acceptable outage maximum tolerable period disruption mean thing defined using exactly words defining recovery requirements potential threat may require unique recovery steps common threats include areas cascade responders stumble supplies may become depleted 2002-2003 sars outbreak organizations compartmentalized rotated teams match incubation period disease also banned in-person contact business non-business hours increased resiliency threat impact scenarios identified documented reflect widest possible damage share seven tiers disaster recovery released 1992 updated 2012 ibm eight tier model two main requirements impact analysis stage phase overlaps disaster recovery planning solution phase determines british standards institution bsi released series standards itil defined terms within uk bs 25999-2:2007 bs 25999-1:2006 used business continuity management across organizations industries sectors documents give practical plan deal eventualities—from extreme weather conditions terrorism system failure staff sickness 2004 following crises preceding years uk government passed civil contingencies act 2004 businesses must continuity planning measures survive continue thrive whilst working towards keeping incident minimal possible act separated two parts united kingdom australia incorporated resilience continuity planning united kingdom resilience implemented locally local resilience forum new zealand canterbury university resilient organisations programme developed assessment tool benchmarking resilience organisations covers 11 categories 5 7 questions resilience ratio summarizes evaluation implementation phase involves policy changes material acquisitions staffing testing 2008 book exercising excellence published british standards institution identified three types exercises employed testing business continuity plans start stop times pre-agreed actual duration might unknown events allowed run course biannual annual maintenance cycle maintenance bcp manual broken three periodic activities issues found testing phase often must reintroduced analysis phase bcp manual must evolve organization maintain information know specialized technical resources must maintained checks include software work process changes must documented validated including verification documented work process recovery tasks supporting disaster recovery infrastructure allow staff recover within predetermined recovery time objective | [
625,
5568,
2655,
3727,
4554,
7801,
5401,
3486,
271
] | Test |
6,392 | 9 | XTalk:xtalk xtalk loosely defined family scripting languages mother xtalk languages hypertalk language used apple hypercard environment languages characterized simple english-like syntaxes using real-life metaphors top smalltalk-style image message sending apparatus pascal-style block boundaries less rigid structure xtalk languages share common set basic data structures commands well general object model thus allow relative portability among programming languages bear surface similarities hypertalk inspired however object models differ substantially porting code another xtalk requires complete rewrite xtalk languages share following basic constructs xtalk smalltalk-like messaging send message write command function call like pascal message parameters require declarations resolved runtime correct handler handler looks like behaves pretty much like pascal equivalent except parameter list variadic fewer parameters passed handler declares first line remaining variables filled empty strings passed quietly ignored instead declaring parameters list handler name also accessed using functions also gives access ignored parameters xtalk scripts often attached objects hypertalk supertalk mediatalk livecode though always e.g compileit sensetalk script contain handler particular message uses message passed owning object script handle scripts also manually pass message parent using command xtalks support following basic commands main assignment statement xtalks also support prefixing/suffixing values also support 'get value command equivalent put statement container named 'it like pascal handler passes data back message sender also valid command handlers return value stored built-in variable change property object range text text contents given value used modify instance variables objects well apply text styles text fields object specified global property host application assumed xtalks support conditional statements following form line break following statement token omitted single command may follow statement may omitted allows writing entire if-then-else statement single line chaining conditionals if-then-else-if-then-else chains also entire block may omitted token may wrapped onto next line loop statements quite free-form many dialects add additional loop syntax things like looping chunks xtalks support usual mathematic expressions apart usual operators also support integer division exponent remainder integer division codice_1 equality unequality codice_2 codice_3 number comparison/string sort order substring matching point coordinates lie inside rectangle coordinates boolean negation logical booleans logical booleans string concatenation string concatenation space type detection determine file/object existence variables xtalks need declared rather transparently created value first put variable name used nothing yet put treated unquoted string literal evaluates name thus mimicking behavior line-by-line interpreter variables xtalks variants conceptually strings interpreted internally data type current operation performed however may following types string integer number point rect date logical aka boolean equal string representations case rects points comma-separated lists numbers h v resp left top right bottom logicals true false perfectly valid perform string operations numbers immediately mathematical operations global variables need declared using special keyword often xtalks word used instead import current handler scope xtalks support chunk expressions mid-level operations extract modify substring ranges variable expressions value container usually form supported chunk types usually char acter item word line though dialects add support bytes chunk units xtalks support changing delimiter use items default comma using property reset later point though supertalk resets comma end handler hypertalk resets idle time i.e system events also mathematical commands like etc xtalks based hypercard 1.2-level architecture since hypercard 1.2 support multiple windows menus movies web browsers many xtalks implement aspects differently e.g supertalk implements multiple windows replacing 'stack level object hierarchy 'project script container representing file 'window effectively stack used may several one project file whereas hypercard 2.0 livecode kept 'stack level instead provided new different commands allow requesting second stack opened window instead replacing current stack onscreen hypersense kept similar approach renamed 'card 'page popup buttons menus fully native persistent objects project file image scripts supertalk referenced 'item copy menu edit like hypertalk transient objects added global menu bar shared stacks using 'create menu command referenced 'menuitem copy menu edit single-line 'menumessage send picked similarly types styles objects placed card differ greatly xtalks divergence point hypercard 1.2.x buttons fields supercard let background fields content different cards requiring use draw text graphics labels instead hypercard hypercard 2.x compound term 'part subsume buttons fields etc card also supported xtalks although hypercard never provided feature xtalks today implement 'user properties feature first introduced supercard allows adding custom instance variables existing objects host application used like built-in properties hold data type example using user property also codice_4 command remove properties object | [
381,
3169,
2451,
3412,
4869,
6172,
6407
] | Test |
6,393 | 4 | 2012_LinkedIn_hack:2012 linkedin hack social networking website linkedin hacked june 5 2012 passwords nearly 6.5 million user accounts stolen russian cybercriminals owners hacked accounts longer able access accounts website repeatedly encouraged users change passwords incident vicente silveira director linkedin confirmed behalf company website hacked official blog also said holders compromised accounts would find passwords longer valid website stolen passwords hashed i.e checksum stored allowing testing whether given password correct one cracked posted russian password forum later day morning june 6 passwords thousands accounts available online plain text graham cluley internet security firm sophos warned leaked passwords could possession criminals 6 june linkedin said official statement would email members security instructions instructions could reset passwords may 2016 linkedin discovered additional 100 million email addresses hashed passwords claimed additional data 2012 breach response linkedin invalidated passwords users changed passwords since 2012 rep. mary bono mack united states congress commented incident many times going happen congress finally wakes takes action latest incident brings sharp focus need pass data protection legislation senator patrick leahy said reports another major data breach give pause american consumers ever share sensitive personal information online transactions networking ... congress make comprehensive data privacy cybercrime legislation top priority marcus carey security researcher rapid7 said hackers penetrated databases linkedin preceding days expressed concerns may access website even attack michael aronowitz vice president saveology said everyday hundreds sites hacked personal information obtained stealing login information one account easily used access accounts hold personal financial information security experts indicated stolen passwords encrypted way fairly easy decrypt one reasons data breach katie szpyrka long time user linkedin illinois united states filed 5 million lawsuit linkedin complaining company keep promises secure connections databases erin ’ harra spokeswoman working linkedin asked lawsuit said lawyers looking take advantage situation propose bills sopa pipa united states congress amended complaint filed nov. 26 2012 behalf szpyrka another premium linkedin user virginia united states named khalilah gilmore–wright class representatives linkedin users affected breach lawsuit sought injunctive equitable relief well restitution damages plaintiffs members class linkedin apologized immediately data breach asked users immediately change passwords federal bureau investigation assisted linkedin corporation investigating theft 8 june 2012 investigation still early stages company said unable determine whether hackers also able steal email addresses associated compromised user accounts well linkedin said users whose passwords compromised would unable access linkedin accounts using old passwords internet security experts said passwords easy unscramble linkedin failure use salt hashing considered insecure practice allows attackers quickly reverse scrambling process using existing standard rainbow tables pre-made lists matching scrambled unscrambled passwords another issue sparked controversy ios app provided linkedin grabs personal names emails notes mobile calendar without user approval security experts working skycure security said application collects user personal data sends linkedin server linkedin claimed permission feature user-granted information sent securely using secure sockets layer ssl protocol company added never stored shared information third party october 5 2016 russian hacker detained czech police prague united states requested interpol warrant united states grand jury indicted nikulin three unnamed co-conspirators charges aggravated identity theft computer intrusion prosecutors alleged nikulin stole linkedin employee username password using gain access corporation network nikulin also accused hacking dropbox formspring allegedly conspiring sell stolen formspring customer data including usernames e-mail addresses passwords nikulin facing czech hearing determine whether extradited united states russian foreign ministry spokesperson maria zakharova indicated russian authorities trying block extradition nikulin currently held santa rita jail nikulin scheduled undergo psychological evaluation determine whether mentally competent | [
704,
3932,
2912,
376,
3277,
2923,
2587,
3323,
5779,
7600,
4025,
1528,
2991,
1173,
6526,
6904,
6541,
6194,
2678,
3038,
3047,
6569,
2693,
860,
862,
7307,
6589,
5187,
1996,
7328,
208,
2021,
5922,
6628,
924,
4531,
600,
1307,
3486,
6305,
280... | Validation |
6,394 | 9 | TI_BASIC_(TI_99/4A):ti basic ti 99/4a ti basic ansi-compliant basic programming language interpreter built 1981 texas instruments ti-99/4a home computer predecessor ti-99/4 1979 developed microsoft bob wallace bob greenberg version supporting compiled code used commercial development language ti-990 range minicomputers text full screen graphics logic operations recording tape file system supported ti basic texas instruments also produced ti extended basic cartridge enhanced functionality accessible basic users statements ti basic call close data def dim display end for..to..step gosub goto if..then..else input let next on..gosub on..goto open option base print randomize read rem restore return stop every line ti basic contain one statement possibility put several statements line also necessary peek load calls use assembly language routines became available ti extended basic note poke statement ti basic loading executing machine code requires 32k memory expansion ti editor/assembler cartridge gives access call load 256 bytes ram directly accessible cpu mostly consumed basic interpreter ti basic stored ran programs 16k video ram unlike ti extended basic could take advantage 32k memory expansion unlike microsoft basics used left mid right instr manipulating strings ti basic used ansi-compliant seg pos subprograms called call statement e.g call clear user defined subprograms possible ti extended basic subprograms predefined ti basic written interpreted byte-code language known graphics programming language unique ti-99 line ti extended basic improved execution speed somewhat providing functionality assembly language wallace said put lot extra time trying get ti basic funny little things ... basic could bring line edit line ... suppose wanted line somewhere else ca n't edit line numbers n't work way worked lot get work way | [
1710,
5367,
1255,
12,
2463,
6891,
4771,
8183,
4139,
5651,
2925,
7448,
5926,
5129,
7906,
5137,
5312,
5234,
2941,
3303,
1670,
1304,
61,
4003,
7864,
1789,
5877,
4012,
4745,
5190,
1064
] | Test |
6,395 | 6 | Episode_filesystem:episode filesystem episode posix compliant file system commonly known use dce/dfs file servers designed achieve goals portability scaling make efficient use available system bandwidth used variety methods achieve goals one use metadata logging designed enhance file system performance episode file system basis ibm z/os posix-compatible file system called zfs | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
44... | Validation |
6,396 | 3 | KGDB:kgdb kgdb debugger linux kernel kernels netbsd freebsd requires two machines connected via serial connection serial connection may either rs-232 interface using null modem cable via udp/ip networking protocol kgdb ethernet kgdboe target machine one debugged runs patched kernel host machine runs gdb gdb remote protocol used two machines kgdb implemented part netbsd kernel 1997 freebsd version 2.2 concept existing remote gdb protocol later adapted patch linux kernel scaled-down version linux patch integrated official linux kernel version 2.6.26 kgdb available following architectures linux x86 x86-64 powerpc arm mips s390 available supported architectures netbsd freebsd using rs-232 connectivity amit kale maintained linux kgdb 2000 2004 2004 2006 maintained linsyssoft technologies jason wessel wind river systems inc. took official maintainer ingo molnar jason wessel created slimmed-down cleaned version kgdb called kgdb light without ethernet support many hacks one merged 2.6.26 kernel version kgdb supports rs-232 connectivity using special driver split debugger inputs console inputs single serial port required program named kgdb also used freebsd gdb based utility debugging kernel core files also used remote live kernel debugging much way linux kgdb either serial connection firewire link | [
5540,
5453,
5803,
3174,
1535,
1260,
7528,
1176,
6525,
2559,
6725,
5571,
578,
6736,
7555,
5055,
3559,
1227
] | Test |
6,397 | 3 | Cyberun:cyberun cyberun zx spectrum video game ostensibly developed ultimate play game published u.s. gold 1986 although part jetman series similarities jetpac player must construct spaceship parts seek resources power-ups unlike ultimate titles cyberun written partnership tim chris stamper player controls spaceship trapped planet inhabited hostile aliens goal upgrade spaceship parts scattered around planet mine valuable element called cybernite atmosphere ground populated flying aliens clouds drip acid damaging ship shields ship requires fuel fly exhausted bounce along ground planet unable climb similar enemy ship also planet attempting mine cybernite player fuel replenished tankers planet surface damaged shields repaired player must venture caverns surface order mine cybernite done ship upgraded include mining laser sufficient cybernite collected player escape next planet zebarema system game well received critics crash awarding 90 crash smash spectrum giving 8/10 describing game classic pick pieces shoot em brilliant graphics link playing online | [
223,
2904,
6434,
1980,
3022,
4060,
1517
] | Test |
6,398 | 8 | CGIProxy:cgiproxy cgiproxy name suggests cgi proxy software package cgi common gateway interface proxy appears user web page allows user access different site cases anonymously anonymous cgi proxy type proxy server works encrypted web form embedded another web page hosted securely using ssl secure socket layering also often called web proxy cgiproxy written perl programming language installed web server execute perl program via cgi supports non-parsed header cgi scripts addition installed mod_perl fastcgi script standalone daemon supported protocols include http ftp ssl well related technologies javascript adobe flash cgiproxy development stalled december 25 2008 december 9 2011 later saw six releases 2014 quite extensive changelog including windows support though nature perl language practically requires source code cgiproxy visible install cgiproxy technically open source software due commercial license fee however extensively commented modularized designed start encourage users modify extend purposes author licenses used freely non-commercial use negotiate license terms commercial use | [
2451,
5983,
96,
1175,
6348,
2563,
6025,
1886,
7214,
3338,
4014,
84,
4111
] | Validation |
6,399 | 2 | MS-Net:ms-net ms-net sometimes stylized ms-net early network operating system sold microsoft earliest days local area networking lans ms-net complete networking system microsoft licensed vendors used basis server programs ran ms-dos porting underlying networking hardware adding services top version 1.0 announced 14 august 1984 released along pc/at 2 april 1985 number ms-net products sold late 1980s replaced lan manager 1990 ms-net network interface based ibm netbios protocol definition allowed ported different networking systems relative ease implement entire netbios protocol however small number features required server role one key feature implemented netbios name management routines feature 3rd parties often added back system also supplied program redir.exe allowed transparent file access dos machines ms-net based server several products mid-to-late-1980s based ms-net system ibm pc-net slightly modified version ms-net system typically used token ring ms partnered 3com produce widely used 3+share system running 3com networking stack based xns protocol ethernet well-known systems including banyan vines novell netware use ms-net basis using unix custom os respectively however allow access files via redir.exe ms-net sold short period time ms 3com collaborated replacement known lan manager running os/2 using new server message block standard file transfer 3com version product retained xns-based protocol 3com abandoned server market long ms version remained based netbios supported number underlying protocols hardware lan manager replaced 1993 windows nt 3.1 | [
4751,
4759,
6256,
7172,
5648,
5571,
5232,
224,
4611,
6294,
3559,
1668,
4524,
6380,
3039,
3907,
5872,
5784,
352,
3751,
786,
447
] | Test |
6,400 | 9 | Douglas_Crockford:douglas crockford douglas crockford american computer programmer entrepreneur best known ongoing involvement development javascript language popularized data format json javascript object notation developing various javascript related tools jslint jsmin currently senior javascript architect paypal also writer speaker javascript json related web technologies crockford earned degree radio television san francisco state university 1975 took classes fortran worked university lab computer crockford purchased atari 8-bit computer 1980 wrote game galahad holy grail atari program exchange apx resulted chris crawford hiring atari inc atari crockford wrote another game burgers apx number experimental audio/visual demos freely distributed warner communications sold company joined national semiconductor 1984 crockford joined lucasfilm later paramount pictures became known video game oriented listservs early 1990s posted memoir expurgation maniac mansion videogaming bulletin board memoir documented efforts censor computer game maniac mansion nintendo satisfaction could release cartridge crockford mounting frustrations nintendo demands became obscure confusing together randy farmer chip morningstar crockford founded electric communities ceo 1994 1995 involved development programming language e. crockford founder state software also known veil networks cto 2001 2002 time state software crockford popularized json data format based upon existing javascript language constructs lightweight alternative xml obtained domain name json.org 2002 put description format july 2006 specified format officially rfc 4627 2002 reference president george bush war evildoers crockford started releasing jsmin software custom license created adding requirement software shall used good evil open source mit license clause carried jsmin-php variation jsmin ryan grove software hosted google code december 2009 due additional clause google determined license compliant definition free open source software permit restriction software may used jsmin-php forced migrate new hosting provider | [
180,
183,
5629,
2451,
4755,
4296,
6172,
3092,
5998,
4315,
1177,
562,
2658,
831,
7734,
313,
1016,
3719,
2040,
40,
6368,
3559,
237,
54,
2870,
6660,
422,
6221,
340,
3663,
5172,
3584,
6585,
7687,
7505,
4287
] | Test |
6,401 | 2 | Galcon:galcon galcon series real-time strategy video games android iphone webos windows linux mac os x flash developed phil hassey set space involves maneuvering fleets ships capture enemy planets original 1987 galactic conquest rick raddatz shareware title pc multiplayer conquest game similar board game risk based game called stellar invasion bearbyte software galcon classic released desktop late 2006 ludum dare timed game development contest developed advanced video game galcon classic features dozens single-player game modes full multiplayer july 2008 galcon publicly released instantaction web browser game platform released garagegames first time galcon released campaign sort gameplay couple months later galcon released iphone frequently called igalcon fans igalcon one first true multiplayer experiences iphone never gained enough publicity kick igalcon comes multiple single-player modes featuring varying degrees bot difficulty advanced online multiplayer system players battle rooms four june 2009 galcon flash released galcon flash flash port galcon closely resembled iphone port although galcon flash given small introductory price number registered users small however limited demo version galcon labs released early october 2009 galcon labs sequel first igalcon galcon labs features four new modes singleplayer multiplayer compatible galcon labs received positive addition galcon series february 11 2010 galcon fusion released mac windows latest addition galcon family desktop tablet equivalent galcon labs original galcon kick-starter galcon 2 launched december 7 2012 successfully funded released ios february 6 2014 players start 1-3 large home planets send ships conquer planets around numbers planet indicate many ships take conquer numbers player planet indicate number ships planet holds planet player owns produces ships player ships faster rate produced depending planet size players select percentage ships send planet players redirect ships mid-flight aim game defeat player eliminating enemy planets galcon 2 uses ranking system based upon elo rating system galcon classic received good reviews multiple awards iphone galcons received excellent reviews smaller publicity angle instantaction version given public reviews overall rating high galcon flash also receive many reviews mostly failed popularity igalcon macworld gave game 4 stars praising game entertaining online play felt single player levels progress evenly easy hard cases pocketgamer gave game 8 10 commenting 'innovative space game simple controls deep strategy slide play gave game 3 good 4 saying extremely satisfying online play made good game fall 2010 galcon used google ai challenge basis contest problem contest participants wrote programs competed simplified version game another modern game implementing idea behind galactic conquest foss game gnulactic konquest kdegames package solarmax series also based upon concept 2018 multiple clones galcon available mobile platforms | [
6788,
4759,
578
] | Validation |
6,402 | 2 | FreeBSD_Core_Team:freebsd core team freebsd core team would equivalent board directors freebsd project company freebsd project run freebsd committers developers svn commit access core team exists provide direction responsible setting goals freebsd project provide mediation event disputes also takes final decision case disagreement individuals teams involved project core team also responsible selecting individuals teams related development ongoing maintenance freebsd security officer release engineering team port manager team finally core team also vote nominations new committers event breach internal rules conduct falls core team decide sanctions freebsd core team equivalent similar body netbsd project called core group freebsd core team began unofficial group programmers mainly consisting initiated freebsd project eleven members new members could join invitation freebsd project grew core team year 2000 200 active committers core team expanded 18 people core members completely inactive others far less active many non-members even accusations cronyism old informal structure longer considered viable early 2000 discussions regarding future organisation set bylaws formulated jonathan lemon warner losh wes peters general vote active committers august 28 2000 bylaws passed 117 votes 5 freebsd core team elected body comprising nine members pool project developers rights directly change project repositories committers committers entitled vote core elections made least one change one project repositories past 12 months first election took place september 2000 seventeen candidates stood election including eight existing core team five re-elected alongside four new members elections taken place every two years since recent election results announced july 4 2018 elections shall held two years last vote even previous election early elections may held early membership core team fall seven petitioned 1/3 active developers bylaws may changed 2/3 majority committers least 50 active committers participate vote core team appoints secretary discretion non-voting position exists provide central point contact external parties group keeping track agenda acting interface core internal groups account creation team core team secretary also responsible writing distributing monthly status reports freebsd developer community current core team secretary joseph mingrone election lasts five weeks first week committers wish run election announce intention four weeks follow application period active committers vote nine candidates voting period closes votes counted ties resolved unambiguously elected candidates instance tie ninth place first eight decide tied candidates join team results announced within one week end voting period newly elected team enters office one week announcement | [
1523,
1341,
1254,
7514,
191,
6711,
1356,
1547,
4498,
7355,
481,
3457,
732,
2300,
6278,
8194,
8096,
1193,
3463,
1013,
3636,
4059,
8001,
6918,
5760,
6211,
3986,
4806,
5065,
594,
4441,
5865,
4534,
6477,
424,
2512,
5250,
1315,
689,
6149,
17... | Test |
6,403 | 8 | ServerCentral:servercentral servercentral turing group infrastructure provider colocation cloud infrastructure iaas draas network connectivity managed storage managed services data centers across north america europe australia asia company customers include cdw outbrain new relic ars technica cars.com shopify 2018 servercentral named one fastest-growing private companies united states inc. magazine eighth consecutive year jordan lowe daniel brosk began hosting services friends local businesses virtual private servers growing 10,000 accounts growth spiked lowe brosk began advertising free domain names exchange prepaid hosting accounts daily deal website team switched manual billing account creation processes lifecycle hosting automation solution swsoft automated full customer lifecycle 2002 servercentral headquarters server operations moved chicago il 2003 servercentral opened data centers ashburn virginia san jose california servercentral private 10-gigabit ip network connected data centers year servercentral sponsored services php.net open-source community development php scripting 2004 servercentral expanded tokyo 2005 servercentral rebranded web hosting division wingsix 2008 sold uk2 group order concentrate managed data center infrastructure servercentral expanded amsterdam began collaboration cachefly high-speed content delivery network cdn 2006 servercentral one first large-scale networks deploy native ipv6 traffic 2009 servercentral expanded data center footprint elk grove village illinois signing long-term leasing agreement dupont fabros technology dft dft environmentally conscious design includes battery-free ups systems advanced mechanical automation high voltage throughout power distribution system may 2009 server operations opened new elk grove village il facility servercentral successfully completed sas 70 type ii audit singlehop signed 2.7 million agreement colocation space support servercentral elk grove data center singlehop signed 5-year 7-million contract servercentral april 2011 approximately 80 cabinets servercentral expanded three times within dft 2009 2012 bringing total elk grove footprint approximately 40,000 square feet 5.5 megawatts critical load 2010 servercentral introduced dedicated private cloud dpc single-tenant infrastructure tuned enterprise setup servercentral expanded within elk grove village il facility made inc. magazine list fastest-growing private companies america 2011 servercentral 58 employees 21.2 million revenue 13 annual growth june 2012 servercentral launched servercentral enterprise cloud public iaas servercentral completed type 2 ssae 16 soc 1 audit climbed inc. magazine list fastest-growing private companies america 2012 servercentral expanded 40,000 square feet 5.5 megawatts critical load elk grove village il 2013 brill street company named servercentral top 50 employer emerging gen talent chicago 2014 servercentral announced ddos mitigation radware servercentral also made inc. magazine honor roll named inc. 5000 fastest-growing private companies america fifth consecutive year 2015 servercentral expanded cloud portfolio multi-tenant managed vmware 2018 servercentral acquired turing group became known servercentral turing group sctg servercentral turing group operates twelve data centers across ten locations equipment space bandwidth add-on support rented retail customers 2019 servercentral turing group soc 2 type ii audited company pci-dss compliant managed services include dedicated servers data center migrations switch router maintenance vmware storage high-availability load balancers backup recovery remote hands firewalls application service infrastructure monitoring servercentral turing group provides backup replication single multi-site disaster recovery service servercentral turing group cloud computing services private shared hybrid iaas platforms colocation customers directly connect third-party public cloud providers servercentral turing group also provides aws cloud consulting services certified aws msp partner servercentral turing group network services include private ip transit dedicated data transport optical fiber managed network stacks native dual-stack ipv4 ipv6 service servercentral turing group operates 10-gigabit mpls backbone high-capacity bandwidth interconnectivity global data center locations servercentral turing group deployed native ipv6 traffic private network since 2006 servercentral turing group ranked among top service aws consulting companies clutch.co 2019 servercentral named top cloud consultant managed service provider clutch.co 2017 servercentral received award chicago best brightest companies work 2015 2016 servercentral ranked crn fast growth 150 list annual ranking fastest-growing solution providers north america 2011 2015 february 2015 servercentral made crn hosting msp 100 list recognizing american managed service providers operate data centers offer innovative subscription-based managed services servercentral held a+ rating better business bureau outstanding customer service since 2001 servercentral named inc. magazine list fastest-growing companies america 2010 2011 2012 2013 2014 2015 2016 2017 servercentral named one brill street company top employers gen talent 2013 servercentral received web host magazine editor choice award “ one solid networks industry. ” review included accolades company support team hardware quality pricing | [
2961,
6029,
4594,
2390,
4295,
7756,
3819
] | Test |
6,404 | 6 | Du_(Unix):du unix codice_1 abbreviated disk usage standard unix program used estimate file space usage—space used particular directory files file system codice_1 utility first appeared version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie paul eggert jim meyering default single unix specification sus specifies codice_1 display file space allocated file directory contained current directory links displayed size link file linked size content directories displayed expected codice_1 reports allocation space absolute file space amount space file system shown codice_1 may vary shown codice_7 files deleted blocks yet freed also minfree setting allocates datablocks filesystem super user processes creates discrepancy total blocks sum used available blocks minfree setting usually set 5 total filesystem size info see core utils faq codice_1 takes single argument specifying pathname du work specified current directory used sus mandates du following options unix unix-like operating systems may add extra options example bsd gnu codice_1 specify -h option displaying disk usage format easier read user adding units appropriate si prefix e.g 10 mb sum directories -s kilobytes -k sum directories -s human-readable format -h byte kilobyte megabyte gigabyte terabyte petabyte disk usage subdirectories files including hidden files within current directory sorted filesize disk usage subdirectories files including hidden files within current directory sorted reverse filesize weight size subdirectory current directory -d 1 sum total end -c displayed human-readable format -h du gnu weight size subdirectories root directory -d 1 trailing sum total end -c displayed human-readable format -h without traversing filesystems -x useful /var /tmp directories separate storage root directory du gnu | [
1710,
361,
6789,
2817,
366,
3685,
4387,
4662,
8165,
3085,
1537,
2834,
4283,
1837,
5480,
6990,
3106,
5571,
1281,
578,
923,
5933,
5138,
1389,
667,
1572,
5942,
6648,
3984,
2589,
5946,
1213,
7667,
4447,
6050,
7494,
6242,
7868,
3417,
3587,
5... | Test |
6,405 | 5 | Unidirectional_Link_Detection:unidirectional link detection unidirectional link detection udld data link layer protocol cisco systems monitor physical configuration cables detect unidirectional links udld complements spanning tree protocol used eliminate switching loops two devices b connected via pair optical fibers one used sending b sending b link bidirectional two-way one fibers broken link become one-way unidirectional goal udld protocol detect broken bidirectional link e.g transmitted packets arrive receiver fibers connected different ports device port udld packet sent port links packet contains sender identity information device port expected receiver identity information device port port checks udld packets receives contain identifiers device port udld cisco-proprietary protocol hp extreme networks avaya similar feature calling different name hp calls device link detection protocol dldp extreme networks call extreme link status monitoring elsm avaya calls link-state tracking similar functionality standardized form provided part ethernet oam protocol defined part ethernet first mile changes 802.3 previously 802.3ah d-link duld feature built top ethernet oam function brocade devices running ironware support proprietary form udld use udld 10gbe augmented per 802.3ae/d3.2 standard fault detected physical link | [
4783,
5492,
1706
] | Test |
6,406 | 9 | ScientificPython:scientificpython scientificpython open source library scientific tools python programming language development started 1995 updated since october 1 2014 library includes qt tk widget toolkits provided building cross-platform graphical user interfaces scientificpython released cecill main developer maintainer scientificpython konrad hinsen orléans university uses building block research code particular molecular modeling toolkit mmtk software nmoldyn uses molecular dynamics trajectories predict neutron scattering spectra outside particular application context users likely prefer package scipy seen dynamic evolution decade 2000–2010 involving several active developers | [
2803,
5965
] | Validation |
6,407 | 9 | SuperTalk:supertalk supertalk scripting language used supercard supertalk descendant hypertalk one powerful features supercard adds hypertalk language user properties hypertalk fixed set properties objects supercard scripters use codice_1 command add new properties buttons fields properties contain arbitrary text including numbers object references also represented using text xtalks even dumps entire files supertalk provides several variations hypertalk codice_2 codice_3 commands let one choose several items list choose icon available icons pick midi instrument play sound choose file supported image format including preview disks folders different hypertalk dialogs supertalk answer ask dialogs resize dynamically hold text however since supercard allows cards i.e pages windows arbitrary types one easily build one dialog large enough supertalk also codice_4 command displays standard system alert windows sheets including standard system icons switch command available readability complex conditionals various types media recorded e.g screen grabs card sound quicktime movies also codice_5 command equivalent copying pasting leaves clipboard unchanged enumeration command creates global variables sequential integer values recently metacard familiar codice_6 command iterating lists added supercard also offers exception handling using codice_7 statement associated codice_8 command supertalk came source-level debugger well ahead hypercard supertalk debugger modal window let set breakpoints clicking beside line special codice_9 command used enter debugger one view currently executing line code execute commands evaluate expressions etc supertalk debugger explicitly turned instead available right away script error occurs codice_10 command little stricter syntax exchange supports numerous additional transition effects including quicktime transitions special plug-in modules stored data fork resources type codice_11 special kind external command get unloaded window added type codice_12 differs noticeably xcmd protocol also n't use xwindoid protocol later introduced adding windows hypertalk supertalk also uses codice_13 command starting external applications different hypertalk codice_14 command supertalk uses opening various windows hypertalk deviated using course supertalk also exposes supercard expanded object model making possible create sliders scroll bars progress indicators scales scriptable paint draw graphics native listbox first-class menu objects multiple windows several styles modal panel non-modal scrolling resizable ... floating palettes also available focus activation scope modified full script control parts supercard deviate english-like-ness hypertalk includes codice_4 command tried emulate slightly awkward syntax codice_2 command bit much also seems time number xcmds simply rolled engine built-in commands maintaining memorable handler call syntax obvious case codice_17 function movies kind invisibly tacked window instead implemented real controls like sliders elements also properties control general application behaviour one-to-one translations underlying system apis e.g using appearance manager theming engine mac os 9 | [
6392,
2866,
3169
] | Test |
6,408 | 9 | List_of_audio_programming_languages:list audio programming languages list notable programming languages optimized sound production algorithmic composition sound synthesis | [
185,
4853,
556,
3370,
2023,
6287,
2592,
4981,
5420,
5266,
7032,
1890,
962,
5260,
6238,
6245
] | Test |
6,409 | 3 | Mindset_(computer):mindset computer mindset released spring 1984 intel 80186-based ms-dos personal computer unlike ibm pc compatibles time custom graphics hardware supporting 16 simultaneous colors chosen 512-shade palette hardware-accelerated drawing capabilities including blitter allowed update screen 50 times fast cga adaptor standard pc basic unit priced conceptually similar successful commodore amiga released year later due financial legal complications spite glowing reviews system never sold well disappeared market year lamented industry commenters looked event first clear evidence end innovation favor compatibility distinctive case remains permanent collection museum modern art new york computer systems era cpu used create graphics drawing bit patterns directly memory separate hardware reads patterns produces actual video signal display mindset designed ex-atari engineers added new custom-designed vlsi vector processor handle many common drawing tasks like lines filling areas instead cpu work changing memory directly mindset cpu would simply set instructions hand actual bit fiddling separate processor mindset president compared chipset intel 8087 floating point processor running alongside intel 80186 machine based number parallels mindset amiga 1000 another computer designed ex-atari engineers offered advanced graphics development continued became clear machine would ready ms-dos-based microsoft windows 1.0 bill gates became personally involved project assist mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom late 1983 rom run 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released release early 1984 jack tramiel rumored tried buy mindset technology would also amiga ultimately buying atari designing new machine off-the-shelf parts atari st mindset released 2 may 1984 base model 64k ram floppy disk drive sold us 1099 128k model single disk available 1,798 256k dual-disk version cost 2,398 disk-less version machine still usable system also included two rom cartridge ports front machine could used operating system another program canonical cartridge extended version gw-basic machine packaged unique enclosure designed gvo menlo park visually separated two sections rom slots lower half optional diskettes upper half sold complete custom nylon carrying case mindset president claimed graphics capabilities unmatched except us 50,000 workstations time garnered critical acclaim reviewers universally praising graphics overall performance much faster contemporary pcs although many cases caveat market rapidly standardizing summer 1985 clear system selling expected company re-purposed video production graphics design markets followed august round layoffs another january time half employees let go company filed chapter 11 protection 28 august never emerged 1985 clear system living promise windows 1.0 flop general john j. anderson published review system decrying personal computer market beginning value compatibility technology noted base system unit referred model m1001 later mindset ii computer released badge engineered version m1001 adhesive label designating ii embossed name internally video processor board separate mini-daughterboard enhanced functionality totally understood mindset ii advanced professional videographics system users guide makes mention chaining two mindset mindset ii referred front user guide model m1500 however internal pages reference m1000-ii also make mention mindset video production module model m1011 system architecture based intel 80186 proprietary vlsi chips enhanced sped graphics although disk compatible ibm pc dos enhanced graphics capabilities made achieving full ibm compatibility difficult competitors bill gates became involved development assisting mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom locked 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released mindset design modular many aspects top case opening access system bus allowed expansion module plug main computer module add memory one two disk drives mindset designed several ex-atari engineers like amiga 1000 another computer era advanced graphics subsystem modular expandability jack tramiel forming ttl – tramiel technologies limited tried buy mindset technology spring 1984 dual 5.25 floppy drive module sat main unit available part common sales configuration system module also included expansion memory well mindset dual front-mounted rom cartridge ports locking knob left side main computer module lock rom modules place mindset option system configuration utility able select whether system booted left right rom carts disk drive cartridges could also contain cmos ram would retained unplugged battery cartridge case cartridges envisioned primary medium software distribution mindset sales system low cartridges economical software distributed disk instead released 1984 models m1001 mindset computer bios rom code 1.07 earlier show copyright notice c 1983 mindset computer corp rear computer equipped following ports rear main computer module also 3× 36 pin expansion bus slots dual disk/memory expansion unit adds additional 3 36 pin expansion bus slots system note noticeable internal external differences dual disk drive/memory expansion modules marked model m1003 others found marked m1004 | [
3303,
7467,
6380,
5571,
4277
] | Validation |
6,410 | 4 | OCML:ocml open configuration management layer ocml universal application configuration management layer helps develop integrated applications independent underlying group applications configurations management | [
1502
] | Test |
6,411 | 4 | Peiter_Zatko:peiter zatko peiter c. zatko better known mudge network security expert open source programmer writer hacker prominent member high-profile hacker think tank l0pht well long-lived computer culture hacking cooperative cult dead cow involved l0pht mudge contributed significantly disclosure education information security vulnerabilities addition pioneering buffer overflow work security advisories released contained early examples flaws following areas code injection race condition side-channel attack exploitation embedded systems cryptanalysis commercial systems original author password cracking software l0phtcrack 2010 mudge accepted position program manager darpa oversaw cyber security research 2013 mudge went work google advanced technology projects division born december 1970 mudge graduated berklee college music top class adept guitar player mudge responsible early research type security vulnerability known buffer overflow 1995 published write buffer overflows one first papers topic published first security advisories research demonstrating early vulnerabilities unix code injection side-channel attacks information leaks leader full disclosure movement initial author security tools l0phtcrack antisniff l0phtwatch mudge one first people hacker community reach build relationships government industry demand public speaker spoke hacker conferences def con academic conferences usenix mudge also member cult dead cow since 1996 one seven l0pht members testified senate committee 1998 serious vulnerabilities internet time l0pht became computer security consultancy stake 1999 mudge became vice president research development later chief scientist 2000 first crippling internet distributed denial-of-service attacks invited meet president bill clinton security summit alongside cabinet members industry executives 2004 became division scientist government contractor bbn technologies originally worked 1990s also joined technical advisory board nfr security 2010 announced would project manager darpa project focused directing research cyber security 2013 announced would leave darpa position google atap 2015 zatko announced twitter would join project called cyberul testing organisation computer security inspired underwriters laboratories mandated white house 11 august 2007 married sarah lieberman co-worker bbn darpa created cyber analytical framework agency used evaluate dod investments offensive defensive cyber security tenure ran least three dod programs known military networking protocol mnp cyber-insider threat cinder cyber fast track cft military networking protocol mnp provided network prioritization full user-level attribution military computer networks cyber-insider threat cinder focused identifying cyber espionage conducted virtual insider threats future variants stuxnet duqu cinder often mistakenly associated wikileaks media possibly due confusion darpa programs focused identifying human insider threat adams identification software espionage posed malware cinder program issue clarified mudge defcon 2011 keynote 46 minutes 11 seconds talk cyber fast track cft provided resources funding security research including programs run hackers hackerspaces makerlabs program provided alternative traditional government contracting vehicles accessible individuals small companies previously unable work within cumbersome complicated darpa process novel contracting effort averaging time 7 days receipt proposal funding provided proposing research organization program initially announced shmoocon 2011 keynote mudge published numerous papers advisories detailing security problems across different applications operating systems pioneering champion full disclosure | [
6412,
3842,
1353,
2912,
113,
819,
907,
3100,
7175,
4318,
1019,
1404,
762,
3486,
6046,
6589,
3592,
6157
] | Train |
6,412 | 4 | Chris_Wysopal:chris wysopal chris wysopal also known weld pond entrepreneur computer security expert co-founder cto veracode member high-profile hacker think tank l0pht vulnerability researcher chris wysopal born 1965 new connecticut mother educator father engineer attended rensselaer polytechnic institute troy new york received bachelor degree computer systems engineering 1987 seventh member join l0pht development projects included netcat l0phtcrack windows also webmaster/graphic designer l0pht website hacker news network first hacker blog researched published security advisories vulnerabilities microsoft windows lotus domino microsoft iis coldfusion weld one seven l0pht members testified senate committee 1998 could bring internet 30 minutes l0pht acquired stake 1999 became manager stake research group later stake vice president research development 2004 stake acquired symantec became director development 2006 founded veracode christien rioux serves cto 2017 veracode acquired ca technology 614m veracode subsequently spun became independent purchased thoma bravo 950m wysopal continues serve cto 2018 wysopal joined humanyze board directors wysopal instrumental developing industry guidelines responsible disclosure software vulnerabilities contributor rfpolicy first vulnerability disclosure policy together steve christey mitre proposed ietf rfc titled responsible vulnerability disclosure process 2002 process eventually rejected ietf within purview process become foundation organization internet safety industry group bringing together software vendors security researchers founder 2001 founded non-profit full disclosure mailing list vulnwatch moderator 2003 testified united states house representatives subcommittee topic vulnerability research disclosure 2008 wysopal recognized achievements industry named one 100 influential people eweek selected one infoworld cto 25 2010 named sans security thought leader 2012 began serving black hat review board named one top 25 disruptors 2013 computer reseller news 2014 named one 5 security thought leaders sc magazine | [
2560,
3842,
4663,
6579,
4759,
3085,
3592,
2912,
3543,
3135,
1332,
6157,
3486,
6411
] | Validation |
6,413 | 4 | Certificate_Authority_Security_Council:certificate authority security council certificate authority security council casc multi-vendor industry advocacy group created conduct research promote internet security standards educate public internet security issues group founded february 2013 seven largest certificate authorities issuers ssl certificates — comodo symantec trend micro digicert entrust globalsign godaddy digicert withdrew group june 15 2018 casc supports efforts ca/browser forum standards-setting bodies support development enhancements improve secure sockets layer ssl operations certificate authorities ca according robin alden cto comodo member council casc serve united front cas involved standards-setting organization ’ committed supplementing standards-setting organizations providing education research advocacy best practices use ssl casc limits membership ssl certificate authorities meet requirements reputation operation security members required undergo annual audit adhere industry standards ca/browser forum ’ baseline requirements network security guidelines group works collaboratively create define initiatives improve understanding policies impact internet infrastructure group primary focus promoting understanding importance certificate-revocation checking benefits ocsp stapling protocol intended ensure web users aware visit web site revoked expired ssl certificate group also worked secure software distribution digital code signing code signing certificates play key role helping users identify authentic software code reputable publishers receive assurance code tampered beforehand | [
8103,
2789,
363,
6006,
5824,
8157,
88
] | Test |
6,414 | 2 | Cwm_(window_manager):cwm window manager cwm calm window manager stacking window manager x window system primarily developed part openbsd base system portable versions available unix-like operating systems development cwm started patches evilwm marius aamodt eriksen ease implementation new features cwm eventually rewritten using code 9wm last release original author came august 2005 april 2007 cwm imported openbsd source tree january 2008 substantial part original source code including 9wm code rewritten cwm distributed openbsd since version 4.2 replaced wm2 third-party linux port also exists cwm stacking window manager oriented towards heavy keyboard usage small footprint ease use lacks explicit virtual desktops functionality emulated using window groups mechanism cwm draw window decorations except 1-pixel border around windows cwm includes several menus menus operate search type manner cwm allows raising hiding switching searching windows using keyboard making suitable use terminal emulator multiplexer furthermore allows manipulating pointing devices mice keyboard additional key bindings configuration options specified configuration file codice_1 cwm generally well received software minimalist communities cwm noted used mainly due status one default window managers openbsd though reasons sometimes cited cwm also praised flexibility ease use fact used without mouse | [
1155,
2001,
2453,
5103,
191,
1822,
5373,
5116,
647,
305,
5571,
6630,
578,
1572,
1394,
7752,
7848,
3572,
8022,
4990,
1133,
7214,
2883,
6055,
4096,
1138,
5787,
1245,
6242,
1435
] | Test |
6,415 | 7 | Publish–subscribe_pattern:publish–subscribe pattern software architecture publish–subscribe messaging pattern senders messages called publishers program messages sent directly specific receivers called subscribers instead categorize published messages classes without knowledge subscribers may similarly subscribers express interest one classes receive messages interest without knowledge publishers publish–subscribe sibling message queue paradigm typically one part larger message-oriented middleware system messaging systems support pub/sub message queue models api e.g java message service jms pattern provides greater network scalability dynamic network topology resulting decreased flexibility modify publisher structure published data publish-subscribe model subscribers typically receive subset total messages published process selecting messages reception processing called filtering two common forms filtering topic-based content-based topic-based system messages published topics named logical channels subscribers topic-based system receive messages published topics subscribe subscribers topic receive messages publisher responsible defining classes messages subscribers subscribe content-based system messages delivered subscriber attributes content messages matches constraints defined subscriber subscriber responsible classifying messages systems support hybrid two publishers post messages topic subscribers register content-based subscriptions one topics many pub/sub systems publishers post messages intermediary message broker event bus subscribers register subscriptions broker letting broker perform filtering broker normally performs store forward function route messages publishers subscribers addition broker may prioritize messages queue routing subscribers may register specific messages build time initialization time runtime gui systems subscribers coded handle user commands e.g. click button corresponds build time registration frameworks software products use xml configuration files register subscribers configuration files read initialization time sophisticated alternative subscribers added removed runtime latter approach used example database triggers mailing lists rss data distribution service dds middleware use broker middle instead publisher subscriber pub/sub system shares meta-data via ip multicast publisher subscribers cache information locally route messages based discovery shared cognizance one earliest publicly described pub/sub systems news subsystem isis toolkit described 1987 association computing machinery acm symposium operating systems principles conference sosp '87 paper exploiting virtual synchrony distributed systems 123–138 serious problems pub/sub systems side-effect main advantage decoupling publisher subscriber pub/sub system must designed carefully able provide stronger system properties particular application might require assured delivery pub/sub pattern scales well small networks small number publisher subscriber nodes low message volume however number nodes messages grows likelihood instabilities increases limiting maximum scalability pub/sub network example throughput instabilities large scales include pub/sub systems use brokers servers argument broker send messages subscriber in-band subject security problems brokers might fooled sending notifications wrong client amplifying denial service requests client brokers could overloaded allocate resources track created subscriptions even systems rely brokers subscriber might able receive data authorized receive unauthorized publisher may able introduce incorrect damaging messages pub/sub system especially true systems broadcast multicast messages encryption e.g transport layer security ssl/tls prevent unauthorized access prevent damaging messages introduced authorized publishers architectures pub/sub client/server systems also vulnerable authorized message senders behave maliciously | [
979,
5014,
3686,
2723,
4031,
2638,
2379,
2827,
1730,
6521,
5650,
3531,
4685,
2566,
1554,
6105,
6025,
7921,
231,
7924,
235,
3396,
7391,
5447,
1407,
1125,
245,
517,
2961,
6224,
2517,
2619
] | Test |
6,416 | 5 | RPMsg:rpmsg rpmsg remote processor messaging protocol enabling inter-core communication heterogeneous multicore systems protocol rpmsg present linux kernel also available stand-alone component microcontroller-based systems rpmsg implementations developed open-source | [
568
] | Validation |
6,417 | 4 | Detekt:detekt detekt discontinued free tool amnesty international digitale gesellschaft eff privacy international scan surveillance software microsoft windows intended use activists journalists scan known spyware detekt available free download tool guarantee detection spyware meant give false sense security meant used methods combat malware spyware 2014 coalition unlawful surveillance exports estimated global trade surveillance technologies worth 3 billion gbp annually detekt available amharic arabic english german italian spanish tool required installation designed scan surveillance software windows pcs xp windows 8.1 tool scanned current surveillance software scanning would display summary indicating spyware found would generate log file containing details tool guarantee absolute protection surveillance software scanned known spyware time release could modified circumvent detection new software would become available therefore clean bill health n't necessarily mean pc free surveillance software website instructed user disconnect internet connection close applications running turn connection back spyware found detekt released gplv3 free license detekt developed claudio guarnieri help bill marczak morgan marquis-boire eva galperin tanya o'carroll andre meister jillian york michael ligh endalkachew chala provided patterns following malware darkcomet rat xtremerat blackshades rat njrat finfisher finspy hackingteam rcs shadowtech rat gh0st rat | [
2173,
7151,
6515,
4759,
6419,
3426,
2733,
3698,
3453,
651,
5571,
1376,
2577,
5401,
6023,
6823,
1863,
1766,
3071,
2789,
5965,
74,
6155,
2354,
3680,
880
] | Test |
6,418 | 7 | Cloud_engineering:cloud engineering cloud engineering application engineering disciplines cloud computing brings systematic approach concerns commercialization standardization governance cloud computing applications practice leverages methods tools engineering conceiving developing operating maintaining cloud computing systems solutions process designing systems necessary leverage power economics cloud resources solve business problems cloud engineering field engineering focuses cloud services software service platform service infrastructure service multidisciplinary method encompassing contributions diverse areas systems engineering software engineering web engineering performance engineering information technology engineering security engineering platform engineering service engineering risk engineering quality engineering nature commodity-like capabilities delivered cloud services inherent challenges business model drive need cloud engineering core discipline elements cloud engineering include professionals work field cloud engineering primarily cloud architects engineers key skills possessed cloud engineering professionals demand skills advanced ict information communication technology rapidly expanded recent years business society transformed emergence internet web ubiquitous media enabling knowledge-based global economy turn created huge demand networked-enabled parallel distributed computing technologies changing way conduct science operate business tackle challenging problems epidemic diseases climate change many platforms available cloud engineering notion cloud engineering context cloud computing sparsely used discussions presentations talks various occasions middle 2000s term cloud engineering formally coined around 2007 concept cloud engineering officially introduced april 2009 various aspects topics subject extensively covered number industry events extensive research conducted specific areas cloud engineering development support cloud patterns cloud business continuity services first ieee international conference cloud engineering ic2e took place march 25–28 2013 second conference held march 10–14 2014 | [
2961,
330
] | Test |
6,419 | 4 | Computer_and_network_surveillance:computer network surveillance computer network surveillance monitoring computer activity data stored hard drive data transferred computer networks internet monitoring often carried covertly may completed governments corporations criminal organizations individuals may may legal may may require authorization court independent government agencies computer network surveillance programs widespread today almost internet traffic monitored surveillance allows governments agencies maintain social control recognize monitor threats prevent investigate criminal activity advent programs total information awareness program technologies high-speed surveillance computers biometrics software laws communications assistance law enforcement act governments possess unprecedented ability monitor activities citizens however many civil rights privacy groups reporters without borders electronic frontier foundation american civil liberties union expressed concern increasing surveillance citizens end even already mass surveillance society limited political and/or personal freedoms fear led numerous lawsuits hepting v. hacktivist group anonymous hacked government websites protest considers draconian surveillance vast majority computer surveillance involves monitoring data traffic internet example united states communications assistance law enforcement act mandates phone calls broadband internet traffic emails web traffic instant messaging etc available unimpeded real-time monitoring federal law enforcement agencies packet capture also known packet sniffing monitoring data traffic computer network data sent computers internet networks takes form small chunks called packets routed destination assembled back complete message packet capture appliance intercepts packets may examined analyzed computer technology needed perform traffic analysis sift intercepted data look important/useful information communications assistance law enforcement act u.s. telecommunications providers required install packet capture technology federal law enforcement intelligence agencies able intercept customers broadband internet voice internet protocol voip traffic far much data gathered packet sniffers human investigators manually search thus automated internet surveillance computers sift vast amount intercepted internet traffic filtering reporting investigators bits information interesting example use certain words phrases visiting certain types web sites communicating via email chat certain individual group billions dollars per year spent agencies information awareness office nsa fbi development purchase implementation operation systems intercept analyze data extracting information useful law enforcement intelligence agencies similar systems used iranian secret police identify suppress dissidents technology allegedly installed german siemens ag finnish nokia internet rapid development become primary form communication people potentially subject internet surveillance advantages disadvantages network monitoring instance systems described web 2.0 greatly impacted modern society tim ’ reilly first explained concept web 2.0 stated web 2.0 provides communication platforms user generated self-produced content motivating people communicate friends online however internet surveillance also disadvantage one researcher uppsala university said web 2.0 surveillance directed large user groups help hegemonically produce reproduce surveillance providing user-generated self-produced content characterize web 2.0 surveillance mass self-surveillance surveillance companies monitor people focused work entertainment yet employers also monitor employees order protect company assets control public communications importantly make sure employees actively working productive emotionally affect people cause emotions like jealousy research group states ... set test prediction feelings jealousy lead ‘ creeping ’ partner facebook women particularly likely engage partner monitoring response jealousy study shows women become jealous people online group virtual assistant become social integration lives currently virtual assistant amazon alexa call 911 local services constantly listening command recording parts conversations help improve algorithms law enforcement able called using virtual assistant law enforcement would able access information saved device device connected home internet law enforcement would exact location individual calling law enforcement virtual assistance devices popular many debate lack privacy devices listening every conversation owner even owner talking virtual assistant device still listening conversation hopes owner need assistance well gather data corporate surveillance computer activity common data collected often used marketing purposes sold corporations also regularly shared government agencies used form business intelligence enables corporation better tailor products and/or services desirable customers data also sold corporations use aforementioned purpose used direct marketing purposes targeted advertisements ads targeted user search engine analyzing search history emails use free webmail services kept database one important component prevention establishing business purposes monitoring may include following second component prevention determining ownership technology resources ownership firm networks servers computers files e-mail explicitly stated distinction employee personal electronic devices limited proscribed owned firm instance google search stores identifying information web search ip address search phrase used stored database 18 months google also scans content emails users gmail webmail service order create targeted advertising based people talking personal email correspondences google far largest internet advertising agency—millions sites place google advertising banners links websites order earn money visitors click ads page containing google advertisements adds reads modifies cookies visitor computer cookies track user across sites gather information web surfing habits keeping track sites visit sites information along information email accounts search engine histories stored google use build profile user deliver better-targeted advertising united states government often gains access databases either producing warrant simply asking department homeland security openly stated uses data collected consumer credit direct marketing agencies augmenting profiles individuals monitoring addition monitoring information sent computer network also way examine data stored computer hard drive monitor activities person using computer surveillance program installed computer search contents hard drive suspicious data monitor computer use collect passwords and/or report back activities real-time operator internet connection keylogger example type program normal keylogging programs store data local hard drive programmed automatically transmit data network remote computer web server multiple ways installing software common remote installation using backdoor created computer virus trojan tactic advantage potentially subjecting multiple computers surveillance viruses often spread thousands millions computers leave backdoors accessible network connection enable intruder remotely install software execute commands viruses trojans sometimes developed government agencies cipav magic lantern often however viruses created people spyware installed marketing agencies used gain access security breaches create another method cracking computer gain access network attacker install surveillance software remotely servers computers permanent broadband connections vulnerable type attack another source security cracking employees giving information users using brute force tactics guess password one also physically place surveillance software computer gaining entry place computer stored install compact disc floppy disk thumbdrive method shares disadvantage hardware devices requires physical access computer one well-known worm uses method spreading stuxnet one common form surveillance create maps social networks based data social networking sites well traffic analysis information phone call records nsa call database internet traffic data gathered calea social network maps data mined extract useful information personal interests friendships affiliations wants beliefs thoughts activities many u.s. government agencies defense advanced research projects agency darpa national security agency nsa department homeland security dhs currently investing heavily research involving social network analysis intelligence community believes biggest threat u.s. comes decentralized leaderless geographically dispersed groups types threats easily countered finding important nodes network removing requires detailed map network jason ethier northeastern university study modern social network analysis said following scalable social network analysis program developed information awareness office shown possible monitor computers distance commercially available equipment detecting radiation emitted crt monitor form computer surveillance known tempest involves reading electromagnetic emanations computing devices order extract data distances hundreds meters ibm researchers also found computer keyboards key emits slightly different noise pressed differences individually identifiable conditions possible log key strokes without actually requiring logging software run associated computer 2015 lawmakers california passed law prohibiting investigative personnel state force businesses hand digital communication without warrant calling electronic communications privacy act time california state senator jerry hill introduced bill making law enforcement agencies disclose information usage information stingray phone tracker device law took effect january 2016 require cities operate new guidelines relation law enforcement use device legislators holding public office disagreed technology warrantless tracking city wants use device must heard public hearing cities pulled using stingray santa clara county also shown adi shamir et al. even high frequency noise emitted cpu includes information instructions executed policeware software designed police citizens monitoring discussion interaction citizens within u.s. carnivore first incarnation secretly installed e-mail monitoring software installed internet service providers networks log computer communication including transmitted e-mails magic lantern another application time running targeted computer trojan style performing keystroke logging cipav deployed fbi multi-purpose spyware/trojan clipper chip formerly known myk-78 small hardware chip government install phones designed nineties intended secure private communication data reading voice messages encoded decode clipper chip designed clinton administration “ …protect personal safety national security developing information anarchy fosters criminals terrorists foreign foes. ” government portrays solving secret codes cryptographic age technology created thus raised controversy public clipper chip thought next “ big brother ” tool led failure clipper proposal even though many attempts consumer broadband digital television promotion act cbdtpa bill proposed united states congress cbdtpa known security systems standards certification act sssca draft form killed committee 2002 cbdtpa become law would prohibited technology could used read digital content copyright music video e-books without digital rights management drm prevented access material without permission copyright holder german-speaking countries spyware used made government sometimes called govware countries like switzerland germany legal framework governing use software known examples include swiss minipanzer megapanzer german r2d2 trojan surveillance censorship different surveillance performed without censorship harder engage censorship without form surveillance even surveillance lead directly censorship widespread knowledge belief person computer use internet surveillance lead self-censorship march 2013 reporters without borders issued special report internet surveillance examines use technology monitors online activity intercepts electronic communication order arrest journalists citizen-journalists dissidents report includes list state enemies internet bahrain china iran syria vietnam countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights computer network surveillance increase countries report also includes second list corporate enemies internet amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany companies sell products liable used governments violate human rights freedom information neither list exhaustive likely expanded future protection sources longer matter journalistic ethics journalists equip digital survival kit exchanging sensitive information online storing computer hard-drive mobile phone individuals associated high-profile rights organizations dissident groups protest groups reform groups urged take extra precautions protect online identities | [
2173,
7151,
6417,
731,
7186,
2577,
5401,
6823,
5412,
431,
1504,
74,
1510,
3338,
4014,
84,
6155,
3680,
4025,
6515,
803,
2996,
104,
1175,
3698,
820,
6908,
7646,
3383,
5848,
137,
147,
5509,
3047,
3743,
1237,
3071,
2354,
3426,
880,
5557,
... | Test |
6,420 | 2 | OLE_DB_provider:ole db provider ole db provider software component ole db api designed microsoft enables ole db consumer interact data source ole db providers analogous odbc drivers jdbc drivers ado.net data providers ole db providers created access simple data stores text file spreadsheet complex databases oracle microsoft sql server sybase ase many others also provide access hierarchical data stores email systems however different data store technologies different capabilities every ole db provider implement every possible interface available ole db standard capabilities available implemented use com objects ole db provider map data store technologies functionality particular com interface microsoft describes availability interface provider-specific may applicable depending data store technology involved note also providers may augment capabilities data store capabilities known services microsoft parlance example microsoft ships ole db providers part mdac jet kits simba technologies ships simbaprovider sdk used build custom ole db olap providers multi-dimensional star schema database connectivity openlink software ships components supporting ole db access number data sources including several sql dbms well bridges odbc- jdbc-accessible data sources | [
7149,
714,
720,
1460,
2928,
7907,
5747,
2953,
6840,
422,
6504,
4022,
4026,
7607,
1526,
3687,
5479,
7263,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
187,
4848,
7715,
2018,
8085,
6989,
6991,
8094,
930,
590,
7029,
8128... | Test |
6,421 | 3 | MStar:mstar mstar semiconductor inc. taiwanese fabless semiconductor company specializing mixed-mode integrated circuit technologies based hsinchu hsien mstar made hardware multimedia wireless communications form display ics mixed-mode i.e combining analog digital functions asic/ips addition chip sets gsm mobile handsets mstar employed approx 1300 10 branches worldwide company revenue around us 1067 million 2010 growth substantial revenue 2005 us 175 million mstar listed taiwan stock exchange code 3697 mstar often referred little-m chinese community contrary part bigger semiconductor company big-m a.k.a mediatek mstar spin-off 2-1 stock split system general technology may 2002 power ic product line stayed system general technology employees display rfid product lines transferred new spin-off spin-off 1-2 stock swap taken exchange two companies back corresponding shareholders chairman mstar wayne liang 梁公偉 steve yang 楊偉毅 president co-founder 2004 involved court case ruling international trade commission itc mstar semiconductor found guilty infringing patent held genesis microchip method improve images liquid-crystal-display lcd monitors flat screen tvs 22 june 2012 mediatek inc. announced purchased 212 million 254 million shares mstar 40 48 outstanding shares 0.794 mediatek shares nt 1 cash per mstar share | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
446,
451,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
1237,
2711,
1995,
550,
3786,
2024,
5576,
4879,
7376,
5585,
4166,
1670,
4537,
950,... | Test |
6,422 | 2 | Linux_Phone_Standards_Forum:linux phone standards forum linux phone standards forum lips forum consortium group companies create standards use linux mobile devices main goal lips forum create application programming interfaces apis allow developers build applications inter-operate across linux handsets made manufacturers founding members include arm ltd cellon esmertec france telecom telecom italia fsm labs huawei jaluna mizi research montavista software open-plug palmsource march 2007 palmsource changed name parent company access inc newer members include texas instruments trolltech asa movial oy british telecom joined lips forum september 2007 september 2007 lips forum announced going align efforts open mobile alliance june 2008 lips forum announced would join limo foundation thereby cease exist separate organization | [
5540,
5453,
5803,
3174,
1535,
1260,
7528,
1176,
2559,
6725,
578,
1565,
6736,
7189,
7555,
3559,
1227
] | Test |
6,423 | 3 | Compaq_Presario_C502TU:compaq presario c502tu compaq presario c502tu notebook computer presario c500 series first produced 2007 series design based compaq presario c300 series compaq presario c500 notebook pc series specifications | [
4736
] | Test |
6,424 | 4 | Courage_Foundation:courage foundation courage foundation trust fundraising legal defence individuals whistleblowers journalists founded august 9 2013 'journalistic source protection defence fund wikileaks site later rebranded june 2014 trust accepts donations bitcoin maintains tor hidden service individuals supported trust advisers include pentagon papers military analyst daniel ellsberg former nsa executive thomas drake former mi5 british intelligence officer whistleblower annie machon member chaos computer club andy müller-maguhn guatemala human rights lawyer renata avila pussy riot courage trustees renata avila susan benn john pilger dame vivienne westwood courage acting director wikileaks member sarah harrison | [
6025,
7493,
3765,
52,
3791,
1903,
3486,
744
] | Test |
6,425 | 8 | List_of_augmented_browsing_software:list augmented browsing software | [
774,
5987,
6221
] | Train |
6,426 | 3 | Split-brain_(computing):split-brain computing split-brain computer term based analogy medical split-brain syndrome indicates data availability inconsistencies originating maintenance two separate data sets overlap scope either servers network design failure condition based servers communicating synchronizing data last case also commonly referred network partition although term split-brain typically refers error state split-brain dns split-horizon dns sometimes used describe deliberate situation internal external dns services corporate network communicating separate dns name spaces administered external computers internal ones requires double administration domain overlap computer names risk fully qualified domain name fqdn may ambiguously occur name spaces referring different computer ip addresses high-availability clusters usually use heartbeat private network connection used monitor health status node cluster example split-brain syndrome may occur private links go simultaneously cluster nodes still running one believing one running data sets cluster may randomly serve clients idiosyncratic data set updates without coordination data sets may lead data corruption data inconsistencies might require operator intervention cleanup davidson et al. surveying several approaches handle problem classify either optimistic pessimistic optimistic approaches simply let partitioned nodes work usual provides greater level availability cost sacrificing correctness problem ended automatic manual reconciliation might required order cluster consistent state one current implementation approach hazelcast automatic reconciliation key-value store pessimistic approaches sacrifice availability exchange consistency network partitioning detected access sub-partitions limited order guarantee consistency typical approach described coulouris et al. use quorum-consensus approach allows sub-partition majority votes remain available remaining sub-partitions fall auto-fencing mode one current implementation approach one used mongodb replica sets another implementation galera replication mariadb mysql modern commercial general-purpose ha clusters typically use combination heartbeat network connections cluster hosts quorum witness storage challenge two-node clusters adding witness device adds cost complexity even implemented cloud without heartbeat fails cluster members determine active clusters without quorum member fails even members normally assign primary secondary statuses hosts least 50 probability 2-node ha cluster totally fail human intervention provided prevent multiple members becoming active independently either directly conflicting corrupting data | [
2043,
6056,
2776
] | Test |
6,427 | 2 | Android_Nougat:android nougat android nougat codenamed android n development seventh major version 14th original version android operating system first released alpha test version march 9 2016 officially released august 22 2016 nexus devices first receive update lg v20 first smartphone released nougat nougat introduces notable changes operating system development platform including ability display multiple apps on-screen split-screen view support inline replies notifications expanded doze power-saving mode restricts device functionality screen period time additionally platform switched openjdk-based java environment received support vulkan graphics rendering api seamless system updates supported devices nougat received positive reviews new app notification format received particular praise multitasking interface seen positive change reviewers experienced incompatible apps critics mixed experiences doze power-saving mode faster app installs tweaks user interface also reviewed positively 19.2 devices access google play run nougat 11.4 android 7.0 api 24 7.8 android 7.1 api 25 release internally codenamed new york cheesecake march 9 2016 ahead google i/o developer conference google released first alpha version android n part new android beta program intended testing developers enthusiasts official release summer developer preview builds compatible current google nexus devices 5x 6p 6 9 pixel c nexus player android beta program introduced allows testers opt-in over-the-air updates new beta versions released april 13 2016 android n beta preview 2 released google discussed android n i/o keynote may 18 2016 unveiled new virtual reality platform daydream beta preview 3 first preview release deemed suitable wider public beta testing released time google also announced would hold contest determine official release name operating system beta preview 4 released june 15 2016 june 30 2016 google announced n release name would nougat also confirmed nougat would version 7.0 android final beta preview 5 released july 18 2016 android 7.0 officially released august 22 2016 nexus 6 5x 6p 9 nexus player pixel c first devices receive update dave burke android vice president engineering stated august 2016 updates nougat would released quarterly maintenance releases focusing continued refinements polish september 6 2016 lg announced v20 first smartphone ship nougat pre-installed google unveiled first-party pixel pixel xl smartphones hardware-focused event october 4 2016 pixel phones replacing nexus series updates existing devices vary manufacturer carrier driver support version manufacturer device respective system-on-chip major manufacturers including htc sony motorola announced intents update range recent devices nougat qualcomm stated would support nougat devices using snapdragon 800 801 system-on-chips undisclosed reasons although developer preview builds nougat released device sony stated would upgrade xperia z3 uses snapdragon 801 final version due unforeseen platform limitations reported google compatibility test suite whose tests must passed order receive official certification specified devices running nougat must support either vulkan opengl es 3.1 graphics apis — neither supported device adreno 330 graphics core none less fairphone 2 purported device qualcomm snapdragon 801 chipset provide official support android 7.1.2. delivering effort towards increased longevity sustainable device post-release update known android 7.1 pre-loaded onto google pixel pixel xl smartphones released october 2016 new version adds support google daydream vr platform image keyboards expanded emoji support including male female versions support actions displayed menus home screen app shortcuts new features preview 7.1 existing nexus devices released via android beta program later month officially released android 7.1.1 december 5 2016 7.1.1 nexus 6 nexus 9 considered end-of-life receive updates android 7.1.2 released april 2017 providing various improvements minor functionality improvements nexus pixel-branded devices nougat redesigns notification shade features smaller row icons settings replacing notification cards new sheet design allowing inline replies notifications multiple notifications single app also bundled greater per-app control notifications split-screen display mode introduced phones two apps snapped occupy halves screen experimental multi-window mode also available hidden feature multiple apps appear simultaneously screen overlapping windows doze power saving mechanism introduced android marshmallow expanded include state activated device running battery screen period time stationary state network activity restricted apps granted maintenance windows access network perform background tasks marshmallow full doze state activated device stationary screen period time new data saver mode restricts background mobile data usage trigger internal functions apps designed reduce bandwidth usage capping quality streaming media december 2015 google announced android nougat would switch java runtime environment defunct apache harmony openjdk—the official open source implementation java platform maintained oracle corporation java community android runtime art incorporates profile-guided compilation system utilizing jit compiler profiling alongside current ahead-of-time compiler optimize apps device hardware conditions background nougat introduces system enabling seamless automatic system updates based upon sharing code implementation similar functionality chrome os system uses pair squashfs partitions android system executes online partition updates applied background redundant offline partition next boot following installation update redundant partition designated active device henceforth boots updated system previous system partition kept backup case update failure serve offline partition next update system removes requirement device reboot system recovery environment apply update prevents device used update complete also provides ability update automatically rolled back case failure google chose enable seamless updates devices shipped nougat later rather enabling earlier devices support feature repartitioning additionally due art changes nougat apps longer need re-compiled upon first boot system update developer preview 2 added platform support vulkan new low-level 3d-rendering api alternative opengl es higher graphics performance nougat first version featuring unicode 9.0 support comes updated emoji plus support emoji skin tones android 7.1 adds native api support implementing image keyboards multi-endpoint telephony shortcut menus rounded icon assets apps launchers support google daydream virtual reality platform daydream environment includes sustained performance mode assist developers optimizing apps device thermal profile new head tracking algorithm combines input various device sensors integration system notifications vr user interface response stagefright family bugs disclosed fixed 2015 several changes made harden media stack future vulnerabilities runtime integer overflow detection implemented preventing majority stagefright-like programming bugs becoming vulnerabilities addition helping fix prevent bugs android monolithic mediaserver process redesigned better adhere principle least privilege mediaserver split several separate processes running unprivileged sandbox granted permissions required task example audioserver access bluetooth libstagefright runs within mediacodecservice sandbox granted gpu access constraints placed media stack seccomp various mechanisms enabled reduce possibility malicious code injected and/or executed inside linux kernel including dividing kernel memory logical segments code data page access permissions read-only no-execute appropriate kernel also restricted directly accessing user space memory stronger stack protection enabled gcc compiler reduce stack smashing limit exposure kernel potentially malicious code perf disabled default ioctl commands restricted selinux seccomp-bpf enabled grant processes ability restrict system calls devices shipping android nougat verified boot policy introduced partially kitkat displaying notifications startup marshmallow must strictly enforced system files corrupted otherwise modified operating system allow operation limited-use mode refuse boot dieter bohn verge praised new multitasking interface android nougat calling long overdue android tablets although initially found implementation confusing wrote worked well understood properly though noted apps ’ fully support split screen others work fine pop warning anyway bohn also liked new way reply message notification stating android long advantage useful consistent notifications versus ios added quick replies standard n't see lead diminishing also noted tweaks throughout os welcome changes including quick toggles notification drawer settings menu visual information camera app cleaned bit bohn stated n't notice significant battery improvements despite doze power-saving feature nougat also wrote extensively fact even though nougat great ’ shame take long anybody see writing lack updates android devices unless nexus could months could becomes available phone chris velazco engadget also praised new bundled app notifications writing prior android versions notifications sort sit interaction nougat much better job bundling app letting get things done highlighted ability expand bundled gmail notification see subjects senders individual messages velazco stated split-screen multitasking big deal also encountered non-compatible apps visual elements settings app quick toggles notification dropdown new language emoji support also positive highlights review velazco note battery improvement doze power-saving feature stating nexus 6p seemed gain hour two standby battery life also wrote installing launching apps might little faster usual thanks nougat new app compiler hoped game developers utilize new vulkan api seriously good-looking mobile gaming | [
3933,
5372,
1095,
5397,
740,
4340,
42,
3309,
3310,
7924,
2591,
7570,
5771,
5775,
4729,
6153,
4377,
7956,
6874,
5455,
6176,
5473,
474,
6183,
822,
831,
6910,
5141,
136,
2317,
2673,
6209,
1581,
1582,
2683,
7666,
855,
6937,
168,
6232,
6950,... | Test |
6,428 | 9 | Ruby_(programming_language):ruby programming language ruby interpreted high-level general-purpose programming language designed developed mid-1990s yukihiro matz matsumoto japan ruby dynamically typed uses garbage collection supports multiple programming paradigms including procedural object-oriented functional programming according creator ruby influenced perl smalltalk eiffel ada basic lisp matsumoto said ruby conceived 1993 1999 post ruby-talk mailing list describes early ideas language matsumoto describes design ruby like simple lisp language core object system like smalltalk blocks inspired higher-order functions practical utility like perl name ruby originated online chat session matsumoto keiju ishitsuka february 24 1993 code written language initially two names proposed coral ruby matsumoto chose latter later e-mail ishitsuka matsumoto later noted factor choosing name ruby – birthstone one colleagues first public release ruby 0.95 announced japanese domestic newsgroups december 21 1995 subsequently three versions ruby released two days release coincided launch japanese-language ruby-list mailing list first mailing list new language already present stage development many features familiar later releases ruby including object-oriented design classes inheritance mixins iterators closures exception handling garbage collection following release ruby 0.95 1995 several stable versions ruby released following years 1997 first article ruby published web year matsumoto hired netlab.jp work ruby full-time developer 1998 ruby application archive launched matsumoto along simple english-language homepage ruby 1999 first english language mailing list ruby-talk began signaled growing interest language outside japan year matsumoto keiju ishitsuka wrote first book ruby object-oriented scripting language ruby オブジェクト指向スクリプト言語 ruby published japan october 1999 would followed early 2000s around 20 books ruby published japanese 2000 ruby popular python japan september 2000 first english language book programming ruby printed later freely released public widening adoption ruby amongst english speakers early 2002 english-language ruby-talk mailing list receiving messages japanese-language ruby-list demonstrating ruby increasing popularity non-japanese speaking world ruby 1.8 initially released august 2003 stable long time retired june 2013 although deprecated still code based ruby 1.8 partially compatible ruby 1.9 ruby 1.8 subject several industry standards language specifications ruby developed open standards promotion center information-technology promotion agency japanese government agency submission japanese industrial standards committee jisc international organization standardization iso accepted japanese industrial standard jis x 3017 2011 international standard iso/iec 30170 2012 around 2005 interest ruby language surged tandem ruby rails web framework written ruby rails frequently credited increasing awareness ruby ruby 1.9 released christmas day 2007 effective ruby 1.9.3 released october 31 2011 ruby switched dual-licensed ruby license gpl dual-licensed ruby license two-clause bsd license adoption 1.9 slowed changes 1.8 required many popular third party gems rewritten ruby 1.9 introduces many significant changes 1.8 series examples ruby 1.9 obsolete since february 23 2015 longer receive bug security fixes users advised upgrade recent version ruby 2.0 added several new features including ruby 2.0 intended fully backward compatible ruby 1.9.3 official 2.0.0 release february 24 2013 five known minor incompatibilities obsolete since february 22 2016 longer receive bug security fixes users advised upgrade recent version ruby 2.1.0 released christmas day 2013 release includes speed-ups bugfixes library updates starting 2.1.0 ruby versioning policy like semantic versioning although similar ruby versioning policy compatible semantic versioning semantic versioning also provides additional labels pre-release build metadata available extensions major.minor.patch format available ruby ruby 2.1 obsolete since april 1 2017 longer receive bug security fixes users advised upgrade recent version ruby 2.2.0 released christmas day 2014 release includes speed-ups bugfixes library updates removes deprecated apis notably ruby 2.2.0 introduces changes memory handling incremental garbage collector support garbage collection symbols option compile directly jemalloc also contains experimental support using vfork 2 system spawn added support unicode 7.0 specification features made obsolete removed include callcc dl library digest :hmac lib/rational.rb lib/complex.rb gserver logger :application well various c api functions ruby 2.3.0 released christmas day 2015 notable changes include 2.3 branch also includes many performance improvements updates bugfixes including changes proc call socket io use exception keywords thread name handling default passive net :ftp connections rake removed stdlib ruby 2.4.0 released christmas day 2016 notable changes include 2.4 branch also includes performance improvements hash table array max array min instance variable access ruby 2.5.0 released christmas day 2017 notable changes include top come lot performance improvements like faster block passing 3 times faster faster mutexes faster erb templates improvements concatenation methods ruby 2.6.0 released christmas day 2018 notable changes include matsumoto said ruby designed programmer productivity fun following principles good user interface design google tech talk 2008 matsumoto stated hope see ruby help every programmer world productive enjoy programming happy primary purpose ruby language stresses systems design needs emphasize human rather computer needs ruby said follow principle least astonishment pola meaning language behave way minimize confusion experienced users matsumoto said primary design goal make language enjoyed using minimizing programmer work possible confusion said applied principle least astonishment design ruby nevertheless phrase come closely associated ruby programming language phrase source surprise novice users may take mean ruby behaviors try closely match behaviors familiar languages may 2005 discussion newsgroup comp.lang.ruby matsumoto attempted distance ruby pola explaining design choice surprising someone uses personal standard evaluating surprise personal standard remains consistent would surprises familiar standard matsumoto defined way interview ruby object-oriented every value object including classes instances types many languages designate primitives integers booleans null variables always hold references objects every function method methods always called object methods defined top level scope become methods object class since class ancestor every class methods called object also visible scopes effectively serving global procedures ruby supports inheritance dynamic dispatch mixins singleton methods belonging defined single instance rather defined class though ruby support multiple inheritance classes import modules mixins ruby described multi-paradigm programming language allows procedural programming defining functions/variables outside classes makes part root 'self object object orientation everything object functional programming anonymous functions closures continuations statements values functions return last evaluation support introspection reflection metaprogramming well support interpreter-based threads ruby features dynamic typing supports parametric polymorphism according ruby faq syntax similar perl semantics similar smalltalk differs greatly python syntax ruby broadly similar perl python class method definitions signaled keywords whereas code blocks defined keywords braces contrast perl variables obligatorily prefixed sigil used sigil changes semantics scope variable practical purposes distinction expressions statements line breaks significant taken end statement semicolon may equivalently used unlike python indentation significant one differences python perl ruby keeps instance variables completely private class exposes accessor methods codice_11 codice_12 etc. unlike getter setter methods languages like c++ java accessor methods ruby created single line code via metaprogramming however accessor methods also created traditional fashion c++ java invocation methods require use parentheses trivial change instance variable full function without modifying single line calling code refactoring achieving similar functionality c vb.net property members python property descriptors similar come tradeoff development process one begins python using publicly exposed instance variable later changes implementation use private instance variable exposed property descriptor code internal class may need adjusted use private variable rather public property ruby ’ design forces instance variables private also provides simple way declare codice_13 codice_14 methods keeping idea ruby one never directly accesses internal members class outside class rather one passes message class receives response see examples section samples code demonstrating ruby syntax ruby official distribution also includes codice_15 interactive command-line interpreter used test code quickly following code fragment represents sample session using codice_15 following examples run ruby shell interactive ruby shell saved file run command line typing codice_17 classic hello world example basic ruby code input conversions variety ways define strings ruby following assignments equivalent strings support variable interpolation following assignments equivalent produce raw strings constructing using array constructing using associative array ruby called hash statement two syntaxes creating code block code block passed method optional block argument many built-in methods arguments parameter-passing block closure computer science |closure creating anonymous function returning closure computer science |closures method yielding flow program control block provided calling time iterating enumerations arrays using blocks method codice_18 accept parameter block codice_18 method iterates member list performing function retaining aggregate analogous codice_20 function functional programming languages example first pass block receives 10 argument inject codice_21 1 first element array codice_22 returns 11 becomes codice_21 next pass added 3 get 14 added 5 third pass finally return 19 using enumeration block square numbers 1 10 using range invoke method item codice_24 synonym codice_25 following code defines class named codice_26 addition codice_27 usual constructor create new objects two methods one override codice_28 comparison operator codice_29 sort age override codice_30 method codice_31 format output codice_12 example metaprogramming ruby codice_33 defines getter setter methods instance variables codice_12 getter methods last evaluated statement method return value allowing omission explicit codice_35 statement preceding code prints three names reverse age order codice_26 constant reference codice_37 object ruby classes never closed methods always added existing class applies classes including standard built-in classes needed open class definition existing class new contents specified added existing contents simple example adding new method standard library codice_38 class adding methods previously defined classes often called monkey patch|monkey-patching performed recklessly practice lead behavior collisions subsequent unexpected results code scalability problems since ruby 2.0 possible use refinements reduce potentially negative consequences monkey-patching limiting scope patch particular areas code base exception raised codice_39 call optional message added exception exceptions also specified programmer alternatively exception instance passed codice_39 method last construct useful raising instance custom exception class featuring constructor takes one argument exceptions handled codice_41 clause clause catch exceptions inherit codice_42 flow control keywords used handling exceptions codice_43 codice_44 common mistake attempt catch exceptions simple rescue clause catch exceptions one must write catch particular exceptions also possible specify exception object made available handler clause alternatively recent exception stored magic global codice_45 several exceptions also caught ruby code programmatically modify run time program lifecycle phase |runtime aspects structure would fixed rigid languages class method definitions sort metaprogramming used write concise code effectively extend language example following ruby code generates new methods built-in codice_46 class based list colors methods wrap contents string html tag styled respective color generated methods could used like implement equivalent many languages programmer would write method codice_47 codice_48 codice_49 etc separately possible uses ruby metaprogramming include original ruby interpreter computer software |interpreter often referred ruby mri|matz ruby interpreter mri implementation written c uses ruby-specific virtual machine standardized retired ruby 1.8 ruby mri|implementation written c programming language |c single-pass interpreted language starting ruby 1.9 continuing ruby 2.x official ruby interpreter yarv yet another ruby vm implementation superseded slower virtual machine used previous releases mri number alternative implementations ruby including jruby rubinius mruby takes different approach jruby rubinius providing just-in-time compilation mruby also providing ahead-of-time compilation ruby three major alternate implementations ruby implementations include defunct ruby implementations maturity ruby implementations tends measured ability run ruby rails rails framework complex implement uses many ruby-specific features point particular implementation achieves goal called rails singularity reference implementation jruby rubinius able run rails unmodified production environment matsumoto originally ruby development bsd|4.3bsd -based sony news|sony news-os 3.x later migrated work sunos 4.x finally linux 1999 ruby known work across many different operating system including news-os sunos aix svr4 solaris operating system |solaris nec up-ux nextstep bsd linux classic mac os|mac os dos windows operating system |windows beos modern ruby versions implementations available many operating systems linux bsd solaris aix macos windows windows phone windows ce symbian os beos ibm rubygems ruby package manager ruby package called gem easily installed via command line gems libraries though exist applications integrated development environment|ides 10,000 ruby gems hosted rubygems.org many new existing ruby libraries hosted github service offers revision control|version control repository hosting git software |git ruby application archive hosted applications documentation libraries ruby programming maintained 2013 function transferred rubygems category ruby programming language category articles example ruby code category class-based programming languages category dynamic programming languages category dynamically typed programming languages category free software programmed c category iso standards category object-oriented programming languages category programming languages created 1995 category programming languages iso standard category scripting languages category software using bsd license category text-oriented programming languages category free compilers interpreters | [
4302,
10,
5726,
7166,
4315,
54,
7213,
2966,
5782,
5786,
5787,
1524,
1532,
7246,
103,
109,
1543,
3005,
5822,
1550,
3021,
4425,
5846,
5863,
4441,
154,
160,
163,
1598,
7308,
1616,
7333,
5912,
7347,
5915,
5927,
4511,
7370,
224,
7379,
5948,
... | Test |
6,429 | 3 | Salamander_(video_game):salamander video game retitled north america japanese arcade re-release europe known life force salamander scrolling shooter arcade game konami released 1986 spin-off gradius salamander introduced simplified power-up system two-player cooperative gameplay horizontally vertically scrolling stages later became norm future gradius games salamander followed sequel 1996 titled salamander 2 first player controls vic viper second player takes reins debuting spacecraft lord british sometimes referred road british due ambiguity japanese-to-english romanization game features six stages alter horizontal vertical scrolling players allowed continue leave upon death instead returned predefined checkpoint per gradius tradition continues single player mode two two-player mode number continues changed dip switches player gains power-ups picking capsules left behind certain enemies opposed selection bar used gradius games however japanese version life force keeps selection bar many power-ups combined example option fires second third salvo missiles ripple/plutonic lasers power-ups attained ripple laser however mutually exclusive power-up survive ship destruction options upon ship destruction options float space brief time disappearing new ship grab retain arcade version game released original title japan europe life force north america japanese european versions nearly identical american version changes game plot adding opening text establishes game set inside giant alien life-form infected strain bacteria stages feature starfield backgrounds changed web background stage 1 maintain consistency organic setting plot power-ups also given different names speed-up becoming hyper speed missile becoming destruct missile ripple laser becoming pulse laser force field becoming shield narration added beginning stage detailing area alien body player currently inhabiting enter stomach muscle zone bio-mechanical brain attack konami later released enhanced version salamander japan 1987 bearing american title life force fleshes organic motif backgrounds mechanical enemies completely redrawn given organic appearances power-up system also modified japanese life force using power-up gauge original gradius music tracks completely changed release power-up gauge arranged differently players ocean software imagine label released licensed versions salamander computer systems spectrum commodore amstrad 1988 spectrum amstrad versions generally criticized commodore 64 version highly praised critics day particularly zzap 64 though missing two six stages simultaneous two player mode gameplay much easier arcade counterpart commodore port generally considered one best arcade conversions system salamander ported family computer japan 1987 instead direct port salamander elements taken original salamander japanese life force re-release elements levels bosses removed make way new content background graphics enemy sprites salamander used favor used life force though gradius -style power bar used place original instant pick-up system year north america received port well nintendo entertainment system nes version practically identical famicom equivalent multiple endings two option power ups instead three titled life force north america version later re-released virtual console february 16 2009 wii january 23 2014 nintendo 3ds august 21 2014 wii u european version titled life force salamander cover released november 22 1989 nes version makes use konami code increases number lives three 30 first two levels life force profiled second issue nintendo power issued 1988 several issues later entire game re-profiled msx port significantly different original ports new port graphical introduction introduces human pilots ship well names stage levels notably longer arcade original player forced start pre-defined checkpoint upon death either pilot instead starting left level two player choose order next three stages addition player collect e capsules destroying certain enemies collecting fifteen permanently upgrade one available weapons power-up bar weapons allow player ships merge one player controlling movements second player controlling weapons instead vic viper lord british space destroyer ships known sabel tiger thrasher piloted human characters named iggy rock zowie scott story takes place year 6709 a.d 2 different endings msx version re-released wii virtual console japan january 12 2010 later released wii u virtual console july 20 2016 also made available project egg windows store may 19 2015 version pc engine released december 6 1991 based arcade version salamander changes port include starting pre-defined checkpoint upon death 1 player mode faster enemy animations improved music japan pc engine version re-released wii virtual console september 11 2007 playstation network july 21 2010 wii u virtual console october 22 2014 also project egg con windows store march 3 2014 released north america november 16 2017 wii u virtual console compilation titled salamander deluxe pack plus released japan sega saturn june 19 1997 playstation july 6 year compilation includes salamander japanese version life force well salamander 2 salamander released mobile phones 2003 three arcade versions salamander american japanese adaptations life force ported arcade archives november 27 2015 japan exclusively playstation 4 later released worldwide spring 2016 published hamster corporation another compilation salamander series titled salamander portable released playstation portable january 24 2007 japan psp compilation features three games previously included salamander deluxe pack plus well xexex msx version gradius 2 a.k.a nemesis ii unrelated arcade game december 20 2010 application called pc engine game box published app store served portal download classic pc engine video games among downloadable titles pc engine version salamander fee arcade version included konami arcade classics anniversary collection released april 2019 digital-only format playstation 4 xbox one nintendo switch pc initially compilation japan salamander version game everywhere else featured american life force instead june 2019 konami added free japanese versions respective games western arcade classics anniversary collection salamander version played addition japanese life force part compilation conversely american version life force added collection japan update 1988 ova mini-series studio pierrot directed hisayuki toriumi three episodes released vhs laserdisc february 25 1988 february 21 1989 series licensed british company western connection series canon however msx gradius series states events gofer take place two-hundred year period following crisis zelos salamander armada mini-series revealed bacterians capture sentient life create leaders space armada capture sentient life via dark fog going space changes inorganic matter organic matter large brain-like final bosses games crystal-like life-form origin noriko hidaka provided voice protagonist stephanie anime lord british space destroyer named one protagonists ike lord british planet latis thus making lord british space destroyer | [
6312,
3113,
8015
] | Validation |
6,430 | 1 | Blockchain:blockchain blockchain originally block chain growing list records called blocks linked using cryptography block contains cryptographic hash previous block timestamp transaction data generally represented merkle tree design blockchain resistant modification data open distributed ledger record transactions two parties efficiently verifiable permanent way use distributed ledger blockchain typically managed peer-to-peer network collectively adhering protocol inter-node communication validating new blocks recorded data given block altered retroactively without alteration subsequent blocks requires consensus network majority although blockchain records unalterable blockchains may considered secure design exemplify distributed computing system high byzantine fault tolerance decentralized consensus therefore claimed blockchain blockchain invented person group people using name satoshi nakamoto 2008 serve public transaction ledger cryptocurrency bitcoin identity satoshi nakamoto unknown invention blockchain bitcoin made first digital currency solve double-spending problem without need trusted authority central server bitcoin design inspired applications blockchains readable public widely used cryptocurrencies blockchain considered type payment rail private blockchains proposed business use sources computerworld called marketing blockchains without proper security model snake oil first work cryptographically secured chain blocks described 1991 stuart haber w. scott stornetta wanted implement system document timestamps could tampered 1992 bayer haber stornetta incorporated merkle trees design improved efficiency allowing several document certificates collected one block first blockchain conceptualized person group people known satoshi nakamoto 2008 nakamoto improved design important way using hashcash-like method add blocks chain without requiring signed trusted party design implemented following year nakamoto core component cryptocurrency bitcoin serves public ledger transactions network august 2014 bitcoin blockchain file size containing records transactions occurred network reached 20 gb gigabytes january 2015 size grown almost 30 gb january 2016 january 2017 bitcoin blockchain grew 50 gb 100 gb size words block chain used separately satoshi nakamoto original paper eventually popularized single word blockchain 2016 smart contracts run blockchain example ones creat e invoices pay shipment arrives share certificates automatically send owners dividends profits reach certain level require off-chain oracle access external data events based time market conditions need interact blockchain according accenture application diffusion innovations theory suggests blockchains attained 13.5 adoption rate within financial services 2016 therefore reaching early adopters phase industry trade groups joined create global blockchain forum 2016 initiative chamber digital commerce may 2018 gartner found 1 cios indicated kind blockchain adoption within organisations 8 cios short-term 'planning looking active experimentation blockchain blockchain decentralized distributed public digital ledger used record transactions across many computers involved record altered retroactively without alteration subsequent blocks allows participants verify audit transactions independently relatively inexpensively blockchain database managed autonomously using peer-to-peer network distributed timestamping server authenticated mass collaboration powered collective self-interests design facilitates robust workflow participants uncertainty regarding data security marginal use blockchain removes characteristic infinite reproducibility digital asset confirms unit value transferred solving long-standing problem double spending blockchain described value-exchange protocol blockchain maintain title rights properly set detail exchange agreement provides record compels offer acceptance blocks hold batches valid transactions hashed encoded merkle tree block includes cryptographic hash prior block blockchain linking two linked blocks form chain iterative process confirms integrity previous block way back original genesis block sometimes separate blocks produced concurrently creating temporary fork addition secure hash-based history blockchain specified algorithm scoring different versions history one higher score selected others blocks selected inclusion chain called orphan blocks peers supporting database different versions history time time keep highest-scoring version database known whenever peer receives higher-scoring version usually old version single new block added extend overwrite database retransmit improvement peers never absolute guarantee particular entry remain best version history forever blockchains typically built add score new blocks onto old blocks given incentives extend new blocks rather overwrite old blocks therefore probability entry becoming superseded decreases exponentially blocks built top eventually becoming low example bitcoin uses proof-of-work system chain cumulative proof-of-work considered valid one network number methods used demonstrate sufficient level computation within blockchain computation carried redundantly rather traditional segregated parallel manner block time average time takes network generate one extra block blockchain blockchains create new block frequently every five seconds time block completion included data becomes verifiable cryptocurrency practically transaction takes place shorter block time means faster transactions block time ethereum set 14 15 seconds bitcoin 10 minutes storing data across peer-to-peer network blockchain eliminates number risks come data held centrally decentralized blockchain may use ad-hoc message passing distributed networking peer-to-peer blockchain networks lack centralized points vulnerability computer crackers exploit likewise central point failure blockchain security methods include use public-key cryptography public key long random-looking string numbers address blockchain value tokens sent across network recorded belonging address private key like password gives owner access digital assets means otherwise interact various capabilities blockchains support data stored blockchain generally considered incorruptible every node decentralized system copy blockchain data quality maintained massive database replication computational trust centralized official copy exists user trusted transactions broadcast network using software messages delivered best-effort basis mining nodes validate transactions add block building broadcast completed block nodes blockchains use various time-stamping schemes proof-of-work serialize changes alternative consensus methods include proof-of-stake growth decentralized blockchain accompanied risk centralization computer resources required process larger amounts data become expensive open blockchains user-friendly traditional ownership records open public still require physical access view early blockchains permissionless controversy arisen blockchain definition issue ongoing debate whether private system verifiers tasked authorized permissioned central authority considered blockchain proponents permissioned private chains argue term blockchain may applied data structure batches data time-stamped blocks blockchains serve distributed version multiversion concurrency control mvcc databases mvcc prevents two transactions concurrently modifying single object database blockchains prevent two transactions spending single output blockchain opponents say permissioned systems resemble traditional corporate databases supporting decentralized data verification systems hardened operator tampering revision nikolai hampton computerworld said many in-house blockchain solutions nothing cumbersome databases without clear security model proprietary blockchains eyed suspicion great advantage open permissionless public blockchain network guarding bad actors required access control needed means applications added network without approval trust others using blockchain transport layer bitcoin cryptocurrencies currently secure blockchain requiring new entries include proof work prolong blockchain bitcoin uses hashcash puzzles hashcash designed 1997 adam back original idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail financial companies prioritised decentralized blockchains 2016 venture capital investment blockchain-related projects weakening usa increasing china bitcoin many cryptocurrencies use open public blockchains bitcoin highest market capitalization permissioned blockchains use access control layer govern access network contrast public blockchain networks validators private blockchain networks vetted network owner rely anonymous nodes validate transactions benefit network effect permissioned blockchains also go name 'consortium blockchains nikolai hampton pointed computerworld also need '51 percent attack private blockchain private blockchain likely already controls 100 percent block creation resources could attack damage blockchain creation tools private corporate server could effectively control 100 percent network alter transactions however wished set particularly profound adverse implications financial crisis debt crisis like financial crisis 2007–08 politically powerful actors may make decisions favor groups expense others bitcoin blockchain protected massive group mining effort unlikely private blockchain try protect records using gigawatts computing power — time consuming expensive also said within private blockchain also 'race incentive use power discover blocks faster competitors means many in-house blockchain solutions nothing cumbersome databases analysis public blockchains become increasingly important popularity bitcoin ethereum litecoin cryptocurrencies blockchain public provides anyone wants access observe analyse chain data given one know-how process understanding accessing flow crypto issue many cryptocurrencies crypto-exchanges banks reason accusations blockchain enabled cryptocurrencies enabling illicit dark market trade drugs weapons money laundering etc common belief cryptocurrency private untraceable thus leading many actors use illegal purposes changing specialised tech-companies provide blockchain tracking services making crypto exchanges law-enforcement banks aware happening crypto funds fiat crypto exchanges development argue led criminals prioritise use new cryptos monero question public accessibility blockchain data personal privacy data key debate cryptocurrency ultimately blockchain blockchain technology integrated multiple areas primary use blockchains today distributed ledger cryptocurrencies notably bitcoin operational products maturing proof concept late 2016 businesses thus far reluctant place blockchain core business structure cryptocurrencies use blockchain technology record transactions example bitcoin network ethereum network based blockchain 8 may 2018 facebook confirmed opening new blockchain group headed david marcus previously charge messenger according verge facebook planning launch cryptocurrency facilitating payments platform blockchain-based smart contracts proposed contracts could partially fully executed enforced without human interaction one main objectives smart contract automated escrow imf staff discussion reported smart contracts based blockchain technology might reduce moral hazards optimize use contracts general viable smart contract systems yet emerged due lack widespread use legal status unclear major portions financial industry implementing distributed ledgers use banking according september 2016 ibm study occurring faster expected banks interested technology potential speed back office settlement systems banks ubs opening new research labs dedicated blockchain technology order explore blockchain used financial services increase efficiency reduce costs berenberg german bank believes blockchain overhyped technology large number proofs concept still major challenges success stories blockchain game cryptokitties launched november 2017 game made headlines december 2017 cryptokitty character in-game virtual pet sold us 100,000 cryptokitties illustrated scalability problems games ethereum created significant congestion ethereum network 30 ethereum transactions game cryptokitties also demonstrated blockchains used catalog game assets digital assets specific token standards created support use blockchain gaming include erc-721 standard cryptokitties non-fungible tokens recent erc-1155 standard creation fungible e.g in-game currency non-fungible tokens e.g set rare armour blockchain use blockchain creation game assets provide advantages gamers include true ownership assets tied individual blockchain address rather accessed centralized game server transparency blockchain explorers used confirm total supply various game assets interoperability read decentralized public ledger blockchain assets open developers integrate game via blockchain choose number efforts industry organizations working employ blockchains supply chain logistics supply chain management blockchain transport alliance bita works develop open standards supply chains everledger one inaugural clients ibm blockchain-based tracking service walmart ibm running trial use blockchain-backed system supply chain monitoring — nodes blockchain administered walmart located ibm cloud hyperledger grid develops open components blockchain supply chain solutions blockchain technology used create permanent public transparent ledger system compiling data sales tracking digital use payments content creators wireless users musicians 2017 ibm partnered ascap prs music adopt blockchain technology music distribution imogen heap mycelia service also proposed blockchain-based alternative gives artists control songs associated data circulate among fans musicians new distribution methods available insurance industry peer-to-peer insurance parametric insurance microinsurance following adoption blockchain sharing economy iot also set benefit blockchains involve many collaborating peers online voting another application blockchain designs include currently least four types blockchain networks — public blockchains private blockchains consortium blockchains hybrid blockchains public blockchain absolutely access restrictions anyone internet connection send transactions well become validator i.e. participate execution consensus protocol usually networks offer economic incentives secure utilize type proof stake proof work algorithm largest known public blockchains bitcoin blockchain ethereum blockchain private blockchain permissioned one join unless invited network administrators participant validator access restricted hybrid blockchain simply explained combination different characteristics public private blockchains design allows users blockchain apis determine information stays private information made public decentralization relation primarily centralized private blockchains achieved various ways example instead keeping transactions inside network community run private nodes hash without payload posted completely decentralized blockchains bitcoin done automatically triggered thus providing historical transaction using signed hash allows users operate different blockchains selectively share data business logic blockchains like wanchain use interoperability mechanisms bridges submitting hash transaction without sensitive business logic public blockchains like bitcoin ethereum privacy blockchain concerns resolved personal identifiable information stored public blockchain depending hybrid blockchain architecture multicloud solutions allow store data compliance general data protection regulation geographical limitations also leveraging bitcoin global hashpower decentralize transactions october 2014 mit bitcoin club funding mit alumni provided undergraduate students massachusetts institute technology access 100 bitcoin adoption rates studied catalini tucker 2016 revealed people typically adopt technologies early given delayed access tend reject technology bank international settlements criticized public proof-of-work blockchains high energy consumption nicholas weaver international computer science institute university california berkeley examines blockchain online security energy efficiency proof-of-work public blockchains cases finds grossly inadequate september 2015 first peer-reviewed academic journal dedicated cryptocurrency blockchain technology research ledger announced inaugural issue published december 2016 journal covers aspects mathematics computer science engineering law economics philosophy relate cryptocurrencies bitcoin journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers non-repudiation purposes | [
6069,
1449,
3951,
744,
6462,
7205,
2961,
1134,
1891,
84,
784,
1906,
7248,
3011,
1186,
6543,
3024,
7649,
3383,
4067,
6216,
7290,
3401,
7303,
4457,
538,
5209,
3776,
907,
2396,
3794,
2054,
3486,
8124,
1700,
1329,
3162,
2821,
1730,
8174,
21... | Test |
6,431 | 6 | Professional_File_System:professional file system professional file system filesystem originally developed commercially amiga distributed aminet 4-clause bsd license compatible successor amifilesafe afs emphasis added reliability speed compared standard amiga filesystems also features multi-user abilities like older mufs device split two main areas beginning device metadata section consists root block generic array blocks allocated store metadata rest device another contiguous generic array blocks allocated store data metadata section usually uses percent device depending size device metadata stored tree single blocks metadata section entire directory structure recorded metadata data section purely contains data files metadata describes location data files extents blocks makes metadata quite compact metadata update occurs system looks block containing metadata changed copies newly allocated block metadata section change made recursively changes metadata block points block way way eventually root block needs changed causes atomic metadata update filesystem reasonably good keeping files unfragmented although defragmentation tool available work online filesystem first filesystem introduce concept recycle bin natively filesystem-level amiga holding last deleted files hidden directory disk root pfs version 5.3 developed c small portion assembly code michiel pelt | [
3599,
2547,
7161,
4672,
3626,
6117,
4354,
4006,
7942,
6854,
5437,
4375,
6500,
6505,
6161,
5457,
97,
460,
3688,
1534,
7976,
4406,
821,
7258,
5130,
5833,
1561,
836,
5843,
6558,
1214,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
17... | Test |
6,432 | 5 | Reliable_User_Datagram_Protocol:reliable user datagram protocol computer networking reliable user datagram protocol rudp transport layer protocol designed bell labs plan 9 operating system aims provide solution udp primitive guaranteed-order packet delivery desirable tcp adds much complexity/overhead order rudp gain higher quality service rudp implements features similar tcp less overhead order ensure quality extends udp means adding following features rudp currently formal standard however described ietf internet-draft 1999 proposed standardization cisco signalling link terminals either standalone integrated another gateway uses rudp backhauling ss7 mtp3 isdn signaling versions mutually incompatible differ slightly ietf draft structure cisco session manager used top rudp also different microsoft introduced another protocol named r-udp used mediaroom product owned ericsson iptv service delivery multicast networks proprietary protocol little known operation thought based referenced ietf draft | [
7148,
456,
6879,
2281,
6521,
6976,
4040,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
5571,
2119,
6908,
3462,
7091,
3383,
2219,
3640,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880,
2901
] | Test |
6,433 | 7 | MuleSoft:mulesoft mulesoft llc software company headquartered san francisco california provides integration software connecting applications data devices started 2006 company anypoint platform integration products designed integrate software service saas on-premises software legacy systems company originally provided middleware messaging later expanded provide integration platform service ipaas approach companies main product anypoint platform mulesoft anypoint platform includes various components anypoint design center allows api developers design build apis anypoint exchange library api providers share apis templates assets anypoint management center centralized web interface analyze manage monitor apis integrations mulesoft also offers mule runtime engine runtime solution connecting enterprise applications on-premises cloud designed eliminate need custom point-to-point integration code may 2 2018 salesforce acquired mulesoft 6.5 billion cash stock deal ross mason dave rosenberg founded mulesource 2006 company changed name mulesoft 2009 april 2013 startup announced 37 million series e financing round led new enterprise associates participation new strategic investor salesforce.com existing investors hummer winblad venture partners morgenthaler ventures lightspeed venture partners sapphire ventures formerly sap ventures bay partners round brought mulesoft total financing course seven funding rounds 259 million april 2013 mulesoft acquired programmableweb website used developers help build web mobile connected applications apis 2016 mulesoft ranked 20 forbes cloud 100 list february 2017 company filed ipo began trading new york stock exchange march 17 2017 stock rose 45 first day trading march 2018 salesforce.com announced buying mulesoft deal reported worth us 6.5b may 2018 salesforce completed acquisition mulesoft mule name comes drudgery donkey work data integration platform created escape august 2019 mulesoft 1,400 employees 1,600 customers | [
7037,
373,
330,
5666
] | Test |
6,434 | 3 | Bubbler_(video_game):bubbler video game bubbler zx spectrum video game developed published ultimate play game 1987 ultimate final title 8-bit home computers evolving rare game isometric platform game style marble madness 1984 crash magazine reviewer ricky disliked impreciseness controls | [
223,
2904,
6397,
1980,
3022,
4060,
1517
] | Test |
6,435 | 3 | HSA_Foundation:hsa foundation hsa foundation not-for-profit engineering organization industry academia works development heterogeneous system architecture hsa set royalty-free computer hardware specifications well open source software development tools needed use hsa features application software hsa foundation aims develop define features interfaces various types computer processors including cpus graphics processors dsps well memory systems connect resulting architecture hsa aims make easier program parallel systems built heterogeneous combinations devices hsa foundation founded amd arm holdings imagination technologies mediatek qualcomm samsung texas instruments members include licensors licensees semiconductor intellectual property developers cpus gpus dsps application-specific integrated circuits asics based upon and/or licensed technology academic partners lawrence livermore national laboratory university bologna not-for-profit engineering organization linaro hsa foundation joined linux foundation hsa foundation engineering works upstream projects set requirements determined technical steering committee | [
2539,
7442,
6874,
5740,
1237,
4694,
1494,
5334
] | Test |
6,436 | 2 | HP_Universal_Print_Driver:hp universal print driver hp universal print driver upd intelligent print driver supports broad range hp laserjet printers mfps developed hewlett-packard combines general purpose driver unidrv pscript hp proprietary extensions hp upd simplifies driver deployment management advanced print driver ability discover hp printing devices automatically configure device capabilities e.g. duplex color finishing etc. hp universal print driver microsoft windows solution provides two modes operation traditional dynamic traditional mode hp upd behaves similarly traditional print drivers dynamic mode provides discovery auto configuration management features particularly well suited mobile computer users hp ’ universal print driver based microsoft ’ universal core drivers unidrv pscript core drivers usable device specific information used inform core driver actual device settings capabilities accomplish task universal printing dialog box inserted standard print setup dialog box universal printing dialog box allows users choose recently used device enter device ip address search local print devices choose device predefined list regardless device discovery method used microsoft core driver updated accordingly new device information reflected normal print driver user interface hp provides three different universal print drivers pcl5 pcl6 emulation postscript custom default values assigned hp driver configuration utility hp upd available microsoft windows 32-bit 64-bit driver automatically configures one 35 currently supported languages based upon language host system dynamic mode searching devices accomplished using mdns discovery protocol aka bonjour mdns protocol performs satisfactorily devices residing subnet users need enter ip addresses remote devices unless previously discovered available managed printers list whether discovered entered chosen hp universal printing dialog box submits snmp requests target device ’ ip address using enterprise auto configuration eac bidirectional communications port snmp requests ascertain device ’ configurations capabilities results used hp upd update print driver table windows registry accurately reflect target device ’ capabilities results also cached creg recently discovered device list updated provide easy method future selection dynamic mode hp upd considered virtual device therefore new device instances appear printers folder traditional mode hp upd bound print queue behaves like normal printer driver addition bi-directional communications device queries real time print job status mode chosen driver installation dynamic mode universal printing dialog box traditional mode bypasses universal printing dialog box goes directly typical print setup dialog box automatic configuration occur traditional mode users select manual updates ensure device ’ capabilities properly represented hp upd installed either dynamic mode traditional mode depending user requirements hp upd includes driver management features allowing administrators pre-configure deploy manage hp driver software management tools within hp upd include install.exe command line options hp mpa tool active directory templates driver configuration utility driver deployment utility hp web jetadmin install.exe hp upd installer allows driver default settings modified via command line options switches change system-wide behavior hp upd changes specific single print queue hp mpa utility hp mpa utility pre-configures driver default settings managed hp upd environment settings made within hp mpa utility control hp upd user level resulting policies maintained every printer attached hp upd global user policies affect hp upd users hp upd active directory templates hp upd administrative template active directory template added create group policy object manage user upd capabilities settings apply queue uses hp upd care taken locking configuration settings user unable change locked setting hp driver configuration utility hp driver configuration utility dcu windows application used edit configuration file associated particular driver configuration file controls print driver settings takes effect driver installed hp driver deployment utility ddu used pre-configure print driver deployment package run client computer new configuration file configures printer driver installed interfere whql certification ddu contains standalone dcu utility inside package launched pre-configure driver selected ddu tool beyond driver configuration hp upd also employs managed printer lists mpls managed print policies mpp control access devices capabilities technologies used hp upd dynamic mode mpls used searching devices unnecessary users presented predefined list devices choose mpls xml files created manually hp mpa utility exported hp web jetadmin hp upd activated begins searching network mpl file shown figure 6 mpps used control users access device features like color duplex etc default hp upd assumes hp mpa installed server named managed-print result hp upd searches network server find hp managed print policies hp managed printer lists driver also includes status notification pop-ups print submission inform user device status print job status consumable levels graphical popup window displays dashboard toner supply levels links reordering consumables instant support landing page particular hp device model hp upd selected printing attempt communicate directly printer gather status job information printing querying printer snmp get commands network traffic kept minimum present printing desired snps disabled | [
2815,
3764,
3151,
4759,
6016
] | Test |
6,437 | 4 | NetScout_Systems:netscout systems netscout systems inc. provider application network performance management products headquartered westford massachusetts netscout serves enterprises community government agencies telecommunications service providers july 2015 netscout acquired communications business danaher corporation including arbor networks fluke networks tektronix communications vss monitoring netscout subsidiaries cayman islands tax netscout systems acquired network general 2007 network general developed original network packet sniffer 1986 merged mcafee associates 1997 form network associates mid-2004 network associates sold sniffer technologies business silver lake partners texas pacific group 275 million cash form network general early 2006 network general acquired fidelia technology adding netvigil business service monitoring technology network application performance analysis tools september 2007 network general agreed acquired netscout systems 205 million netscout systems founded anil singhal narendra popat frontier software 1984 netscout created first rmon based ethernet probe 1992 november 2007 netscout acquired sniffer infinistream network intelligence product lines network general netscout merged product lines allow performance manager product use probes infinistream technologies april 2011 netscout acquired voice video management company psytechnics ipswich u.k acquired fox replay privately held dutch company 2011 later year many years partnering complementing solutions network switch port aggregation netscout moved directly competition partners acquiring privately held simena networks october 2014 netscout systems announced entered definitive agreement acquire communications business science technology company danaher corporation 2.6 billion upon completion merger danaher shareholders would nearly 59.5 percent combined company netscout shareholders would remaining stake analyst firm 451 research technology-industry syndicated research data firm predicted may 2015 acquisition netscout largest company network visibility management space 3,000 employees well 1bn year revenue july 2015 netscout finalized acquisition communications business danaher corporation including arbor networks security systems fluke networks rf wi-fi network troubleshooting analytics tektronix communications traffic inspection customer experience management analytics vss monitoring network packet brokers prepared statement company noted acquisition accelerates netscout ’ strategic progress enabling company offer ... innovative service assurance cyber security solutions adds new employees netscout | [
6574,
557,
479
] | Test |
6,438 | 4 | National_Privacy_Commission_(Philippines):national privacy commission philippines national privacy commission npc independent body created republic act 10173 data privacy act 2012 mandated administer implement provisions act monitor ensure compliance country international standards set data protection attached philippines department information communications technology dict purposes policy coordination remains independent performance functions commission safeguards fundamental human right every individual privacy particularly information privacy ensuring free flow information innovation growth national development order fulfill mandate commission vested broad range powers receiving complaints instituting investigations matters affecting personal data protection compelling entities abide orders matters affecting data privacy also represents philippine government internationally data protection related issues commission formulates implements policies relating protection personal data including relevant circulars advisory guidelines assist organisations understanding complying data privacy act commission also reviews organizational actions relation data protection rules issue decisions directions compliance necessary mandated work relevant sector regulators exercising functions beyond regulating data protection issues npc also undertakes public sector-specific educational outreach activities help organizations adopt good data protection practices help individuals better understand may protect personal data misuse data privacy act 2012 first law philippines acknowledges rights individuals personal data enforcing responsibilities entities process initial definition offered first republic act 8792 section 32 better known ecommerce act philippines formally introduced department trade industry dti department administrative order 08 defining guidelines protection personal data information private sector along anti-cybercrime bill ra 10175 first draft law started 2001 legal regulatory committee former information technology ecommerce council itecc forerunner commission information communication technology cict headed former secretary virgilio ver peña committee chaired atty claro parlade initiative information security privacy sub-committee chaired albert dela cruz president phcert together anti-computer crime fraud division chief atty elfren meneses nbi administrative operational functions provided presidential management staff pms acting cict secretariat rising concerns information technology business process association philippines ibpap absence data privacy law philippine congress passed senate bill 2965 house bill 4115 june 6 2012 president benigno s. aquino iii signed republic act 10173 data privacy act 2012 august 15 2012 law influenced data protection directive apec privacy framework president aquino appointed march 7 2016 raymund liboro inaugural head commission damian domingo o. mapa ivy d. patdu inaugural deputy privacy commissioners fixed terms office continued roles administration president rodrigo duterte consultation various private organizations civil societies series public hearings manila cebu davao implementing rules regulations data privacy act signed august 24 2016 took effect september 9 2016 may 2016 commission formally investigated commission elections commission elections data breach one largest security breach government held personal data february 21 2017 npc announced commission elections investigated another security breach due alleged theft computer containing personal data voters npc also began coordinating different sectors privacy data protection 2016 national privacy commission accepted member international conference data protection privacy commissioners asia pacific privacy authorities | [
1998,
1344,
2548,
803,
2727,
6974
] | Test |
6,439 | 7 | Ultimate_Software:ultimate software ultimate software american technology company develops sells ultipro cloud-based human capital management hcm software system businesses headquartered weston florida company founded 1990 current president ceo scott scherr released first version software 1993 fourth quarter 2017 ultimate software reported total revenues 940.7 million 2017 company employs 4,200 people services 4,100 customers 160 countries ultimate offices around usa canada uk singapore february 4 2019 hellman friedman capital partners announced would purchase ultimate software group 11 billion purchase closed may 3 2019 ultimate software founded scott scherr company ’ current ceo president 1990 1993 tech company released ultipro hrms/ payroll sold on-premises software servicing core hr payroll company went public nasdaq ulti june 1998 2002 ultipro reintroduced cloud-based software-as-a-service saas provide unified management tool human resources model allowed company hold 33 million client records cloud service 3,400 customers according career builder company announced expanding outside united states opened office london england later year ultimate announced additional expansions singapore company ultipro cloud-based platform delivers human capital management organizations across industries ultipro provides one system record hr payroll talent management according trustradius ultipro includes time attendance employee onboarding performance management compensation management succession management recruiting features like predictive analytics ultipro sold via saas model per-employee-per-month subscription according center generational kinetics center partnered company 2014 conduct research multiple generations workforce research looked work expectations across different generations focus millennials study explored millennials differ prior generations way feel applying job interviewing receiving feedback leaving job 2016 center generational kinetics continued partnership examine drivers motivators behind people workforce study focused organizations understand improve employee experience 2017 fortune magazine ranked ultimate software 7 best place work well 1 best workplace technology prior years fortune ranked ultimate software 6th best workplace millennials 23rd great workplace women 21st best company work additionally forbes ranked company 7th innovative growth company analyst firm nucleus research deemed tech company leader hcm technology past ultimate earned 2011 forrester groundswell award achieving business organizational goals innovation social technology applications 2013 brandon hall gold award best new product feature year | [
330
] | Train |
6,440 | 2 | N-Gage_(service):n-gage service n-gage service also referred n-gage 2.0 mobile gaming platform nokia available several nokia smartphones running s60 symbian n-gage provided numerous games 3d graphics application featuring online via n-gage arena social features takes name original 2003 n-gage gaming device succeeded n-gage platform compatible nokia n78 n79 n81 n81 8gb n82 n85 n86 n86 8mp n95 n95 8gb n96 n97 nokia 5320 xpressmusic 5630 xpressmusic 5730 xpressmusic nokia 6210 navigator 6710 navigator 6720 classic e52 e55 e75 due memory issues hinted interview february 2008 support nokia n73 n93 n93i cancelled less two years 30 october 2009 nokia announced new n-gage games would produced reasons cited failure bad development model marketing success apple app store nokia n-gage gaming smartphone 2003 perform well expected upgraded qd version n't improve either instead developing new gaming device change concept nokia explained world e3 2005 planning put n-gage platform several smartphone devices rather releasing specific device although n81 5730 xpressmusic models two dedicated gaming-buttons next screen marketed phone built gaming often nicknamed n-gage next generation public working behind closed doors took little year e3 2006 finally announcing n-gage mobile gaming service set 2007 release also started showing next-gen titles hooked creatures deep fighting game one perhaps visually impressive—even making use motion capture february 2007 nokia announced pilot service finland promote upcoming service nokia showed previews service 2007 game developers conference san francisco california 27 august 2007 nokia confirmed previously leaked n-gage logo official logo upcoming service n-gage gaming service final form finally announced nokia 29 august 2007 nokia used tagline get play promote platform supposed released december 2007 delayed nokia team making sure service ran 'smoothly public beta test n-gage application took place 4 february 2008 27 march 2008 though limited n81 period time referred first access public test client could downloaded free n-gage website final version user access features new application offer along three games try hooked creatures deep space impact kappa base later february nokia also released tetris block breaker deluxe world series poker pro challenge users try none games entirely free offer limited trial testing purposes order experience full game either purchased rented shortly released public hackers managed unpack n-gage installation file components installed separately thus removing n81-only limitation n-gage subsequently reported working nokia nseries devices n73 n95 response nokia released advisory asking users install unsupported version could cause errors issues 20 march official n-gage blog reported first access would come end 27 march though downloaded games time would still playable application updated version released—which occurred 3 april numerous delays many vague release dates n-gage platform finally also quite suddenly released public 3 april 2008 n-gage official website though five phone models compatible begin probably older models less powerful pointed interview earlier year whereas n-gage representative mentioned memory issues n73 launch titles also changed six five brain challenge first two titles n't even included original list included block breaker deluxe tetris instead sixth postponed game space impact kappa base hours launch ikona man behind official n-gage blog say delay currently ensuring block breaker deluxe space impact kappa base tetris running smoothly new application available showroom next week two four days later 7 april nokia posted official press release commenting release new mobile service point fifa 08 also became available purchase release official website also saw small change appearance price tags added games available download event calendar tab support application n-gage compatible devices much players logged website could also see reputation level n-gage level gathered n-gage points also release party held n-gage chat room shortly release several members n-gage team attending answer questions asked t-shirts randomly handed three-hour-long event everyone also promised n-gage points coming party expected launch problem-free numerous people reported trouble downloading purchasing activating games installing application logging n-gage arena n-gage software based solution first generation mmc games compatible new platform though games made comeback form sequel e.g remake/port e.g mile high pinball similarly games developed next-gen n-gage platform work original n-gage n-gage qd adding fact newer s60 software including n-gage client games n't binary-compatible older s60 devices vice versa user interface resembles microsoft ’ xbox live service top n-gage launcher five icons navigated pressing left right phone ’ thumb pad represent user games library profile friends list showroom launcher welcomes user home screen last game played shown along quick links friends progress score table featured game nokia wants highlight week inbox messaging within launcher screen shows games currently installed phone—be trial version full game purchased rented ones trial versions pink stripe says trial far right game icon overlapping looks somewhat like battery meter pay game illustrates progress game bottom list installed games quick link get games takes showroom games paid show pop-up every time play it—asking whether ’ like try free trial either purchase enter unlock code purchased given promotions rent game screen user may also rate games downloaded 1 5 stars well write small verdict next tab profile shows many n-gage points ’ scored far playing reputation level ranging 1-5 stars number friends enlisted chosen avatar/picture represent display white silhouette person orange background per default current status offline online away—the last two assigned personal message n-gage point level list games played gaming history selecting one display many points ’ gathered within chosen game—but also show well friends game users also able look achievements unlocked—or point pickups ’ called go add friend friends list well check highlighted may choose view recent conversations player send message view profile rate player messages sent regardless whether player currently online friends list sorted name availability/status n-gage points gathered showroom displays games available download well game extras expanding game extra content downloading new episodes/adventures adventure game dirk dagger games may browsed genre latest arrivals alphabetical order payment made either using credit card paying phone bill network operator apart actually purchasing game ’ also option renting games downloaded directly phone air gprs wifi user may choose download computer install phone using usb-cable nokia pc suite lot hands-on articles first access client generally reflect positive negative feedback official first access forum n81 users shared thoughts good could 've made better—regarding launcher games currently available biggest issues point players able activate purchased game still trial version play lot players also reporting connection issues head new experience nokia play jaakko kaidesoja say pocket gamer interview 21 february 2008 asked early feedback received feedback positive well received within company critical comments well received well know perfect yet features people want things want check get roadmap several n-gage 2.0 games nominated international mobile gaming awards 2007 two three n-gage 2.0 titles received award 8 may 2008 hooked creatures deep games award 2008 meffy awards cannes prior closure n-gage service nokia released updates n-gage application regular basis first update made available 2 october 2008 dubbed v1.010_131 update included following major changes version 1.20 1459 released 13 may 2009 n't much eliminate bugs 18 august 2009 version 1.40 1557 introduced new start-up icon welcoming screen way breaking installed games speed application slightly improved well updating application may done app itself—by using check updates function device downloaded get n-gage section n-gage.com order n-gage platform games run smoothly n-gage compatible mobile devices share common set specifications screen landscape portrait 320 x 240 pixels except n97 640 x 360 pixels screen graphics stretched displayed letterbox format keep aspect ratio os symbian s60 3rd edition s60 5th edition n97 interface 5 way left right center directional pad dedicated action buttons circle square mapped onto keypad 5 0 portrait mode 2 contextual buttons touch screen interactions supported n97 emulated actions buttons on-screen buttons connectivity 3g wifi required connecting n-gage platform downloading games online functions rankings multiplayer cpu arm11 speed ranges 369 mhz n81 600 mhz e52 gpu 3d graphics hardware accelerator supported games running devices hw-accelerated n95 enhanced performance audio stereo channel n-gage games packaged differently normal symbian applications extension .n-gage run via n-gage application game resources protected drm use native symbian apis instead use proprietary api n-gage sdk n-gage api fact extension rga api available open c++ plug-in select companies allowed access n-gage sdk gain access first must approved nokia sign nda 23 october 2009 49 games released officially n-gage many games cancelled shutting n-gage service see games sequels remakes ports first generation n-gage mmc games games reportedly development cancelled include 30 october 2009 nokia announced new n-gage games would produced effectively shutting n-gage platform n-gage services includes purchasing games various online features reportedly ceased operation end 2010 31 march 2011 nokia closed drm activation service leaving customers unable reactivate purchases case device format software update transition purchases made ovi store compensation given according support staff software purchases supported one year gaming websites e.g pocket gamer link n-gage failure overwhelming competition faces apple iphone ovi gaming cited poor implementation support parent company nokia | [
7232,
5979,
7511,
6788,
3082,
372,
7521,
7619,
1172,
3694,
472,
7169,
6621,
2564,
5386,
7261,
4147,
1377,
5044,
3637,
740,
5493,
5499,
139,
3559,
5062,
2233,
3039,
5068,
520,
3055,
163,
5174,
6312,
7583,
1904
] | Test |
6,441 | 9 | Jean_Ichbiah:jean ichbiah jean david ichbiah 25 march 1940 – 26 january 2007 french computer scientist initial chief designer 1977–1983 ada general-purpose strongly typed programming language certified validated compilers ichbiah descendant greek turkish jews thessaloniki emigrated france 1972 1974 worked designing experimental system implementation language called lis based pascal simula chairman simula user group also one founding members ifip wg 2.4 systems implementation languages joined cii honeywell bull cii-hb louveciennes france becoming member programming research division ichbiah team submitted language design labelled green competition choose united states department defense embedded programming language green selected 1978 continued chief designer language named ada 1980 ichbiah left cii-hb founded alsys corporation la celle-saint-cloud continued language definition standardize ada 83 later went ada compiler business also supplying special validated compiler systems nasa us army others later moved waltham massachusetts subsidiary alsys 1990s ichbiah designed keyboard layout fitaly specifically optimized stylus touch-based input subsequently started textware solutions company sells text entry software pdas tablet pcs well text-entry software medical transcription pcs 1979 jean ichbiah designated chevalier knight french legion honour correspondent french academy sciences received certificate distinguished service united states department defense work ada jean ichbiah died complications brain tumor january 26 2007 | [
1361,
3509,
7382,
304,
5948,
2379,
2852
] | Test |
6,442 | 5 | Maximum_segment_lifetime:maximum segment lifetime maximum segment lifetime time tcp segment exist internetwork system arbitrarily defined long maximum segment lifetime value used determine time_wait interval 2*msl command used many unix systems determine time_wait interval 60000 60 seconds common value freebsd systems description value checked command sysctl gets result linux systems value checked either commands | [
7637
] | Test |
6,443 | 2 | Linux-powered_device:linux-powered device linux-based devices linux devices computer appliances powered linux kernel possibly parts gnu operating system device manufacturers reasons use linux may various low cost security stability scalability customizability many original equipment manufacturers use free open source software brand products community maintained linux devices also available devices intended run linux time production community effort made possible either full partial linux support open source philosophy free open source software brings software world many people ported linux kernel run devices typical desktop laptop server computer ports performed committed individuals groups provide alternative software favorite hardware original hardware vendors cases supportive efforts linksys wrt54g least tolerate use software end users see tivo hacking others go great lengths try stop alternative implementations android linux-based operating system optimised mobile touchscreen environments—smartphones tablets e-books like developed published maintained google android open source project consultation open handset alliance android relieves smartphone manufacturers costs developing- licensing proprietary handset operating systems first unveiled 2007 android became world widely deployed smartphone platform q4 2010 september 2012 500 million android devices activated 1.3 million devices activated per day google nexus developer phones flagship brand android handsets features capabilities represent state art time launch typically every eleven months cases oems open use software fulfil requirements free software licenses gnu general public license gpl small number cases use masked either deliberately professed ignorance misunderstanding violators usually found public records may forced declare implementations advertising example embedded software engineers mandatory linux experience required careers pages yet site product documentation offers source download offer supply software source required license gpl organizations gpl-violations.org free software foundation fsf software freedom law center sflc organized pursuing violators obtaining compliance usually seek voluntary compliance first step enter legal proceedings blocked notified violations confirm asking supplier examining available product samples even going far make blind purchases product front companies | [
1066,
2538,
3256,
2182,
7528,
7532,
2559,
4317,
5744,
740,
2942,
7555,
6117,
4341,
7919,
5762,
412,
415,
3666,
2970,
7956,
5453,
5803,
5460,
7242,
1167,
1535,
1924,
6892,
1176,
1933,
5829,
1202,
136,
1208,
4435,
3734,
3404,
1973,
1227,
... | Test |
6,444 | 2 | ICade:icade icade accessory apple ipad line devices functions miniaturised portable arcade cabinet including physical joystick buttons ipad inserted icade connects device using bluetooth allowing used arcade-style controller compatible games icade input devices include 8-way ball-top joystick eight digital buttons placed inside icade ipad positioned vertically groove behind inputs accommodates landscape-mode play front device coin slot lights show icade powered flashes batteries running low power sourced either two aa batteries ac adapter also possible run ipad docking cable underside icade order charge ipad play internally icade essentially bluetooth keyboard—the joystick buttons simply mapped 24 different standard keys since ipad natively supports bluetooth keyboards able receive inputs icade without requirement special software beyond games designed respond inputs icade sends system also allows bluetooth input devices icontrolpad use protocol order control applications designed icade icade originally announced thinkgeek april 1 2010 april fools day prank however widely covered electronics media potential product thinkgeek responded speculation saying real icade possibility april fools icade stated connect via standard apple dock connector noted potential blocker release due licensing fees restrictions placed dock connections apple shortly revelation icade gag product thinkgeek contacted privately ion audio proposal develop concept thinkgeek ion staff worked tandem project able secure support atari rightsholders large catalogue arcade games thus working icade produced ion audio demonstrated running 1979 arcade title asteroids consumer electronics show january 2011 projected release late spring version replaced dock connection wireless bluetooth one sidestepping potential issues completed device released thinkgeek june 27 2011 ion audio provides document covers information necessary add icade support applications document also includes guidelines acceptance apple avoiding references icade name addition ios app developer stuart carnie manomio freely released unofficial sdk application authors use speed implementation icade controls outside ios development library made available adding icade support adobe flash games icade presents standard bluetooth hid keyboard numeric passcode must entered via buttons control stick pairing mapping used code entry quite straightforward readily apparent icade thus included reference put icade pairing mode hold bottom 4 buttons top white button 6 8 0 enter buttons simultaneously 4 seconds release official icade list http //www.ionaudio.com/products/icade-games reception icade mostly positive ars technica called attractive capable piece hardware exactly want ign referred icade surprisingly functional saying certain please target market toucharcade felt absolute must-have ipad accessory serious retro gamer engadget coverage accessory described well constructed awesome addition gaming collection feelings icade controls mixed positive ign described joystick buttons responsive however noted input configuration little cramped unbearably ars technica reviewer ben kuchera felt joystick little looser would prefer buttons require heavy finger push said controls held heavy hand toucharcade praised buttons finding exactly like 'd find old defender cabinet widest criticism device small library compatible software many early reviews drawing attention fact one icade-compatible title atari greatest hits available launch speaking positively hardware crunchreview felt limited software availability made device one trick pony ign opined 'd pretty passionate lunar lander centipede missile command fan feel disappointed n't play new 99 icade following icade atari taito released respective versions atari arcade invadercade atari arcade connects standard dock connector instead bluetooth atari arcade works atari ’ greatest hits app offers 99 games 10 although criticized flimsy controls taito space invader themed invadercade functions charger ipad plugged additionally invadercade built speakers dedicated volume knob function general media center itunes internet radio functionality compatible ipad ipad 2 invadercade similarly requires taito space invaders hd app run icade jr smaller version icade apps currently somewhat fully supported yet see ion compatibility list runs 50 via thinkgeek uses either iphone ipod touch | [
4575
] | Train |
6,445 | 9 | Forté_Software:forté software forté proprietary application server developed forté software used developing scalable highly available enterprise applications forté created integrated solution developing managing client/server applications forté 4gl consists application server tools deploying monitoring application object oriented proprietary programming language tool transactional object oriented language given tool runs forté application server many users simply refer tool applications forté applications product 3.5 million lines c/c++ software ported approximately twelve different operating system environments spanning range ibm mainframes microsoft windows pc first release forté 4gl published august 1994 releasing initial product forté inc. proceeded build several extensions including 1999 forté software came version forte based java instead tool named synerj also referred forté java original tool-based products consisted development ide code repository runtime environment new java product interest sun microsystems bought company tool-based listed bundled together re-branded unified development server uds integration server iplanet division server modules later bundled together enterprise application integration eai sun declared product end-of-life indicating future plans continue development product sun official support forte ceased end april 2009 enterprise application development system forté supported close linkage number different relational database systems including oracle sybase microsoft sql server informix db2 linkages could via sql embedded within tool code via sql constructed fly also support distributed applications developer would create instance specific class would placed user-specified server calls methods instance would sent across network transparently developer would need know underlying details call would transmitted tool object-oriented language following features among others tool code case-insensitive statement always terminated semicolon compound statements enclosed keywords codice_2 codice_3 comments indicated // -- remainder line becomes comment /* ... */ data types simple data types corresponding object data types examples arrays indicated keywords codice_4 first element array indexed 1 variable declaration conditional statements if-statement case-statement iteration loops events event posted e.g following statement statement posts event named codice_5 event one argument named id events handled event handlers example exception handling multithreading new thread launched statement like codice_6 | [
4798,
6462,
7715
] | Test |
6,446 | 5 | Discovery_and_Configuration_Protocol:discovery configuration protocol discovery basic configuration protocol dcp protocol definition within profinet context link layer based protocol configure station names ip addresses restricted one subnet mainly used small medium applications without installed dhcp server | [
7148,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
3640,
2219,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880
] | Test |
6,447 | 5 | RadioVIS:radiovis radiovis protocol sideband signalling images text messages broadcast audio service provide richer visual experience application sub-project radiodns allows radio consumption devices look ip-based service based parameters currently tuned broadcast station january 2015 functionality radiovis integrated visual slideshow etsi ts 101 499 v3.1.1 original rvis01 document deprecated protocol enables either streaming text oriented messaging protocol stomp comet deliver text image urls client images acquired http connection technology currently implemented number broadcasters across world including global radio bauer radio uk rté republic ireland südwestrundfunk germany number australian media groups amongst others number software clients exist show protocol well hardware devices pure sensia pure digital colourstream roberts radio | [
2822
] | Train |
6,448 | 4 | Marc_Stevens_(cryptology):marc stevens cryptology dr. ir marc stevens cryptology researcher known work cryptographic hash collisions creation chosen-prefix hash collision tool hashclash part master degree thesis first gained international notoriety work alexander sotirov jacob appelbaum arjen lenstra david molnar dag arne osvik benne de weger creating rogue ssl certificate presented 2008 25th annual chaos communication congress warning dangers using md5 hash function issuing ssl certificates several years later 2012 according microsoft authors flame malware used similar methodology researchers warned initiating md5 collision forge windows code-signing certificate marc recently awarded google security privacy anti-abuse applied award google selected stevens award recognition work cryptanalysis particular related sha-1 hash function february 2017 first known successful sha-1 collision attack practice termed shattered recognized marc stevens first-credited subsequent paper along cwi amsterdam colleague pierre karpman researchers elie bursztein ange albertini yarik markov alex petit bianco clement baisse google marc currently employed cryptology researcher centrum wiskunde informatica | [
643,
4867,
6795,
1243
] | Validation |
6,449 | 9 | Write_once,_compile_anywhere:write compile anywhere write compile anywhere woca philosophy taken compiler associated software libraries software library/software framework refers capability writing computer program compiled platforms without need modify source code opposed sun write run anywhere slogan cross-platform compatibility implemented source code level rather also compiled binary code level many languages follow woca philosophy c++ pascal see free pascal ada c condition n't use functions beyond provided standard library languages like go go even far system specific things used work system-specific elements system platform-specific files used computer program may also use cross-platform libraries provide abstraction layer hiding differences various platforms things like sockets gui ensuring portability written source code example supported qt lazarus ide via lcl corresponding widgetsets | [
1361,
4469,
3915,
1989,
993,
1435,
3955
] | Test |
6,450 | 6 | OFFSystem:offsystem owner-free file system system short peer-to-peer distributed file system shared files represented randomized multi-used data blocks instead anonymizing network data blocks anonymized therefore data garbage ever exchanged stored forwarding via intermediate nodes required claims created expressed intention cut gangrene-infested bits copyright industry development started within hacktivism group big hack 2003 hackers cheater512 captainmorgan aqlo whiteraven 2004 rudimentary version finished written php distributed two demo cds following spectralmorning re-implemented functionality 2004 c++ led current mainline client august 14 2006 captainmorgan posted letter closing addressed copyright industry associations america riaa mpaa stating created purpose ending problems consumer copyright infringement 2008 network consisted around 50 nodes april 11 2008 beta test held network size 100 nodes since spectralmorning stopped work late 2008 minor bug fix releases made mainline starting 2007 alternative compatible client developed called blocksnet written ruby well-maintained saw major improvements recent time development 2011 client offload fork mainline seemingly adds features reasons fork unclear another distantly related program monolith uses similar principle created features multi-use blocks networking system kind anonymous fully decentralized p2p file sharing program network contrast anonymous file sharing networks derive anonymity forwarding data blocks via intermediate network nodes derives anonymity anonymizing data files thus system refers brightnet contrast method operation private file sharing systems known darknets traditional forwarding anonymous p2p programs order store file local storage resp block cache choose tuple size formula_1 default 3 split source file formula_2 blocks formula_3 size 128 kib pad random data fit following finally store descriptor list block blocks list larger 128 kib insert blocks formula_11 block cache generate url referencing source file output user local url database retrieve obtain descriptor block blocks contained set size formula_1 following derives anonymity following anonymizes data blocks exchanged instead network forwarding via intermediate nodes required therefore method higher degree efficiency traditional forwarding-based anonymous p2p systems forwarding method requires data block uploaded downloaded several times reaches destination happens 5 15 times. according resulting formula formula_17 equivalent overhead 900 2900 overhead without optimizations 200 formula_2 source file size formula_19 inbound tunnel length formula_20 outbound tunnel length plus 1 hop outbound endpoint inbound gateway efficiency increased implementations | [
6025,
4759,
5571,
6428,
578,
3573
] | Test |
6,451 | 9 | Emios:emios emios acronym environmental memory interoperable open service mdd mde platform aims provide range services storing sharing information environmental research activities emios initiated c. faucher june 2006 based environmental memory concepts developed motive cnrs committee specifically franck guarnieri 2003 emios set eclipse plugins based emf distributed terms epl license current version 0.0.1 mainly contains geographic information standards manager gism gism first part emios implements iso 19100 series international standards iso tc211 faucher c. gourmelon f. lafaye j.y. rouan m. mise en place ’ une mémoire environnementale adaptée aux besoins ’ un observatoire du domaine cotier menir revue internationale de géomatique hermès/lavoisier vol 19/1 pp 7-26 2009 http //geo.e-revues.com/ faucher c. lafaye j.y. 2007 model-driven engineering implementing iso 19100 series international standards coastgis 07 8th international symposium gis computer mapping coastal zone management vol 2 p. 424-433 7-10 october santander spain emios web site | [] | Test |
6,452 | 8 | Acid3:acid3 acid3 test web test page web standards project checks web browser compliance elements various web standards particularly document object model dom javascript test successful results acid3 test display gradually increasing fraction counter series colored rectangles number subtests passed indicate percentage displayed screen percentage represent actual percentage conformance test really keep track subtests actually started 100 assumed moreover browser also render page exactly reference page rendered browser like text acid2 test text acid3 reference rendering bitmap order allow certain differences font rendering acid3 development april 2007 released 3 march 2008 main developer ian hickson google employee also wrote acid2 test acid2 focused primarily cascading style sheets css third acid test also focuses technologies used highly interactive websites characteristic web 2.0 ecmascript dom level 2 subtests also concern scalable vector graphics svg extensible markup language xml data uris includes several elements css2 recommendation later removed css2.1 reintroduced world wide web consortium w3c css3 working drafts made candidate recommendations yet april 2017 updated specifications diverged test latest versions google chrome mozilla firefox longer pass test written hickson acknowledges aspects test controversial written test longer reflects consensus web standards purports test especially comes issues affecting mobile browsers main part acid3 written ecmascript javascript consists 100 subtests six groups called buckets including four special subtests 0 97 98 99 compliance criteria require test run browser default settings final rendering must 100/100 score must pixel-identical reference rendering browsers designed personal computers animation smooth taking 33 ms subtest reference hardware equivalent top-of-the-line apple laptop well though slower performance slow device imply non-conformance pass test browser must also display generic favicon browser toolbar favicon image acid3 web server acid3 server asked codice_1 gives 404 response code image data body tests web browser correctly handles 404 error code fetching favicon treating failure displaying generic icon instead test running rectangles added rendered image number subtests passed bucket determine color rectangles note acid3 display exactly many subtests passed bucket example 3 subtests passing 4 subtests passing bucket 2 would render black rectangle acid3 test page completely rendered word acid3 clicked see alert shift-click new window explaining exactly subtests failed error message case one 100 tests passed took much time report includes timing results single test alert reports total time whole acid3 test order render test correctly user agents need implement css 3 text shadows css 2.x downloadable fonts specifications currently consideration w3c standardized required test uses custom truetype font called acidahemtest cover 20x20 red square supporting truetype fonts however required css specification browser supporting opentype fonts cff outlines embedded opentype fonts could support css standard fail test acid3 test glyph rendered downloaded font square made white css thus invisible addition test also uses base64 encoded images advanced selectors css 3 color values hsla well bogus selectors values ignored google employee ian hickson started working test april 2007 development progressed slowly december 2007 work restarted project received public attention january 10 2008 mentioned blogs anne van kesteren time project resided url clearly showing experimental nature nowiki http //www.hixie.ch/tests/evil/acid/003/not_ready_please_do_not_use.html /nowiki despite notice url test received widespread attention web-development community time 84 subtests done january 14 ian hickson announced competition fill missing 16 following developers contributed final test competition even official release acid3 impact browser development dramatic particular webkit score rose 60 87 less month test officially released march 3 2008 guide commentary expected follow within months march 2011 commentary released announcement test complete means considered stable enough actual use problems bugs found test modified fix march 26 2008—the day opera webkit teams announced 100/100 score—developers webkit contacted hickson critical bug acid3 presumably allowed violation svg 1.1 standard pass hickson fixed bug help cameron mccormack member w3c svg working group 2008 development versions presto webkit layout engines used opera safari respectively scored 100/100 test rendered test page correctly time browser using presto webkit layout engines passed performance aspect test google chrome opera mobiledisplayed score 100/100 security concerns downloadable fonts delayed chrome passing version 68 later chrome gets score 97/100 time acid3 release mozilla firefox developers preparing imminent release firefox 3 focusing stability acid3 success consequently firefox 3 score 71 firefox 3.5 scored 93/100 firefox 3.6 scored 94/100 initially firefox 4 scored 97/100 support svg fonts later firefox 4 scored 100/100 svg font tests removed acid3 according mozilla employee robert o'callahan firefox support svg fonts mozilla considered woff superior alternative svg fonts another mozilla engineer boris zbarsky claimed subset specification implemented webkit opera gives benefits web authors users woff asserted implementing svg fonts fully web browser hard designed integration html mind april 2 2010 ian hickson made minor changes test mozilla due privacy concerns altered way gecko handles codice_2 pseudo-class firefox 51.0a1 made regression 100 99 september 14 2016 firefox 55.0a1 regressed 97 may 1 2017 firefox quantum versions 63.0 received 97/100 64.0 got 96/100 microsoft said acid3 agree goal internet explorer 8 ie8 would improve standards tested acid3 ie8 scored 20/100 much worse relevant competitors time acid3 release problems rendering acid3 test page 18 november 2009 internet explorer team posted blog entry early development internet explorer 9 pdc presentation showing internal build browser could score 32/100 throughout 2010 several public developer previews improved internet explorer 9 test scores 55/100 16 march 95/100 4 august dean hachamovich general manager ie team argued striving 100/100 acid3 test neither necessary desirable claimed two acid3 failures related features svg fonts smil animation transition internet explorer 11 edge display score 100/100 early iterations test criticized cherry-picked collection features rarely used well still w3c working draft eric a. meyer notable web standards advocate wrote real point acid3 test n't broad-spectrum standards-support test showpiece something potemkin village shame really needed right exhaustive test suites specifications—xhtml css dom svg implementing enough standard pass test disingenuous nothing standards compliance argued mozilla ux lead alex limi article mythbusting firefox 4 wo n't score 100 acid3 limi argued tests particularly svg fonts relation real usage implementations browsers created solely point raising scores september 17 2011 ian hickson announced update acid3 hickson words håkon wium lie opera software commented parts test might get changed specs hoped change would allow specs change whatever way best web rather constraining changes things happened fit acid3 tested result firefox 4 internet explorer 9 achieved score 100/100 acid3 internet explorer n't render test properly support text-shadow internet explorer 10 parts following standards tested acid3 passing score considered valid browser default settings used following browser settings user actions may invalidate test | [
1152,
1616,
4565,
2812,
4655,
2451,
5542,
5984,
5283,
6172,
6802,
5821,
7628,
296,
5378,
1276,
6809,
5127,
393,
3291,
2574,
3383,
3548,
6292,
7015,
7749,
8006,
8009,
5598,
2327,
3043,
4352,
1496,
4725,
6221,
520,
3057,
5699,
1136,
348,
... | Validation |
6,453 | 2 | The_Linux_Schools_Project:linux schools project linux schools project formerly karoshi translated literally death overwork japanese operating system designed schools linux distribution based ubuntu operating system project maintains two custom distributions one designed use servers use server version client machines server distribution official karoshi client known karoshi client tlsp uses prepackaged gui scripts order simplify install configuration process inexperienced users tlsp originally developed using red hat early 2000s aim making linux adoption easier schools uk linux time considered difficult use educational environments computing expertise mainly came teachers dedicated staff version 5.1.x tlsp moved pclinuxos platform since adopted ubuntu place current production version tlsp 11.1 tlsp downloadable homepage installation steps require initial install ubuntu live cd prompts initiate following machine reboot installation ubuntu install tlsp system initiated automatically tlsp primarily aimed educational environments also suitable use small medium enterprise sme business environment included systems suitable use file print email web e-learning servers leveraging technologies possible administer complete network using integrated web tools using form remote desktop technology tlsp system scalable single multi server system comprising many features chief among ability act primary domain controller windows network tlsp uses built samba ldap servers store user group computer information emulates microsoft windows nt 4.0 server system using technologies providing computer user authentication along file print services local network tlsp creates standard windows domain local network names linuxgrid tlsp uses kixtart scripts set windows xp clients domain providing mandatory profiles users system roaming profiles used recommended due heavy network overhead involved using mandatory profiles folder redirection mapped file shares server allows every user store files documents folder tlsp includes moodle e-learning package several website content management systems including joomla website baker egroupware squirrelmail built system allowing full calendar email facilities installed standalone machine dmz section thus providing increased security systems directly exposed internet particularly interesting inclusion wpkg enables remote installation software windows clients using machine profile stored server possible install software packages hotfixes security updates background also helpful terms creating machine profiles allowing 'blank windows xp machine updated automatically particular wpkg profile machine added domain type technology compared group policy mechanism windows server 2003 particularly machine administration perspective means replacement group policy step right direction first version karoshi client based pclinuxos upgrades system whole led client using modified version ubuntu 10.04 lts gui similar microsoft windows interface interface designed fast run well older hardware june 2012 work started karoshi client version 2 would interface closer gnome 2 windows development client release given robin mccorkell student dover grammar school boys 21 july 2012 karoshi client 2 uploaded sourceforge.net karoshi client contains many applications deemed necessary school work media production software including music production image manipulation video editing software included along programming tools visualization software many ides installed default mainly set use java also supporting c/c++ programming languages c++ compiler standard libraries installed default along boost libraries ncurses mesa libraries opengl programming java development kit installed integrated installed ides xfce used desktop manager customized theme panel layout developer ported clearlooks gtk2 theme gtk3 gnome 3 applications like gedit would display correctly panel layout similar gnome 2 environment compositing effects enabled default environment interface settings locked xfce configuration files due need suitability school environment children may try play settings kde greeter lightdm used log screen due problems kdm ubiquity version karoshi client integrated server distribution previous client releases custom configuration files pulled primary domain controller boot server patch added correct files client released 23 july 2012 difficult integrate tlsp existing windows network without changing address space standard one used tlsp system limitation early versions longer applies kerberos support planned karoshi server client system providing single sign services provided karoshi distribution unfeasible samba 4 released due complexities surrounding integration user resolution file access across multiple operating systems support active directory protocols integration occurred already working client system authenticates using kerberos authenticates successfully moodle samba squid using kerberos credentials | [
5200,
4759,
1629,
3444,
7251,
474,
7075,
1941,
578,
314,
5232,
2758,
1663,
2864,
933,
6209,
6761,
2063,
343,
4824,
5523,
5259,
1893,
5530,
5704,
6317,
3751,
6586,
7587,
7954,
6244
] | Test |
6,454 | 6 | Panasas:panasas panasas data storage company creates network-attached storage technical computing environments founded 1999 garth gibson william courtright panasas computer data storage product company headquartered sunnyvale california panasas received seed funding mohr davidow ventures mdv others first panasas products shipped 2004 year victor m. perez became ceo faye pairman became ceo 2011 panasas developed extension managing parallel file access network file system later integrated parallel nfs pnfs part nfs version 4.1 specification published internet engineering task force rfc 5661 january 2010. pnfs described way nfs protocol process file requests multiple servers storage devices instead handling requests serially panasas supports directflow nfs parallel nfs server message block also known cifs data access protocols integrate existing local area networks panasas blade servers manage metadata serving data directflow nfs cifs clients using 10 gigabit ethernet panasas systems provide data storage management high-performance applications biosciences energy media entertainment manufacturing government research sectors activestor product line scale-out nas appliance integrates hybrid storage hardware hard drives solid state drives panfs parallel file system proprietary directflow data access protocol industry standard nfs cifs network protocols activestor ultra introduced november 2018 newest generation panasas activestor storage system features re-engineered portable file system delivers performance reliability suitably qualified industry standard storage hardware platforms activestor ultra four storage nodes node six hdd drive slots two ssd drive slots node supports six eight hdds zero two ssds activestor ultra deliver 6-7.5 gb/s per 4u enclosure depending configuration minimum configuration three activestor ultra enclosures total bandwidth performance expected 18-22 gb/s activestor ultra designed extreme performance extreme scalability configurations supports flexible networking options activestor ultra/panfs 8 solution aimed hpc shops well enterprises need kind performance parallel file systems afford enterprise customers especially approach intended give kind simplicity low tco demand activestor 20 activestor classic announced august 2016 increased capacity using larger faster disks november 2017 panasas released activestor director 100 activestor hybrid 100 activestor prime disaggregated director blade controller node panasas storage system storage nodes november 2018 panasas introduced activestor ultra featured completely re-engineered portable file system panfs® 8 running industry standard hardware panasas created panfs clustered file system single pool storage global filename space support multiple applications workflows single storage system panfs supports directflow pnfs nfs cifs data access protocols simultaneously panfs 7.0 added freebsd operating foundation gui supports asynchronous push notification system changes without user interaction november 2018 panasas introduced panfs 8 intelligent posix compliant parallel file system incorporates latest software innovations runs linux enable easy portability new industry standard hardware panfs 8 includes newly re-engineered storage node software stack use new activestor ultra family storage nodes panfs theoretically portable across much wider array hardware opening possibility hosting file system third-party storage platforms file system ’ portability also offers panasas flexibility use different hardware suppliers future versions activestor hardware – director storage modules advantage keeping costs potentially offering even options customers panfs 8 optimized match object access update patterns common mixed workloads directflow parallel data access protocol designed panasas activestor directflow avoids protocol i/o bottlenecks accessing panasas storage directly parallel directflow originally supported linux expanded april 2016 support apple macos | [
2763,
689,
1254,
1624,
1006,
4199,
578,
2601
] | Train |
6,455 | 7 | Proofpoint_Systems,_Inc.:proofpoint systems inc. proofpoint systems inc. provider software systems programs support individual organizational performance based silicon valley los altos california founded 2003 jim hill proofpoint systems developed first browser-based performance analysis software systems proofpoint systems research development facilities denver colorado well sales offices phoenix arizona washington d.c. proofpoint systems founded 2003 jim hill retired united states marine corps officer former sun microsystems executive year proofpoint secured contracts united states navy resulting international society performance improvement award 2005 patent proofpoint systems performance analysis support system pass filed april 5 2006 published october 25 2007 pass operates guiding user detailed consistent analysis process ... helping organizational leaders accurately diagnose critical performance productivity issues proofpoint first product comprehensive performance analysis support system compass later developed web-based organizational analysis system management consulting engagements 2006 compass finalist stevie awards category best new product service year proofpoint systems awarded united states navy contracts support strategic planning manpower training education proofpoint offers products services including strategic planning goal development web based diagnostics assessment | [
2961
] | Validation |
6,456 | 4 | Amazingports:amazingports amazingports linux-based software product customized use firewall captive portal billing system hotspots project started 2001 amazingports mainly deployed access control system private public networks deployed single hotspot controller airports hotels private locations hospitals used internet cafes europe 2002 together intel used city-wide wi-fi project 2004 internet roaming 2002 amazingports created 2001 initial vision building free networks later company refocused provided technology network builders company implemented service-oriented provisioning 2002 first implement 802.11a public hotspots europe 2009 2010 administrative system updated features include | [
1249,
3165,
2001,
4759,
806,
994,
3185,
4492,
4138,
385,
7536,
4951,
2746,
5571,
6107,
2119,
578,
3637,
8100,
7189,
3551,
1291,
7275,
7744,
4162,
6918,
3394,
6560,
4977,
7289,
7478,
7752,
3223,
4177,
4091,
2790,
6235,
6149,
6951,
7597,
... | Test |
6,457 | 7 | ORBexpress:orbexpress ois orbexpress commercial object request broker orb product objective interface systems ada c++ c java programming languages orbexpress features tools developing debugging distributed real-time applications | [
5055,
5650,
304,
578,
5571,
971,
900
] | Test |
6,458 | 5 | Network_Security_Services:network security services computing network security services nss comprises set libraries designed support cross-platform development security-enabled client server applications optional support hardware tls/ssl acceleration server side hardware smart cards client side nss provides complete open-source implementation cryptographic libraries supporting transport layer security tls secure sockets layer ssl s/mime previously tri-licensed mozilla public license 1.1 gnu general public license gnu lesser general public license nss upgraded gpl-compatible mpl 2.0 release 3.14 nss originated libraries developed netscape invented ssl security protocol nss software crypto module validated five times 1997 1999 2002 2007 2010 conformance fips 140 security levels 1 2 nss first open source cryptographic library receive fips 140 validation nss libraries passed niscc tls/ssl s/mime test suites 1.6 million test cases invalid input data aol red hat sun microsystems/oracle corporation google companies individual contributors co-developed nss mozilla provides source code repository bug tracking system infrastructure mailing lists discussion groups others named use nss variety products including following nss includes framework developers oems contribute patches assembly code optimize performance platforms mozilla certified nss 3.x 18 platforms nss makes use netscape portable runtime nspr platform-neutral open-source api system functions designed facilitate cross-platform development like nss nspr used heavily multiple products addition libraries apis nss provides security tools required debugging diagnostics certificate key management cryptography-module management development tasks nss comes extensive growing set documentation including introductory material api references codice_1 pages command-line tools sample code programmers utilize nss source shared dynamic libraries every nss release backward-compatible previous releases allowing nss users upgrade new nss shared libraries without recompiling relinking applications nss supports range security standards including following nss supports pkcs 11 interface access cryptographic hardware like tls/ssl accelerators hsm-s smart cards since hardware vendors safenet inc. aep thales also support interface nss-enabled applications work high-speed crypto hardware use private keys residing various smart cards vendors provide necessary middleware nss version 3.13 support advanced encryption standard new instructions aes-ni network security services java jss consists java interface nss supports security standards encryption technologies supported nss jss also provides pure java interface asn.1 types ber/der encoding mozilla cvs tree makes source code java interface nss available | [
363,
6795,
6802,
1460,
5399,
2587,
7567,
7925,
4352,
5773,
7214,
6487,
7587,
5440,
4014,
1513,
2620,
445,
1152,
794,
4755,
3350,
5808,
1168,
1173,
7975,
2644,
7258,
5824,
1190,
6540,
5488,
1559,
6553,
4071,
5506,
2691,
6582,
6586,
1989,
... | Test |
6,459 | 4 | Zemra:zemra zemra ddos bot first discovered underground forums may 2012 zemra capable http syn flood flooding also simple command control panel protected 256-bit des encryption communicating command control c c server zemra also sends information computer name language settings windows version send data remote location specific date time also opens backdoor tcp port 7710 receive commands remote command-and-control server able monitor devices collect system information execute files even update uninstall necessary | [
6643,
1412,
624,
3171,
1691,
1372,
1612
] | Test |
6,460 | 4 | RISKS_Digest:risks digest risks digest forum risks public computers related systems online periodical published since 1985 committee computers public policy association computing machinery editor peter g. neumann moderated forum concerned security safety computers software technological systems security risk taken broadly risks concerned merely so-called security holes software unintended consequences hazards stemming design lack thereof automated systems recurring subjects include cryptography effects technically ill-considered public policies risks also publishes announcements calls papers various technical conferences technical book reviews usually rob slade though occasionally others although risks forum computer science association contributions readable informative anyone interest subject heavily read system administrators computer security managers well computer scientists engineers risks digest published frequent irregular schedule moderated usenet newsgroup comp.risks exists solely carry digest summaries forum appear columns edited neumann acm sigsoft software engineering notes sen communications acm cacm | [
4404,
7234,
2379,
5688,
1805
] | Validation |
6,461 | 3 | Single_point_of_failure:single point failure single point failure spof part system fails stop entire system working spofs undesirable system goal high availability reliability business practice software application industrial system systems made robust adding redundancy potential spofs instance owner small tree care company may one woodchipper chipper breaks may unable complete current job may cancel future jobs obtain replacement redundancy achieved various levels instance owner tree care company may spare parts ready repair wood chipper case fails higher level may second wood chipper bring job site finally highest level may enough equipment available completely replace everything work site case multiple failures assessment potential spof involves identifying critical components complex system would provoke total systems failure case malfunction highly reliable systems rely individual component computing redundancy achieved internal component level system level multiple machines site level replication one would normally deploy load balancer ensure high availability server cluster system level high-availability server cluster individual server may attain internal component redundancy multiple power supplies hard drives components system level redundancy could obtained spare servers waiting take work another server fails since data center often support center operations business logic represents potential spof thus site level entire cluster may replicated another location accessed case primary location becomes unavailable typically addressed part disaster recovery resiliency program paul baran donald davies developed packet switching key part survivable communications networks networks including arpanet internet designed single point failure multiple paths two points network allow points continue communicating packets routing around damage even single failure one particular path one intermediate node network protocols used prevent spof software engineering bottleneck occurs capacity application computer system severely limited single component bottleneck lowest throughput parts transaction path tracking bottlenecks sometimes known hot spots sections code execute frequently i.e highest execution count called performance analysis reduction usually achieved help specialized tools known performance analyzers profilers objective make particular sections code perform fast possible improve overall algorithmic efficiency mistake one component compromise entire system concept single point failure also applied fields outside engineering computers networking corporate supply chain management transportation management design structures create single points failure include bottlenecks series circuits contrast parallel circuits transportation noted recent examples concept recent application included nipigon river bridge canada partial bridge failure january 2016 entirely severed road traffic eastern canada western canada several days located along portion trans-canada highway alternate detour route vehicles take norwalk river railroad bridge norwalk connecticut aging swing bridge sometimes gets stuck opening closing disrupting rail traffic northeast corridor line concept single point failure also applied fields intelligence edward snowden talked dangers described single point failure – sole repository information | [
4568,
5717,
4926,
1624,
3438,
5813,
1543,
6179,
5735,
2650,
5738,
2112,
3542,
1484,
5409,
6748,
7924,
3396,
4814,
2691,
5440,
4199,
2536
] | Test |
6,462 | 1 | Relational_database:relational database relational database digital database based relational model data proposed e. f. codd 1970 software system used maintain relational databases relational database management system rdbms many relational database systems option using standard sql structured query language querying maintaining database term relational database invented e. f. codd ibm 1970 codd introduced term research paper relational model data large shared data banks paper later papers defined meant relational one well-known definition constitutes relational database system composed codd 12 rules however commercial implementations relational model conform codd rules term gradually come describe broader class database systems minimum 1974 ibm began developing system r research project develop prototype rdbms however first commercially available rdbms oracle released 1979 relational software oracle corporation examples rdbms include db2 sap sybase ase informix 1984 first rdbms macintosh began developed code-named silver surfer later released 1987 4th dimension known today 4d first systems relatively faithful implementations relational model first system sold rdbms multics relational data store 1978 ingres ibm bs12 followed common definition rdbms product presents view data collection rows columns even based strictly upon relational theory definition rdbms products typically implement codd 12 rules second school thought argues database implement codd rules current understanding relational model expressed christopher j date hugh darwen others relational view shared many theorists strict adherents codd principles would disqualify dbmss relational clarification often refer rdbmss truly-relational database management systems trdbms naming others pseudo-relational database management systems prdbms 2009 commercial relational dbmss employ sql query language alternative query languages proposed implemented notably pre-1996 implementation ingres quel model organizes data one tables relations columns rows unique key identifying row rows also called records tuples columns also called attributes generally table/relation represents one entity type customer product rows represent instances type entity lee chair columns representing values attributed instance address price row table unique key rows table linked rows tables adding column unique key linked row columns known foreign keys codd showed data relationships arbitrary complexity represented simple set concepts part processing involves consistently able select modify one one row table therefore physical implementations unique primary key pk row table new row written table new unique value primary key generated key system uses primarily accessing table system performance optimized pks natural keys may also identified defined alternate keys ak often several columns needed form ak one reason single integer column usually made pk pks aks ability uniquely identify row within table additional technology may applied ensure unique id across world globally unique identifier broader system requirements primary keys within database used define relationships among tables pk migrates another table becomes foreign key table cell contain one value pk migrates regular entity table design pattern represent either one-to-one one-to-many relationship relational database designs resolve many-to-many relationships creating additional table contains pks entity tables—the relationship becomes entity resolution table named appropriately two fks combined form pk migration pks tables second major reason system-assigned integers used normally pks usually neither efficiency clarity migrating bunch types columns relationships logical connection different tables established basis interaction among tables order database management system dbms operate efficiently accurately must use acid transactions programming within rdbms accomplished using stored procedures sps often procedures used greatly reduce amount information transferred within outside system increased security system design may grant access stored procedures directly tables fundamental stored procedures contain logic needed insert new update existing data complex procedures may written implement additional rules logic related processing selecting data relational database first defined june 1970 edgar codd ibm san jose research laboratory codd view qualifies rdbms summarized codd 12 rules relational database become predominant type database models besides relational model include hierarchical database model network model table summarizes important relational database terms corresponding sql term relation defined set tuples attributes tuple usually represents object information object objects typically physical objects concepts relation usually described table organized rows columns data referenced attribute domain conform constraints relational model specifies tuples relation specific order tuples turn impose order attributes applications access data specifying queries use operations select identify tuples project identify attributes join combine relations relations modified using insert delete update operators new tuples supply explicit values derived query similarly queries identify tuples updating deleting tuples definition unique tuple contains candidate primary key obviously unique however primary key need defined row record tuple definition tuple requires unique require primary key defined tuple unique attributes definition constitute superkey relational database data stored accessed via relations relations store data called base relations implementations called tables relations store data computed applying relational operations relations relations sometimes called derived relations implementations called views queries derived relations convenient act single relation even though may grab information several relations also derived relations used abstraction layer domain describes set possible values given attribute considered constraint value attribute mathematically attaching domain attribute means value attribute must element specified set character string abc instance integer domain integer value 123 another example domain describes possible values field coinface heads tails field coinface accept input values like 0,1 h constraints make possible restrict domain attribute instance constraint restrict given integer attribute values 1 10 constraints provide one method implementing business rules database support subsequent data use within application layer sql implements constraint functionality form check constraints constraints restrict data stored relations usually defined using expressions result boolean value indicating whether data satisfies constraint constraints apply single attributes tuple restricting combinations attributes entire relation since every attribute associated domain constraints domain constraints two principal rules relational model known entity integrity referential integrity primary key uniquely specifies tuple within table order attribute good primary key must repeat natural attributes attributes used describe data entered sometimes good primary keys surrogate keys often used instead surrogate key artificial attribute assigned object uniquely identifies instance table information students school might assigned student id order differentiate surrogate key intrinsic inherent meaning rather useful ability uniquely identify tuple another common occurrence especially regard n cardinality composite key composite key key made two attributes within table together uniquely identify record example database relating students teachers classes classes could uniquely identified composite key room number time slot since class could exactly combination attributes fact use composite key form data verification albeit weak one foreign key field relational table matches primary key column another table relates two keys foreign keys need unique values referencing relation foreign key used cross-reference tables effectively uses values attributes referenced relation restrict domain one attributes referencing relation concept described formally tuples referencing relation projected referencing attributes must exist tuple referenced relation projected attributes values referencing attributes match corresponding values referenced attributes stored procedure executable code associated generally stored database stored procedures usually collect customize common operations like inserting tuple relation gathering statistical information usage patterns encapsulating complex business logic calculations frequently used application programming interface api security simplicity implementations stored procedures sql rdbms often allow developers take advantage procedural extensions often vendor-specific standard declarative sql syntax stored procedures part relational database model commercial implementations include index one way providing quicker access data indexes created combination attributes relation queries filter using attributes find matching tuples randomly using index without check tuple turn analogous using index book go directly page information looking found read entire book find looking relational databases typically supply multiple indexing techniques optimal combination data distribution relation size typical access pattern indices usually implemented via b+ trees r-trees bitmaps indices usually considered part database considered implementation detail though indices usually maintained group maintains parts database use efficient indexes primary foreign keys dramatically improve query performance b-tree indexes result query times proportional log n n number rows table hash indexes result constant time queries size dependency long relevant part index fits memory queries made relational database derived relvars database expressed relational calculus relational algebra original relational algebra codd introduced eight relational operators two groups four operators first four operators based traditional mathematical set operations remaining operators proposed codd involve special operations specific relational databases operators introduced proposed since codd introduction original eight including relational comparison operators extensions offer support nesting hierarchical data among others normalization first proposed codd integral part relational model encompasses set procedures designed eliminate non-simple domains non-atomic values redundancy duplication data turn prevents data manipulation anomalies loss data integrity common forms normalization applied databases called normal forms connolly begg define database management system dbms software system enables users define create maintain control access database rdbms extension acronym sometimes used underlying database relational alternative definition relational database management system database management system dbms based relational model databases widespread use today based model rdbmss common option storage information databases used financial records manufacturing logistical information personnel data applications since 1980s relational databases often replaced legacy hierarchical databases network databases rdbms easier implement administer nonetheless relational databases received continued unsuccessful challenges object database management systems 1980s 1990s introduced attempt address so-called object-relational impedance mismatch relational databases object-oriented application programs well xml database management systems 1990s however due expanse technologies horizontal scaling computer clusters nosql databases recently become popular alternative rdbms databases distributed relational database architecture drda designed workgroup within ibm period 1988 1994 drda enables network connected relational databases cooperate fulfill sql requests messages protocols structural components drda defined distributed data management architecture according db-engines july 2019 widely used systems oracle mysql free software microsoft sql server postgresql free software ibm db2 microsoft access sqlite free software mariadb free software according research company gartner 2011 five leading proprietary software relational database vendors revenue oracle 48.8 ibm 20.2 microsoft 17.0 sap including sybase 4.6 teradata 3.7 | [
3928,
3255,
3257,
1449,
5024,
3951,
5728,
3621,
6430,
2924,
6445,
4697,
6817,
7182,
1105,
2937,
3975,
6821,
7915,
1112,
1860,
1861,
6128,
7205,
5419,
7580,
5778,
1132,
7213,
6144,
1891,
5784,
6855,
4743,
784,
2265,
4747,
7958,
7248,
811,
... | Test |
6,463 | 4 | List_of_rogue_security_software:list rogue security software following partial list rogue security software grouped families functionally identical versions program repackaged successive new products vendor | [
157,
2364,
5727,
7371
] | Test |
6,464 | 9 | Literal_pool:literal pool computer science specifically compiler assembler design literal pool lookup table used hold literals assembly execution multiple local literal pools typically used computer architectures lack branch instructions long jumps set instructions optimized shorter jumps examples architectures include arm architecture ibm system/360 later architectures number instructions took 12-bit address offsets case compiler would create literal table every 4k page branches whose target less 4k bytes away could taken immediately longer branches required address lookup via literal table entries literal pool placed object relocation table assembly resolved link edit time certain ways literal pool resembles toc global offset table got except implementation considerably simpler may multiple literal tables per object perhaps common type literal pool literal pools used codice_1 pseudo-instruction arm assembly language similar instructions ibm system/360 assembly language compiled load pc-relative addressing mode constant stored literal pool often particular constant value used multiple times program many linkers default store unique constant single combined literal pool improves code size java virtual machine string literal pool class constant pool | [
1361,
5606,
4662,
6922,
7331,
336
] | Test |
6,465 | 2 | Nokia_E61:nokia e61 nokia e61 smartphone eseries range s60 3rd edition device targeting business users european market announced part new eseries business line 12 october 2005 along nokia e60 e70 q4 2006 cingular rogers wireless deployed similar yet restricted version designated nokia e62 north american brazilian markets e62 substantially similar without 802.11 wifi chipset w-cdma umts 3g support e61 supports 900/1800/1900 bands e62 operate 850/900/1800/1900 order support american networks 12 february 2007 nokia announced e61i follow product nokia e61i smartphone eseries range s60v3 device targeting business users european market update nokia e61 released 2006 product announced 12 february 2007 3gsm world congress main differences e61 include | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
7170,
1544,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
7545,
5044,
6908,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
5062,
3039,
3653,
1582,
489... | Validation |
6,466 | 9 | Adriaan_van_Wijngaarden:adriaan van wijngaarden adriaan aad van wijngaarden 2 november 1916 – 7 february 1987 dutch mathematician computer scientist considered many founding father informatica computer science netherlands even though trained engineer van wijngaarden would emphasize promote mathematical aspects computing first numerical analysis programming languages finally design principles programming languages education mechanical engineering received degree delft university technology 1939 studied doctorate hydrodynamics abandoned area joined nationaal luchtvaartlaboratorium 1945 went group england following year learn new technologies developed world war ii van wijngaarden intrigued new idea automatic computing 1 january 1947 became head computing department brand-new mathematisch centrum mc amsterdam made visits england united states gathering ideas construction first dutch computer arra electromechanical construction first demonstrated 1952 year van wijngaarden hired edsger dijkstra worked software arra visiting edinburgh 1958 van wijngaarden seriously injured automobile accident wife killed recovered focused programming language research one designers original algol later algol 68 developed two-level type grammar became known van wijngaarden grammars became director mc 1961 remained post next twenty years 1959 became member royal netherlands academy arts sciences awarded every 5 years 60th anniversary centrum wiskunde informatica 2006 consists bronze sculpture | [
1157,
1114,
4651,
4512,
1243,
1408
] | Test |
6,467 | 9 | Brad_Cox:brad cox brad cox computer scientist known mostly creating objective-c programming language business partner tom love work software engineering specifically software reuse software componentry cox received bachelor science degree organic chemistry mathematics furman university ph.d. department mathematical biology university chicago among first known software projects wrote pdp-8 program simulating clusters neurons worked national institutes health woods hole oceanographic institute moving software profession although cox invented programming language objective-c used early career stated interview masterminds programming book n't interested programming languages rather software components regards languages mere tools building combining parts software cox also entrepreneur founded stepstone company together tom love releasing first objective-c implementation later next acquired objective-c stepstone objective-c continued primary programming language writing software apple os x ios | [
2638,
5450
] | Test |
6,468 | 5 | Acoustic_telegraphy:acoustic telegraphy acoustic telegraphy also known harmonic telegraphy name various methods multiplexing transmitting one telegraph messages simultaneously single telegraph wire using different audio frequencies channels message telegrapher used conventional morse key tap message morse code key pulses transmitted pulses specific audio frequency receiving end device tuned frequency resonated pulses others wire inventors worked acoustic telegraph included charles bourseul thomas edison elisha gray alexander graham bell efforts develop acoustic telegraphy order reduce cost telegraph service led invention telephone thomas edison devices used multiple synchronized tuning forks tuned selected audio frequencies opened closed electrical circuits selected audio frequencies acoustic telegraphy similar concept present-day fdma frequency division multiple access used radio frequencies word acoustic comes greek akoustikos meaning hearing hearing sound waves air acoustic telegraphy devices electromechanical made musical buzzing humming sound waves air feet primary function devices generate sound waves rather generate alternating electrical currents selected audio frequencies wires transmitted telegraphic messages electrically long distances five edison patents assigned western union telegraph company new york | [
1443,
5387,
1375,
1988,
2117,
84,
740
] | Test |
6,469 | 7 | CloudBees:cloudbees cloudbees provider continuous delivery software services initially cloudbees provided platform service paas build run manage web applications cloudbees supported entire application life-cycle development deployment sacha labourey founded company early 2010 investors include matrix partners lightspeed venture partners verizon ventures cloudbees headquartered san jose ca additional offices lewes de richmond va brussels belgium seville spain neuchâtel switzerland sacha labourey founder ceo cloudbees labourey created company provide developers cloud platform made development java applications faster easier starting cloudbees labourey led jboss europe ultimately becoming chief technology officer remaining role red hat acquisition jboss june 2006 left red hat 2009 founded cloudbees one year later several management core developers coming jboss cloudbees expertise middleware proponent open source september 2014 cloudbees stopped offering runtime paas services order focus solely jenkins tool continuous delivery on-premises cloud kohsuke kawaguchi lead developer founder jenkins project well company cto several jenkins core committers also employed cloudbees 2016 company expanded services releasing private software service saas version continuous delivery platform 2016 cloudbees formed alliance github ca technologies others software development delivery february 2018 cloudbees acquired codeship provider continuous integration continuous delivery ci/cd cloud-based service move company said gives broader portfolio ci/cd solutions organizations sizes support several ci/cd philosophies approaches since 2010 cloudbees raised total 100 million venture financing cloudbees funding cloudbees products enable organizations build test deploy applications production utilizing continuous delivery practices continuous delivery important companies transitioning devops environment cloudbees product family includes enterprise version jenkins cloudbees provides commercial support additional plugins open source jenkins cloudbees jenkins platform includes cloudbees jenkins operations center provides central way manage jenkins across organization masters plugin versions easily maintained resources shared jenkins teams teams use cloudbees jenkins platform version jenkins development deploy popular runtime paas offerings pivotal cf google app engine amazon elastic beanstalk release cloudbees jenkins platform — private saas edition provides enterprises self-service access teams across entire organization software gives enterprises ability access cloudbees jenkins platform private cloud dedicated amazon web services cloudbees clients include range enterprises fortune 500 companies | [
5666,
1982,
5064,
7848
] | Test |
6,470 | 2 | Douglas_McIlroy:douglas mcilroy malcolm douglas mcilroy born 1932 mathematician engineer programmer 2007 adjunct professor computer science dartmouth college mcilroy best known originally developed unix pipelines software componentry several unix tools spell diff sort join graph speak tr seminal work software componentization makes pioneer component-based software engineering software product line engineering mcilroy earned bachelor degree engineering physics cornell university 1954 ph.d. applied mathematics mit 1959 thesis solution differential equations conical shells taught mit 1954 1958 mcilroy joined bell laboratories 1958 1965 1986 head computing techniques research department birthplace unix operating system thereafter distinguished member technical staff 1967 1968 mcilroy also served visiting lecturer oxford university 1990s mcilroy worked improving sorting techniques particularly co-authored optimized quicksort algorithm jon bentley 1997 mcilroy retired bell labs took position adjunct professor dartmouth college computer science department mcilroy member national academy engineering usenix lifetime achievement award flame software tools award previously served association computing machinery national lecturer turing award chairman member publications planning committee associate editor communications acm journal acm acm transactions programming languages systems also served executive committee csnet mcilroy attributed quote real hero programming one writes negative code meaning negative code taken similar famous apple developer team anecdote i.e. change program source makes number lines code decrease 'negative code overall quality readability speed improves | [
3166,
6789,
7710,
1537,
6620,
3106,
5931,
217,
578,
5932,
6017,
2220,
6642,
1389,
6648,
5503,
4626,
335,
6046,
4447,
6577,
5784,
5878,
1426,
1243,
1435
] | Test |
6,471 | 9 | X3J13:x3j13 x3j13 name technical committee part international committee information technology standards incits named x3 x3j13 committee formed 1986 draw american national standards institute ansi common lisp standard based first edition book common lisp language also termed cltl cltl1 guy l. steele jr. formerly de facto standard language primary output x3j13 american national standard programming language common lisp x3.226/1994 approved december 8 1994 x3j13 later worked international organization standardization iso working group sc22/wg16 internationally standardised dialect lisp named islisp original chair committee doctor robert mathis ohio state university mary van deusen secretary guy l. steele jr. originally vice-chair later years mathis stepped chair steele assumed role efforts committee guided charter successful creation credited coordinating efforts susan p. ennis representative amoco production company charter lays committee goals priorities broadly defined list topics addressed committee formed several subcommittees help members better concentrate efforts cleanup subcommittee chaired larry masinter established standardised format submission proposals voting issue writeups part standard deemed sufficiently useful common lisp hyperspec include cross-reference benefit readers providing information original intent committee decisions writeups also serve historical record alternate solutions problems ultimately adopted chaired sandra loosemore subcommittee created proposals issues relating lisp compiling guy steele acknowledged second edition common lisp language large contribution compiler subcommittee toward clarifying compiling process described first edition parts steele describes vague jon l. white chair iteration subcommittee among issues dealt group generalized codice_1 macro – domain-specific language second edition cltl devotes full chapter algol-like syntax macro differing lisp usual s-expression syntax remains somewhat controversial character subcommittee chaired thom linden task defining standard would deal issues surrounding different character sets resolution matters particularly ability use character name symbol intended make common lisp simpler international users chaired kent pitman error handling subcommittee plugged described biggest outstanding hole common lisp condition system general mechanism handling errors warnings exceptional situations committee referred resulting specification condition system rather error system accommodate one system handling exceptional situations various kinds whether fatal non-fatal whether continuable whether result program error simple resource limit stack overflow conditions signaled one point code may handled another point use term signal different typical operating system notion signals except lisp machines variant use term evolved operating system notion signaling scope committee consequently addressed ansi common lisp standard asynchronous interrupts ieee floating point trapping also scope committee work addressed standard kathy chapman chair drafting subcommittee responsible drafting actual standard document subcommittee oversaw efforts keep terminology consistent accurate throughout committee activities final standard produced x3j13 committee published american national standard x3.226 also hypertext form common lisp hyperspec book common lisp language although authored mostly guy l. steele jr. product ad hoc committee formed around 1980 worked collaboratively produce original de facto standard common lisp formation x3j13 x3j13 began work common lisp language base document proceeded design would become ansi common lisp steele served committee gave permission use parts first edition efforts documents published x3j13 later used together quotations certain committee members production common lisp language second edition released 1990 giving common lisp community way preview many features expected appear committee final standard document edition bears similarity standard content though form however substantive changes made form additions deletions publication book final draft ansi standard sum original edition common lisp language document x3j13 originally based work second edition contrast steele work committee product official status within x3j13 ansi acknowledged second edition preface authorized x3j13 choice content snapshot work progress formally synchronized x3j13 final version reviewed approved x3j13 | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
4332,
2218,
4704,
5757,
6116,
1116,
7573,
2600,
5077,
1885,
2249,
1889,
1890,
795,
6876,
6882,
6888,
3370,
1557,
6191,
5494,
5501,
6210,
144,
4074,
4085,
7298,
5515,
8025,
3749,
6949,
... | Validation |
6,472 | 2 | Working_set:working set working set concept computer science defines amount memory process requires given time interval peter denning 1968 defines “ working set information formula_1 process time formula_2 collection information referenced process process time interval formula_3 ” typically units information question considered memory pages suggested approximation set pages process access future say next formula_4 time units specifically suggested indication pages ought kept main memory allow progress made execution process effect choice pages kept main memory distinct paged auxiliary storage important many pages process kept main memory fewer processes ready one time pages process kept main memory page fault frequency greatly increased number active non-suspended processes currently executing system approaches zero working set model states process ram pages currently using often approximated recently used pages ram model nothing model meaning pages needs use increases room ram process swapped memory free memory processes use often heavily loaded computer many processes queued processes allowed run one scheduling time slice would refer pages ram causing computer thrash swapping processes memory result processes—even processes temporarily removed memory—finish much sooner would computer attempted run processes also finish much sooner would computer ran one process time completion since allows processes run make progress times one process waiting hard drive global resource words working set strategy prevents thrashing keeping degree multiprogramming high possible thus optimizes cpu utilization throughput main hurdle implementing working set model keeping track working set working set window moving window memory reference new reference appears one end oldest reference drops end page working set referenced working set window avoid overhead keeping list last k referenced pages working set often implemented keeping track time last reference considering working set pages referenced within certain period time working set n't page replacement algorithm page-replacement algorithms designed remove pages n't working set particular process one example modified version clock algorithm called wsclock working set divided code working set data working set distinction important code data separate relevant level memory hierarchy either working set fit level hierarchy thrashing occur addition code data systems virtual memory memory map virtual memory physical memory entries pages working set must cached translation lookaside buffer tlb process progress efficiently distinction exists code data cached small blocks cache lines entire pages address lookup done page level thus even code data working sets fit cache working sets split across many pages virtual address working set may fit tlb causing tlb thrashing analogs working set exist limited resources significantly processes set processes requires frequent interaction multiple processes must coscheduled order progress processes scheduled simultaneously – example two processes one core execute – processes advance rate one interaction per time slice resources include file handles network sockets – example copying one file another simply done two file handles one input one output thus file handle working set size two one file handle available copying still done requires acquiring file handle input reading say buffer releasing acquiring file handle output writing releasing acquiring input file handle repeating similarly server may require many sockets limited would need repeatedly release re-acquire sockets rather thrashing resources typically required program acquire enough resources simply fails | [
705,
2633,
8066,
2736,
5134,
7554,
2315,
1575,
1670,
7924,
56,
4631,
6849,
5082,
3236,
4915
] | Test |
6,473 | 7 | GridRPC:gridrpc gridrpc remote procedure call grid paradigm proposed gridrpc working group open grid forum ogf api defined order clients access remote servers simply function call used among numerous grid middleware simplicity implementation standardized ogf 2007 interoperability reasons different existing middleware api followed document describing good use behavior different gridrpc api implementations works conducted gridrpc data management standardized 2011 scope standard offer recommendations implementation middleware deals following topics among existing middleware application programming approaches one simple powerful flexible approach consists using servers available different administrative domains classical client-server remote procedure call rpc paradigm network enabled servers nes implement model also called gridrpc clients submit computation requests resource broker whose goal find server available grid scheduling frequently applied balance work among servers list available servers sent back client client able send data request one suggested servers solve problem thanks growth network bandwidth reduction network latency small computation requests sent servers available grid make effective use today scalable resource platforms important ensure scalability middleware layers well service-oriented approach new several research projects targeted paradigm past main middleware implementing api diet netsolve/gridsolve ninf environments use like saga interface ogf without standardized api calls like ommirpc xtremweb rpc model internet also used several applications transparently internet large optimization problems solved using different approaches simply filling web page remote image processing computations use mathematical libraries studies heuristics resolution methods sparse linear algebra like gridtlse approach providing computation services internet also highly close service oriented computing soa paradigm core cloud computing one simple yet effective mean execute jobs computing grid use gridrpc middleware relies gridrpc paradigm request gridrpc middleware manages management submission input output data execution job remote resource etc make available service programmer must implement two codes client data defined run user requesting service server contains implementation service executed remote resource one step ease development codes conducted define gridrpc api proposed draft november 2002 open grid forum ogf standard since september 2007 thus gridrpc source code involve specific middleware data compiled executed gridrpc compliant middleware due difference choice implementation gridrpc api document describing interoperability gridrpc middleware also written main goals describe difference behaviour gridrpc middleware propose common test gridrpc middleware must pass discussions undertaken data management within gridrpc middleware draft api proposed ogf'21 october 2007 motivation document provide explicit functions manipulate data exchange gridrpc platform client since 1 size data used grid applications may large useless data transfers must avoided 2 data always stored client side may made available either storage resource within gridrpc platform hence side effect fully gridrpc-compliant code written compiled gridrpc middleware implementing gridrpc data management api gridrpc model pictured following figure communications handled 1 servers register services registry 2 client needs execution service contacts registry 3 registry returns handle client 4 client uses handle invoke service server 5 eventually receives back results mechanisms involved api must provide means make synchronous and/or asynchronous calls service latter clients must also able wait blocking non-blocking manner completion given service naturally involves data structures conducts rigorous definition functions api gridrpc data types three main data types needed implement api 1 grpc_function_handle_t type variables representing remote function bound given server allocated client variable used launch service many times desired explicitly invalidated user needed anymore 2 grpc_session_t type variables used identify specific non-blocking gridrpc call variable mandatory obtain information status job order client wait cancel know error status call 3 grpc_error_t groups kind errors returns status codes involved gridrpc api gridrpc functions grpc_initialize grpc_finalize functions similar mpi initialize finalize calls mandatory gridrpc call performed two calls read configuration files make gridrpc environment ready finish order initialize destruct function handle grpc_function_handle_init grpc_function_handle_destruct functions called function handle dynamically associated server resource discovery mechanisms example call grpc_function_handle_default let postpone server selection actual call made handle grpc_get_handle let client retrieve function handle corresponding session id e.g. non-blocking call previously performed depending type call blocking non-blocking client use grpc_call grpc_call_async function latter client possesses call session id used respectively probe wait completion cancel call check error status non-blocking call issuing unique numerous non-blocking calls client use grpc_probe know execution service completed grpc_probe_or know one previous non-blocking calls completed grpc_cancel cancel call grpc_wait block completion requested service grpc_wait_and block services corresponding session ids used parameters finished grpc_wait_or block service corresponding session ids used parameters finished grpc_wait_all block non-blocking calls completed grpc_wait_any wait previously issued non-blocking request completed talk lib +link code must compile give basic example | [
2961,
4159,
4905,
5666,
6068,
5539
] | Validation |
6,474 | 3 | POWER5:power5 power5 microprocessor developed fabricated ibm improved version power4 principal improvements support simultaneous multithreading smt on-die memory controller power5 dual-core microprocessor core supporting one physical thread two logical threads total two physical threads four logical threads technical details microprocessor first presented 2003 hot chips conference complete description given microprocessor forum 2003 14 october 2003 power5 sold openly used exclusively ibm partners systems using microprocessor introduced 2004 power5 competed high-end enterprise server market mostly intel itanium 2 lesser extent sun microsystems ultrasparc iv fujitsu sparc64 v. superseded 2005 improved iteration power5+ power5 development power4 addition two-way multithreading required duplication return stack program counter instruction buffer group completion unit store queue thread may resources register files execution units shared although thread sees set registers power5 implements simultaneous multithreading smt two threads executed simultaneously power5 disable smt optimize current workload many resources register files shared two threads increased capacity many cases compensate loss performance number integer floating-point registers increased 120 80 integer 72 floating-point registers power4 floating-point instruction cache also increased capacity 24 entries 20 capacity l2 unified cache increased 1.875 mb set-associativity 10-way unified l3 cache brought on-package instead located externally separate chips capacity increased 36 mb like power4 cache shared two cores cache accessed via two unidirectional 128-bit buses operating half core frequency on-die memory controller supports 64 gb ddr ddr2 memory uses high-frequency serial buses communicate external buffers interface dual inline memory modules dimms microprocessor power5 contains 276 million transistors area 389 mm fabricated ibm 0.13 µm silicon insulator soi complementary metal–oxide–semiconductor cmos process eight layers copper interconnect power5 die packaged either dual chip module dcm multi-chip module mcm dcm contains one power5 die associated l3 cache die mcm contains four power5 dies four l3 cache dies one power5 die measures 95 mm 95 mm several power5 processors high-end systems coupled together act single vector processor technology called viva virtual vector architecture power5+ improved iteration power5 introduced 4 october 2005 improvements initially lower power consumption due newer process fabricated power5+ chip uses 90 nm fabrication process resulted die size decrease 389 mm 243 mm clock frequency increased launch remained 1.5 1.9 ghz 14 february 2006 new versions raised clock frequency 2.2 ghz 2.3 ghz 25 july 2006 power5+ packaged packages previous power5 microprocessors also available quad-chip module qcm containing two power5+ dies two l3 cache dies one power5+ die qcm chips ran clock frequency 1.5 1.8 ghz ibm uses dcm mcm power5 microprocessors system p system server families ds8000 storage server embedded microprocessors high-end infoprint printers dcm power5 microprocessors used ibm high-end intellistation power 285 workstation third-party users power5 microprocessors groupe bull escala servers hitachi sr11000 computers 128 power5+ microprocessors several installations featured 2007 top500 list supercomputers ibm uses power5+ system p5 510q 520q 550q 560q servers | [
7327,
2719,
3348,
4661,
3936,
1075,
1346,
2458,
3440,
1083,
4408,
5652,
912,
7361,
2845,
3708,
5042,
7453,
5665,
4702,
1199,
1386,
4515,
1388,
6204,
7099,
234,
2501,
239,
515,
8125,
4815,
1131,
6226,
608,
2433,
7499,
1237,
2257,
3674,
4... | Validation |
6,475 | 9 | Programming_Languages:_Application_and_Interpretation:programming languages application interpretation programming languages application interpretation plai free programming language textbook shriram krishnamurthi use 30 universities several high-schools book differs programming language texts attempt wed two different styles programming language education one based language surveys another based interpreters former style easy ignore difficult technical points sometimes best understood trying reproduce via implementation latter easy miss high-level picture forest details plai therefore interleaves two using survey approach motivate ideas interpreters understand book accompanied supporting software runs racket programming language since plai constantly development newer material especially assignments found course pages brown university plai also experiment publishing methods essay books software discusses book self-published addition book currently december 2014 available for-pay print also free for-pay electronic editions | [
1889,
3429,
7204
] | Test |
6,476 | 7 | Qualtrics:qualtrics qualtrics experience management company co-headquarters provo utah seattle washington united states company founded 2002 scott m. smith ryan smith jared smith stuart orgill qualtrics offers subscription software platform world ’ iconic companies use close experience gaps deliver breakthrough results xm platform makes simple organization collect understand take action experience data x-data —the beliefs emotions sentiments customers employees november 11 2018 announced qualtrics would acquired sap acquisition completed january 23rd 2019 2012 company received 70 million series investment sequoia capital accel generally considered two top venture capital firms country largest joint investment date two firms september 2014 sequoia capital accel returned series b funding led insight partners worth 150 million record utah-based company valuing company 1 billion april 2017 qualtrics received series c investment round 180 million returning investors accel sequoia capital insight venture partners series c raised 2.5 billion pre-money valuation lifetime qualtrics raised total 400 million accel insight partners sequoia capital october 19 2018 qualtrics filed s-1 registration statement intention raising gross proceeds 200 million initial public offering ipo class b shares time company listed 9,000 global customers company meant listed nasdaq exchange ticker xm reference flagship experience management product qualtrics xm platform plans ipo scrapped announced november 2018 qualtrics would acquired sap nyse sap 2016 qualtrics ranked 12 forbes cloud 100 list moving 6 2017 qualtrics reported revenue 190.6 million 2016 289.9 million 2017 representing year year growth 52 2016 qualtrics reported overall net loss 12 million free cash flow 3.4 million 2017 qualtrics reported 2.6 million net profit free cash flow 21.3 million may 2016 qualtrics acquired statistical analysis startup statwing undisclosed sum statwing san francisco-based company created point-and-click software advanced statistical analysis april 2018 qualtrics acquired delighted undisclosed sum delighted 1,500 customers time acquisition november 2018 sap announced intent acquire qualtrics sap acquired outstanding shares qualtrics 8 billion usd cash deal sap secured €7 billion financing time announced qualtrics acquisition sap second-biggest purchase ever behind 8.3 billion acquisition travel expense management firm concur 2014 acquisition formally closed january 23 2019 quantitative statistical analysis performed qualtrics cited number professional academic journals qualtrics became first employee management platform measuring employee experiences key metrics powered predictive intelligence researchers often use qualtrics survey tool combine spss analyze survey data employee experiences many types survey data | [
1634
] | Test |
6,477 | 2 | Poul-Henning_Kamp:poul-henning kamp poul-henning kamp born 1966 danish computer software developer known work various projects currently resides slagelse denmark poul-henning kamp committing freebsd project duration responsible widely used md5crypt implementation md5 password hash algorithm vast quantity systems code including freebsd geom storage layer gbde cryptographic storage transform part ufs2 file system implementation freebsd jails malloc library ntp timecounters code lead architect developer open source varnish cache project http accelerator 2006 kamp dispute electronics manufacturer d-link claimed committing ntp vandalism embedding ip address ntp servers routers dispute resolved 27 april 2006 post poul-henning freebsd mailing lists responsible popularization term bike shed discussion derived term bikeshedding describe parkinson law triviality open source projects amount discussion subject receives inversely proportional importance poul-henning kamp known preference beerware license gnu general public license gpl poul-henning kamp made various anti-semitic comments blaming world jews collectively responsible actions israel may 8 2019 tweeted thought anti-semitism *unfounded* hatred jews hate something awful like implement apartheid anti-semitism perfectly justified critique people particular know better clarifying blog post later wrote readily admit probably skilled use twitter stand point kamp went say detests cowardice appaled sic arms atrocities uns human rights done name religion poul-henning kamp published substantial number articles years publications like communications acm acm queue mostly topics computing time keeping selection publications | [
7514,
6794,
6085,
732,
738,
3636,
2583,
5760,
3986,
5065,
424,
6489,
7217,
6149,
6860,
443,
6505,
1523,
1547,
481,
2300,
1193,
4059,
8001,
6918,
6211,
4806,
4441,
5865,
6583,
8037,
875,
1254,
191,
908,
4498,
7355,
3457,
212,
1279,
6278,... | Test |
6,478 | 3 | Pico-ITXe:pico-itxe pico-itxe pc pico-itx motherboard specification created via technologies sff-sig announced via technologies october 29 2008 released december 2008 pico-itxe specifications call board half area nano-itx 12 layers deep processor via c7 uses via nanobga2 technology uses ddr2 667/533 so-dimm memory support 2gb video supplied via chrome9 hc3 gpu built-in mpeg-2 4 wmv9 vc1 decoding acceleration bios 4 8 mbit award bios first motherboard produced specification called epia-p710 released december 2008 12 layers deep operating temperature range 0°c 50°c operating humidity level relative non-condensing 0 95 uses 1 ghz via c7-m processor via vx800 chip set rohs compliant onboard vga video-out gigabit ethernet supplied via vt6122 requires connector board hd 5.1 channel audio provided via vt1708b chip following standard i/o connections four i/o expansion boards stacked upon using sumit interface | [
7212,
1759,
4974,
1052,
2744,
7041,
6089,
7484,
2147
] | Test |
6,479 | 2 | Apple_SOS:apple sos sophisticated operating system sos primary operating system developed apple iii computer sos developed apple computer inc. released october 1980 sos single-tasking single-user operating system makes resources apple iii available form menu-driven utility program well programming application programming interface api single program loaded boot time called interpreter loaded interpreter use sos api make requests system sos api divided four main areas apple iii system utilities program shipped apple iii computer provides user interface operating system system configuration file management system utilities program menu-driven performs tasks three categories sos two types devices communicates via device drivers character devices block devices examples sos character devices keyboards serial ports disk drives typical block devices block devices read write one 512-byte blocks time character devices read write single characters time powered apple iii runs system diagnostics reads block number zero built-in diskette drive memory executes sos-formatted diskettes place loader program block zero loader program searches loads executes file named sos.kernel kernel api operating system kernel turn searches loads file named sos.interp interpreter program run sos.driver set device drivers use files loaded control passed sos.interp program apple prodos uses file system sos disk formatted prodos prodos loader sos loader written blocks zero one respectively prodos loader includes code execute apple iii chainload sos loader block one sos prodos co-exist volume software adtpro makes use store apple ii apple iii versions program disk bootable systems 1985 steve wozniak critical apple iii hardware flaws called sos finest operating system microcomputer ever regardless sos advantages system backward-compatible dos 3.2 dos 3.3 apple ii software used time though apple iii designed mostly backward-compatible apple ii plus hardware users must boot apple dos separate disk utilize apple ii series software thus losing advantages sos many average computer users also ready 1980 operating system capabilities flexible configuration options sos offers especially combined apple iii bad reputation due poor engineering high retail price nearly | [
1522,
6788,
4214,
4575,
5101,
4670,
7814,
2294,
4320,
5571,
2300,
5660,
5579,
1654,
5232,
1656,
1657,
6113,
405,
7011,
8043,
6119,
2327,
1123,
4453,
2794,
3751,
3920
] | Test |
6,480 | 3 | Elbrus_2000:elbrus 2000 elbrus 2000 e2k russian 512-bit wide vliw microprocessor developed moscow center sparc technologies mcst fabricated tsmc supports two instruction set architecture isa thanks unique architecture elbrus 2000 execute 20 instructions per clock even modest clock speed compete much faster clocked superscalar microprocessors running native vliw mode security reasons elbrus 2000 architecture implements dynamic data type-checking execution order prevent unauthorized access pointer additional type information verified associated data accessed | [
4657,
1252,
5364,
7071,
3098,
1180,
578,
1753,
8102,
5055,
1761,
2864,
1778,
3747,
1237,
352,
971
] | Validation |
6,481 | 3 | Auf_Wiedersehen_Monty:auf wiedersehen monty auf wiedersehen monty german goodbye monty computer game zx spectrum commodore 64 amstrad cpc msx commodore 16 released 1987 fourth monty series following monty innocent monty run successful original written peter harrap shaun hollingworth music rob hubbard ben daglish player controls monty travels around europe collecting money order buy greek island montos safely retire gameplay style flick-screen platform game similar many games 1980s technician ted jet set willy screens representing eiffel tower pyrenees bear relation real-life counterparts typical platform game screens auf wiedersehen monty contains many interesting features peculiarities player discover examples include suddenly attacked bull head spain collecting red cape presumably reference bullfighting car dropped one two places entering screen representing düsseldorf west germany chef hat found sweden reference swedish chef muppets fame also two rooms representing sweden subtitled bjorn borg record luxembourg collected makes monty breakdance game title music may reference radio luxembourg possible get areas game quickly flying airport using air tickets collected throughout game parts game reached manner well money miscellaneous objects collect game points important need certain number points get montos often particular country monty visiting berets france bottles wine glass beer west germany cause monty briefly become drunk control become slightly erratic leading reversal controls repeated jumping monty climbing ladders drainpipes encounters moley christmas released later year monty mole game called impossamole released 1990 took different form previous games console-style arcade game | [] | Test |
6,482 | 3 | Macintosh_LC_500_series:macintosh lc 500 series macintosh lc 500 series series personal computers part apple computer macintosh lc family macintosh computers apple mid-1990s mainstream education-market macintosh featuring all-in-one desktop design built-in 14 crt display cd-rom drive stereo speakers designed successor compact macintosh family computers case similar recently introduced macintosh color classic considerably larger heavier due larger screen bulging midsection house larger electronics 500 series included four main models 520 550 575 580 520 550 using different speeds motorola 68030 575 580 sharing 33mhz motorola 68lc040 processor differing rest hardware computers also sold consumer market department stores macintosh performa brand similar model numbers lc models particular became popular schools small footprint lack cable clutter durability macintosh tv branded lc uses lc 520 case black instead platinum logic board similar lc 550 compact color classic series shares many components able swap logic boards early 500 series machines macintosh lc 520 introduced june 1993 case design larger compact macintosh models precede due large part significantly larger screen lc 520 got start design project codenamed mongo following success color classic apple industrial design group idg began exploring adaptation color classic design language dubbed espresso larger display version would also include cd-rom drive however idg hated design much permanently shelved final concept 1992 apple ceo john sculley demanded large screen all-in-one design fill market strategy less 6 months idg objections apple engineering team retrieved shelved design promptly put production idg universally detested design immediately began re-design project would become power macintosh 5200 lc series less two years later logic board 520 broadly macintosh lc iii motorola 68030 cpu optional motorola 68882 fpu new york times review lc 520 generally positive columnist peter lewis noting 1,599 price point perhaps best value entire macintosh product line ... would difficult put together windows-based pc features price windows computers usually much less expensive macs lewis also noted unit 40-pound weight would make difficult carry home night -- attribute apple previously marketed feature compact macintosh models 1980s macweek wrote timing lc 520 release coincided purchasing timelines schools decision market computer exclusively education market part strategic shift move lc brand away retail market 520 discontinued february 1994 replaced faster otherwise essentially unchanged macintosh lc 550 new 68lc040-equipped macintosh lc 575 apple sold upgrade kits lc 520 brought specifications lc 550 575 initially sold japan canada u.s. educational institutions computer discontinued february 1994 featured caddy-loaded cd-rom drive introduced june 28 1993 macintosh lc 550 replaced lc 520 february 1994 performa variants introduced earlier 550 october 1993 560 january 1994 remained available year longer april 1996 main difference 550 520 faster 68030 cpu clocked 33 mhz instead 25 mhz bus speed also increasing 25 33 mhz like 520 optical drive use loading tray instead utilized caddy disk first inserted caddy loaded drive logic board 550 essentially one used macintosh color classic ii upgrade original color classic available united states apple also offered upgrade package 520 lc 575 logic board two performa variants introduced varying software bundle included 550 included consumer applications performa 560 called money edition owing partnership apple money magazine addition consumer education software also included dozen business software applications lc 575 discontinued favor either lc 580 lower end powerpc-based power macintosh 5200 lc models higher end introduced october 18 1993 introduced january 15 1994 introduced february 2 1994 macintosh lc 575 available 1994 1996 retains all-in-one case lc 520/550 uses lc 475 motherboard motorola 68lc040 cpu speed 33 mhz instead 25 mhz tray-loading optical drive also included high density floppy disk drive cpu clock sometimes given 66 mhz since clock signal frequency however processor runs 33 mhz lc 575 also introduced comm slot included later lc models well may 1994 set performa variants introduced performa 575 577 578 machines identical except amount ram hdd size software packages included performa variants include clarisworks 2.0 quicken 4.0 grolier encyclopedia 1993 time magazine almanac ease educational titles david pogue described machine enthusiastically received mac fans appreciated crisp color screens speedy performance rich sound upgradability power macs line lc variant succeeded macintosh lc 580 performa variants sold 580 discontinued lc 580 performa variants available outside united states model favorite motherboard donor wishing upgrade color classic faster class processor apple also offered upgrade path form powerpc macintosh processor upgrade introduced february 1994 introduced may 1994 macintosh lc 580 sold april 1995 may 1996 like lc 575 built around motorola 68lc040 processor running 33 mhz however instead using sized scsi-only logic boards based lc 475/quadra 605 like lc 575 580 uses larger logic board performa 630 meant changes leading lower prices also lower performance notably hard drives 580 ide drives instead scsi drives also video ram longer mounted simm used 1 mb 4 mb main ram soldered motherboard lastly trinitron display 575 replaced cheaper shadow mask screen causing slight change plastic case surrounding crt one benefit change ability accommodate video capture tv tuner cards designed performa 630 allowed lc 580 users watch record video essentially performing function television well computer lc 580 lc 630 dos compatible introduced time last macintosh desktop systems built around motorola 68000-series processor replacement power macintosh 5200 lc features powerpc processor apple also offered upgrade path 580 form powerpc macintosh processor upgrade 580 also upgraded following logic boards 5200 lc 6200 5260 5300 6300 5400 6400 5500 6500 introduced april 3 1995 introduced april 13 1995 introduced may 1 1995 central processing unit motorola 68lc040 33 mhz 8 kb l1 cache memory 8 mb expandable 52 mb 2 72-pin simms 1 mb 4 mb ram soldered mainboard used video ram storage hard drive 250 mb 500 mb ide floppy drive 1.44 mb superdrive read 400 kb 800 kb diskettes well cd-rom 4x applecd unit expansion 1 lc pds 1 comm slot display 14″ color crt supports 32,768 colors | [
7890,
5732,
722,
1094,
2926,
5037,
5752,
2954,
7572,
6142,
4373,
7226,
2978,
7601,
4749,
5097,
3346,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
6200,
6202,
3387,
3390,
1216,
2331,
4820,
4453,
1234,
1237,
7311,
889,
550,
552,
5916,
3... | Test |
6,483 | 4 | Usability_of_web_authentication_systems:usability web authentication systems usability web authentication systems refers efficiency user acceptance online authentication systems examples web authentication systems passwords federated identity systems e.g google oauth 2.0 facebook connect mozilla persona email-based single sign-on sso systems e.g saw hatchet qr code-based systems e.g snap2pass webticket system used authenticate user identity web even though usability web authentication systems key consideration selecting system web authentication systems passwords subjected formal usability studies analysis web authentication system needs usable possible whilst compromising security needs ensure system needs restrict access malicious users whilst allowing access authorised users authentication system sufficient security malicious users could easily gain access system hand authentication system complicated restrictive authorised user would able want use strong security achievable system even secure authentication system undermined users system often referred weak links computer security users tend inadvertently increase decrease security system system usable security could suffer users try minimize effort required provide input authentication writing passwords paper usable system could prevent happening users likely oblige authentication requests systems important e.g online banking opposed less important systems e.g forum user visits infrequently mechanisms might ignored users accept security measures certain point becoming annoyed complicated authentication mechanisms important factor usability web authentication system thus convenience factor user around preferred web authentication system web applications password despite poor usability several security concerns widely used system usually contains mechanisms intended increase security e.g requiring users high entropy passwords lead password systems less usable inadvertently less secure users find high entropy passwords harder remember application creators need make paradigm shift develop usable authentication systems take user ’ needs account replacing ubiquitous password based systems usable possibly secure systems could lead major benefits owners application users measure usability web authentication system one use usability–deployability–security uds framework standard metric system usability scale uds framework looks three broad categories namely usability deployability security web authentication system rates tested system either offering offering specific benefit linked one categories authentication system classified either offering offering specific benefit within categories usability deployability security measuring usability web authentication systems allow formal evaluation web authentication system determine ranking system relative others lot research regarding web authentication system currently done tends focus security usability future research evaluated formally usability using comparable metric technique enable comparison various authentication systems well determining whether authentication system meets minimum usability benchmark found security experts tend focus security less usability aspects web authentication systems problematic needs balance security system ease-of-use study conducted 2015 found users tend prefer single sign-on like provided google facebook based systems users preferred systems found fast convenient use single sign-on based systems resulted substantial improvements usability security sso reduces need users remember many usernames passwords well time needed authenticate thereby improving usability system usability become important applications move online require robust reliable authentication systems usable secure use brainwaves authentication systems proposed possible way achieve however research usability studies required | [
2789,
1805,
5149,
3794,
5582,
7120
] | Test |
6,484 | 7 | Dew_computing:dew computing dew computing information technology paradigm combines core concept cloud computing capabilities end devices personal computers mobile phones etc. used enhance experience end user comparison using cloud computing dew computing attempts solve major problems related cloud computing technology reliance internet access dropbox example dew computing paradigm provides access files folders cloud addition keeping copies local devices allows user access files times without internet connection connection established files folders synchronized back cloud server term dew computing used information technology first appeared 2015 literature since become field cloud-dew architecture proposed possible solution offline data accessibility problem first scope included web applications broader applications later proposed dew computing model derived original concept cloud computing models also emerged cloud computing including fog computing edge computing dew computing others proponents claim novel models dew computing provide better experiences users cloud computing provides universal access scalability however resources far user control occasionally causes problems classic cloud computing paradigm internet connection servers lost user unable access data dew computing aims solve problem information technology paradigm dew computing seeks use capabilities personal computers along cloud services reliable manner key features dew computing independence collaboration independence means local device must able provide service without continuous connection internet collaboration means application must able connect cloud service synchronize data appropriate use word dew reflects natural phenomena clouds far ground fog closer ground dew ground analogically cloud computing remote service fog computing beside user dew computing user end establish cloud-dew architecture pc dew virtual machine dvm needed dvm isolated environment executing dew server local pc consists least three components dew server ds data analytics server das artificial intelligence dew aid dew computing categories classified based application field dew computing faces number technical challenges including issues related power management processor utility data storage factors impacting use dew computing viability operation system network model communication model programming principles dew recommended engine local dew network personal high productivity database security behaviors browser | [
2961,
2390,
5064,
2054,
5447,
84,
6345,
108
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.