node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,485
9
Peter_Naur:peter naur peter naur 25 october 1928 – 3 january 2016 danish computer science pioneer turing award winner last name n bnf notation backus–naur form used description syntax programming languages contributed creation algol 60 programming language naur began career astronomer received phd degree 1957 encounter computers led change profession 1959 1969 employed regnecentralen danish computing company time giving lectures niels bohr institute technical university denmark 1969 1998 naur professor computer science university copenhagen main areas inquiry design structure performance computer programs algorithms areas software engineering software architecture also pioneered naur book computing human activity 1992 collection contributions computer science rejected formalist school programming views programming branch mathematics like associated backus–naur form attributed donald knuth said would prefer called backus normal form naur married computer scientist christiane floyd naur disliked term computer science suggested called datalogy data science former term adopted denmark sweden datalogi latter term used data analysis including statistics databases since middle 1960s computer science practiced denmark peter naur term datalogy science data processes starting regnecentralen university copenhagen copenhagen tradition computer science developed special characteristics means close connection applications fields knowledge tradition least visible area education comprehensive project activity integral part curriculum thus presenting theory aspect realistic solutions known primarily actual experience peter naur early recognized particular educational challenges presented computer science innovations shown quality vitality also universities close connection computer science training formed copenhagen university view computer science characterized peter naur research later years quite outspoken pursuit science whole naur possibly identified empiricist school tells one shall seek deeper connections things manifest world keep observable facts attacked certain strands philosophy psychology viewpoint also developing theory human thinking called synapse-state theory mental life naur 2005 acm a.m. turing award work defining algol 60 programming language particular role editor influential report algorithmic language algol 60 pioneering use bnf recognized naur dane turing award naur died 3 january 2016 short illness numbers refer published bibliography naur published large number articles chapters astronomy computer science issues society classical music psychology education
[ 7707, 3437, 1746, 1381, 7009, 3470, 7375, 43, 1114, 1308, 5424, 7863, 1600, 1243, 360 ]
Validation
6,486
1
Data_pack:data pack data pack fact pack pre-made database fed software software agents internet bots chatterbots teach information facts later look words data pack used feed minor updates system common data packs may include abbreviations acronyms dictionaries lexicons technical data country codes rfcs filename extensions tcp udp port numbers country calling codes data packs may come formats csv sql easily parsed imported database management system database may consist key-value pair like association list data packs commonly used within gaming industry provide minor updates within games user downloads update game downloading loads data packs contain updates game minor bug fixes additional content example data pack used update game found references data pack datapack definition similar data packet contains loads information data stores within pack data compressed reduce file size certain programs read data pack therefore data packed vital know whether receiving program able unpack data example data packs able effective deliver information found reference page refer word data pack come many forms mobile data pack mobile data pack refers add-on enable boost amount data use mobile phone rate use data also monitored know much data left mobile data service provides similar service wi-fi allows connect internet purpose data pack increase amount data mobile access example mobile data pack found references
[ 3228, 4337, 2054 ]
Test
6,487
4
SoftEther_VPN:softether vpn softether vpn free open-source cross-platform multi-protocol vpn client vpn server software developed part daiyuu nobori master thesis research university tsukuba vpn protocols ssl vpn l2tp/ipsec openvpn microsoft secure socket tunneling protocol provided single vpn server released using gplv2 license january 4 2014 license switched apache license 2.0 january 21 2019 softether vpn supports nat traversal making useful run vpn servers computers behind residential gateways facility routers firewalls firewalls performing deep packet inspection unable detect softether vpn transport packets vpn tunnel https used camouflage connection softether vpn optimizes performance using full ethernet frame utilization reducing memory copy operations parallel transmission clustering together reduce latency normally associated vpn connections increasing throughput softether vpn server vpn bridge run windows linux os x os x 10.8 freebsd solaris operating systems softether vpn client runs windows linux macos softether vpn server serves softether vpn protocol also serves openvpn microsoft secure socket tunneling protocol sstp ssl vpn etherip l2tpv3 ipsec serves mobile devices running ios android windows phone via l2tp/ipsec vpn clients endpoints supporting vpn protocols may also used includes many routers cisco juniper linksys dd-wrt asus others softether vpn server implements vpn server function listens accepts connections vpn client vpn bridge several vpn protocols vpn server several virtual hubs virtual layer-3 switches virtual hub full layer-2 ethernet packet-switching functions like physical ethernet switch additionally virtual hub configured define ip packet filter entries filter packets virtual hub virtual layer-3 switch layer-3 ip static routing functions like physical router vpn server local bridges local bridge layer-2 packet-switching fabric physical ethernet network-adapter virtual hub administrator defines local bridge virtual hub existing corporate network build remote-access vpn server site-to-site vpn server softether vpn client vpn client program virtualized function ethernet network adapter computer installed softether vpn client establish vpn connection vpn server since vpn server support multiple vpn protocols l2tp/ipsec ms-sstp vpn vpn users required install softether vpn client client computers user uses l2tp/ipsec ms-sstp vpn connect vpn server built-in vpn client programs operating system used establish vpn vpn server however softether vpn client advanced functions e.g detailed vpn communication settings os built-in vpn clients exploit full performance softether vpn server recommended install softether vpn client client computer softether vpn bridge vpn program building site-to-site vpn build site-to-site vpn network system administrator install softether vpn server central site install softether vpn bridge one remote sites vpn bridge connects central vpn server cascade connection cascade connection similar virtualization uplink connection cross-cable connection two physical ethernet switches gui tool administrative tool softether vpn server softether vpn bridge program runs windows linux wine system administrator installs gui tool laptop pc makes connect remote vpn server vpn bridge administration connection made ssl session management commands transported rpc ssl vpncmd cui administrative tool softether vpn server client bridge program runs consoles every supported operating systems user unable use windows linux wine user alternatively use vpncmd manage vpn programs vpncmd also useful execute batch operation creating many users virtual hub creating many virtual hubs vpn server parts architecture softether vpn different typical traditional ipsec-based vpn systems virtual hub software-emulated virtual ethernet switch learns maintains forwarding-database table inside traditional physical ethernet switches implement function hardware softether vpn implements function software vpn server several virtual hubs virtual hub isolated virtual hub performs packet-switching concurrently connected vpn sessions realize communication vpn clients vpn bridges several virtual hubs single instance vpn server virtual hubs isolated security different administrator delegated privilege correspondent virtual hub administrator virtual hub define user-objects acls limited delegated virtual hub virtual network adapter software-emulated virtual ethernet adapter vpn client create several virtual network adapters client computer vpn user establish vpn session virtual network adapter destination virtual hub remote vpn server vpn session established vpn user communicate remote vpn network virtual network adapter since virtual network adapter works physical one applications operating system components used without modification virtual layer-3 switch software-emulated virtual ip router several virtual layer-3 switches created single vpn server instance virtual layer-3 switch virtual ip interfaces connected virtual hubs also several static routing table entries virtual layer-3 switch useful make large-scale site-to-site vpn network although easy way make site-to-site vpn network build layer-2 bridging based vpn number computers huge number broadcasting packets increase load inter-site links prevent scaling problem vpn administrator isolates ip networks virtual layer-3 switch administrator define cascade connection local remote virtual hubs cascade connection established originally-isolated two ethernet segments combined single ethernet segment therefore cascade connection function used build site-to-site layer-2 ethernet bridging since virtual hubs virtual network adapters software-emulated virtual ethernet devices ethernet packets virtual devices communicate physical ethernet devices therefore bridge virtual physical necessary build remote-access vpn site-to-site vpn make bridge local bridge function exchanges ethernet packets virtual hub physical ethernet network adapter combine isolated ethernet segments single ethernet segment defining local bridge softether vpn server vpn client connect vpn server communicate existing ethernet devices e.g servers network equipment local bridge called remote-access vpn network administrator sets remote-site vpn bridge defines two local bridges vpn server vpn bridge defines cascade connection vpn server vpn bridge remote two ethernet segments connected directly layer-2 ethernet level called site-to-site vpn one key features softether vpn transparency firewalls proxy servers nats network address translators softether vpn supports ssl-vpn nat traversal softether vpn uses https protocol order establish vpn tunnel https http ssl protocol uses tcp/ip port 443 may vary destination user chooses ssl-vpn protocol vpn client vpn server softether vpn server vpn client use parallel transmission mechanism improve throughput ssl-vpn tunnel user set number concurrent parallel transmission channels 1 32 environment slow delaying network performance tuning result faster throughput function enabled logical vpn session consist several tcp https connections packets added one appropriate tcp connections calculations optimizing modules packet losses detected tcp connection logical vpn session new packet use another healthy vpn connection fast-switching optimization determine processing tcp connection enables high throughput traditional vpn systems require user ask firewall administrator company open endpoint tcp udp port firewall nat border company internet order reduce necessity open endpoint firewall softether vpn server nat traversal function nat traversal enabled default long enabled softether vpn client computers connect vpn server behind firewall nat special settings firewall nat necessary very-restricted networks permit pass icmp dns packets network tcp udp filtered icmp dns permitted order make possible establish softether vpn client-server session via very-restricted network softether vpn vpn icmp vpn dns function function powerful penetrate restricted firewall vpn packets encapsulated icmp dns packets transmit firewall receiver-side endpoint extracts inner packet capsuled packet useful exploiting public wi-fi public wi-fi pass icmp dns packets filter tcp udp packets vpn server installed home office advance going outdoors enjoy protocol-free network communication using restricted network vpn gate plugin softether vpn allows users connect free vpn servers run volunteers use softether host vpn servers volunteers use personal computers servers vpn gate sponsored university tsukuba
[ 3350, 5808, 3775, 7806, 2644, 5571, 5488, 1559, 578, 2664, 6025, 6458, 4162, 8008, 2681, 5157, 5773, 3572, 7122, 4990, 7867, 4014, 2356, 1435 ]
Test
6,488
4
Computer_forensics:computer forensics computer forensics also known computer forensic science branch digital forensic science pertaining evidence found computers digital storage media goal computer forensics examine digital media forensically sound manner aim identifying preserving recovering analyzing presenting facts opinions digital information although often associated investigation wide variety computer crime computer forensics may also used civil proceedings discipline involves similar techniques principles data recovery additional guidelines practices designed create legal audit trail evidence computer forensics investigations usually subjected guidelines practices digital evidence used number high-profile cases becoming widely accepted reliable within u.s. european court systems early 1980s personal computers became accessible consumers leading increased use criminal activity example help commit fraud time several new computer crimes recognized cracking discipline computer forensics emerged time method recover investigate digital evidence use court since computer crime computer related crime grown jumped 67 2002 2003 today used investigate wide variety crime including child pornography fraud espionage cyberstalking murder rape discipline also features civil proceedings form information gathering example electronic discovery forensic techniques expert knowledge used explain current state digital artifact computer system storage medium e.g hard disk cd-rom electronic document e.g email message jpeg image scope forensic analysis vary simple information retrieval reconstructing series events 2002 book computer forensics authors kruse heiser define computer forensics involving preservation identification extraction documentation interpretation computer data go describe discipline art science indicating forensic methodology backed flexibility extensive domain knowledge however several methods used extract evidence given computer strategies used law enforcement fairly rigid lack flexibility found civilian world court computer forensic evidence subject usual requirements digital evidence requires information authentic reliably obtained admissible different countries specific guidelines practices evidence recovery united kingdom examiners often follow association chief police officers guidelines help ensure authenticity integrity evidence voluntary guidelines widely accepted british courts computer forensics used evidence criminal law since mid-1980s notable examples include computer forensic investigations usually follow standard digital forensic process phases acquisition examination analysis reporting investigations performed static data i.e acquired images rather live systems change early forensic practices lack specialist tools led investigators commonly working live data number techniques used computer forensics investigations much written many techniques used law enforcement particular seizing evidence machine still active information stored solely ram recovered powering may lost one application live analysis recover ram data example using microsoft cofee tool windd windowsscope prior removing exhibit captureguard gateway bypasses windows login locked computers allowing analysis acquisition physical memory locked computer ram analyzed prior content power loss electrical charge stored memory cells takes time dissipate effect exploited cold boot attack length time data recoverable increased low temperatures higher cell voltages holding unpowered ram −60 °c helps preserve residual data order magnitude improving chances successful recovery however impractical field examination tools needed extract volatile data however require computer forensic lab maintain legitimate chain evidence facilitate work machine necessary law enforcement applies techniques move live running desktop computer include mouse jiggler moves mouse rapidly small movements prevents computer going sleep accidentally usually uninterruptible power supply ups provides power transit however one easiest ways capture data actually saving ram data disk various file systems journaling features ntfs reiserfs keep large portion ram data main storage media operation page files reassembled reconstruct ram time number open source commercial tools exist computer forensics investigation typical forensic analysis includes manual review material media reviewing windows registry suspect information discovering cracking passwords keyword searches topics related crime extracting e-mail pictures review several computer forensics certifications available isfce certified computer examiner digital forensics investigation professional dfip iacrb certified computer forensics examiner top vendor independent certification especially within eu considered ccfp certified cyber forensics professional others worth mention usa apac iacis international association computer investigative specialists offers certified computer forensic examiner cfce program isfcs international society forensic computer examiners® offers certified computer examiner cce program asian school cyber laws offers international level certifications digital evidence analysis digital forensic investigation courses available online class room mode many commercial based forensic software companies also offering proprietary certifications products example guidance software offering ence certification tool encase accessdata offering ace certification tool ftk passmark software offering oce certification tool osforensics x-ways software technology offering x-pert certification software x-ways forensics
[ 2361, 1715, 5982, 7234, 5274, 1534, 3517, 3179, 1353, 6342, 2195, 4679, 6715, 904, 4316, 5215, 5561, 3700, 2204, 4501, 2566, 7825, 5571, 7181, 3792, 1382, 6020, 1756, 1020, 2584, 5150, 4523, 7105, 1300, 1872, 4536, 6938, 3823, 5254, 7125,...
Test
6,489
2
BSD_licenses:bsd licenses bsd licenses family permissive free software licenses imposing minimal restrictions use distribution covered software contrast copyleft licenses share-alike requirements original bsd license used namesake berkeley software distribution bsd unix-like operating system original version since revised descendants referred modified bsd licenses bsd license class license generally referred bsd-like modified bsd license wide use today similar license originally used bsd version unix bsd license simple license merely requires code retain bsd license notice redistributed source code format reproduce notice redistributed binary format bsd license unlike licenses require source code distributed addition original 4-clause license used bsd several derivative licenses emerged also commonly referred bsd license today typical bsd license 3-clause version revised original 4-clause version bsd licenses following codice_1 organization codice_2 codice_2 codice_4 year copyright published bsd codice_2 regents university california codice_1 university california berkeley releases bsd prior adoption 4-clause bsd license used license clearly ancestral 4-clause bsd license releases include 4.3bsd-tahoe 1988 net/1 1989 although largely replaced 4-clause license license found 4.3bsd-reno net/2 4.4bsd-alpha original bsd license contained clause found later licenses known advertising clause clause eventually became controversial required authors works deriving bsd-licensed work include acknowledgment original source advertising material clause number 3 original license text clause objected grounds people changed license reflect name organization led escalating advertising requirements programs combined together software distribution every occurrence license different name required separate acknowledgment arguing richard stallman stated counted 75 acknowledgments 1997 version netbsd addition clause presented legal problem wishing publish bsd-licensed software relies upon separate programs using gnu gpl advertising clause incompatible gpl allow addition restrictions beyond already imposes gpl publisher free software foundation recommends developers use license though states reason use software already using today original license sometimes called bsd-old 4-clause bsd advertising clause removed license text official bsd william hoskins director office technology licensing uc berkeley bsd distributions removed clause many similar clauses remain bsd-derived code sources unrelated code using derived license original license sometimes referred bsd-old resulting 3-clause version sometimes referred bsd-new names include new bsd revised bsd bsd-3 3-clause bsd version vetted open source license osi bsd license free software foundation refers license modified bsd license states compatible gnu gpl fsf encourages users specific referring license name i.e simply referring bsd license bsd-style avoid confusion original bsd license version allows unlimited redistribution purpose long copyright notices license disclaimers warranty maintained license also contains clause restricting use names contributors endorsement derived work without specific permission even simplified version come use primarily known usage freebsd use early april 29 1999 likely well primary difference new bsd 3-clause license omits non-endorsement clause also adds disclaimer views opinions expressed software free software foundation refers license freebsd license states compatible gnu gpl addition fsf encourages users specific referring license name i.e simply referring bsd license bsd-style modified/new bsd license avoid confusion original bsd license projects netbsd use similar 2-clause license without additional disclaimer version vetted open source license osi simplified bsd license isc license functionally equivalent endorsed openbsd project license template new contributions formerly known free public license 1.0.0 bsd 0-clause license spdx 0bsd goes 2-clause license dropping requirements include copyright notice license text disclaimer either source binary forms freebsd project argues advantages bsd-style licenses companies commercial use-cases due license compatibility proprietary licenses general flexibility stating bsd-style licenses place minimal restrictions future behavior n't legal time-bombs unlike copyleft licenses bsd license allows proprietary use allows software released license incorporated proprietary products works based material may released proprietary license closed source software allowing usual commercial usages 3-clause bsd license like permissive licenses compatible almost foss licenses well proprietary licenses two variants license new bsd license/modified bsd license 3-clause simplified bsd license/freebsd license 2-clause verified gpl-compatible free software licenses free software foundation vetted open source licenses open source initiative original 4-clause bsd license accepted open source license although original considered free software license fsf fsf consider compatible gpl due advertising clause bsd license family one oldest broadly used license family foss ecosystem also many new licenses derived inspired bsd licenses many foss software projects use bsd license instance bsd os family freebsd etc google bionic toybox bsd 3-clause license ranked popularity number five according black duck software sixth according github data
[ 5363, 7514, 6791, 6081, 6794, 7159, 6085, 6428, 3955, 2559, 1092, 726, 5047, 738, 1478, 3636, 7554, 4705, 4336, 2583, 1484, 2585, 3981, 6829, 5760, 753, 7201, 7567, 5420, 6477, 424, 6848, 7581, 5780, 3670, 1139, 7223, 4012, 443, 3251, 6...
Test
6,490
3
DisplayID:displayid displayid vesa standard metadata describing display device capabilities video source designed replace e-edid standard edid structure v1.4 displayid standard initially released december 2007 version 1.1 released march 2009 followed version 1.2 released august 2011 version 1.3 released june 2013 current version 2.0 released september 2017 displayid uses variable-length structures 256 bytes encompass existing edid extensions well new extensions 3d displays embedded displays wide color gamut hdr eotf displayid format includes several blocks describe logical parts display video interfaces display device technology timing details manufacturer information data blocks identified unique tag length block variable fixed specific number bytes base data block mandatory extension blocks optional variable structure based cea edid extension block version 3 first defined cea-861-b displayid standard freely available royalty-free implement version 2.0 introduces new generalized information blocks primarily intended ultrahd high dynamic range hdr displays lcd computer monitors lcd/oled televisions native support bt.2020 color space pq/hlg transfer functions also makes optional predefined crt/lcd timings dmt cea-861 standards switching formula-based structures follow vesa cvt-rb gtf base displayid 2.0 variable-length structure data blocks data block starts mandatory block tag revision number 0-7 payload length 0-248 bytes variable length 251 bytes following blocks currently defined codice_1 product identification block contains standard vendor product ids serial number date manufacture product name comparing legacy block codice_2 microsoft isa plug play identifier replaced ieee oui first used network mac address codice_3 display parameters block contains basic parameters viewable area size pixel count supported color depth factory calibrated rgb color space white point luminance gamma transfer function comparing legacy block codice_4 color calibration values moved block codice_5 max/min luminance values added display size specified 1 mm increments addition default 0.1 mm codice_6 detailed timing block type vii defines cta-861 compatible timings based pixel rate block based type vi block codice_7 codice_8 type viii enumerated timing code block based type iv dmt id block codice_9 provides one-byte two-byte video mode codes defined vesa display monitor timings standard video information codes defined cta-861 hdmi codice_10 type ix formula-based timings block based type v short timings block codice_11 codice_12 dynamic video timing range block based block codice_13 video timing range limits new version allows precise definition pixel rate 1 khz steps adds indication variable refresh rates codice_14 display interface features block describes color depth dynamic range transfer function supported display controller based blocks codice_15 display interface features codice_5 color characteristics codice_17 stereo display interface block based block codice_18and describes stereoscopic 3d/vr modes i.e timings codes stereo frame formats supported display codice_19 tiled display topology block describes displays consist multiple physical display panels driven separate video interface based block codice_20 codice_21 container id block defines unique identifier used associate additional devices may present multifunctional display codice_22 vendor-specific data includes proprietary parameters supported displayid 2.0 structures codice_23 cta displayid block provides information cta-861 edid timings version 1.3 information blocks 0x10-0x1f borrow heavily edid 1.4 standard designed previous generation crt/lcd/dlp/pdp displays following block types defined note indicated difference similar/superseding structures version 2.0 shown sections codice_2 product identification superseded codice_1 difference codice_4 display parameters superseded codice_3 differences codice_5 color characteristics superseded codice_3 display parameters codice_30 type detailed timings superseded codice_6 type vii detailed timings differences codice_32 type ii detailed timings block provides compressed structure less precise pixel coordinates reduced blank intervals comparing type codice_33 type iii short timings block provides short compressed structure uses formula-based cvt timings codice_9 type iv short timing dmt id code block uses video mode codes defined vesa display monitor timings standard well video information codes defined cta-861 hdmi superseded codice_8 enumerated timing codice_11 type v short timings block based type iii short timings block 0x05 provides greater pixel precision supports cvt-rb superseded codice_10 type ix formula-based timings codice_7 type vi detailed timing block supports higher precision pixel clock high-resolution timings block based type block 0x03 allows greater timings precision using 1 khz steps instead 10 khz superseded codice_6 type vii detailed timings codice_40 video timing range limits block describes displays capable variable timings superseded codice_12 dynamic video timings range codice_42 display device data block provides information display panel characteristics embedded applications display technology panel type pixel response times display interface features block superseded codice_14 display interface features data blocks described codice_44 serial number data block provides product serial number ascii string codice_45 general purpose ascii string block provides general purpose text strings may required specific applications codice_46 interface power sequencing block defines display interface signal timings required entering exiting sleep mode codice_47 transfer characteristics block defines detailed gamma curves according vesa display transfer characteristic data block dtcdb standard may required byte 1 codice_5 color characteristics block codice_18 stereo display interface block describes stereoscopic 3d/vr modes superseded codice_17 stereo display interface codice_20 tiled display topology data block defines multi-panel displays superseded codice_19 tiled display topology codice_53 vendor specific block defines proprietary vendor data
[ 6307, 2509 ]
Test
6,491
3
Manic_Miner:manic miner manic miner platform video game originally written zx spectrum matthew smith released bug-byte 1983 later re-released software projects first game miner willy series among early titles platform game genre game inspired atari 8-bit family game miner 2049er since ported numerous home computers video game consoles mobile phones time stand-out features included in-game music sound effects high replay value colourful graphics well designed graphical limitations zx spectrum spectrum video display allowed background foreground colours exchanged automatically without software attention animated load screen appears swap words manic miner manipulation feature spectrum first game in-game music playing required constant cpu attention thought impossible achieved constantly alternating cpu time music game results music stuttery rhythm in-game music hall mountain king edvard grieg music henrik ibsen play peer gynt music plays title screen arrangement blue danube twenty caverns one screen size several flashing objects player must collect willy oxygen supply runs player collected objects one cavern must go now-flashing portal take next cavern player must avoid enemies listed cassette inlay ... poisonous pansies spiders slime worst manic mining robots ... move along predefined paths constant speeds willy also killed falling far players must time precision jumps movements prevent falls collisions enemies extra lives gained every 10,000 points game ends player either lives left completes twenty caverns escapes open air final portal garden right house white picket fence red car parked front left slope leading backyard pond tree white animal resembling cat mouse watches sun set behind pond upon gaining freedom miner willy simply walks right screen never looking back differences bug-byte software projects versions scroll-text attract mode different reflect new copyright also several cosmetic changes although gameplay remains manic miner placed number 25 sinclair official top 100 spectrum games time voted number 6 readers top 100 games time issue winner golden joystick award best arcade style game computer video games magazine march 1983 edition placed third game year 1983 competition game included 97 polygon 500 best games time list official ports exist commodore 64 commodore 16 amstrad cpc bbc micro dragon 32/64 commodore amiga oric 1 game boy advance msx sam coupé mobile phones unofficial ports exist ibm pc compatibles windows dos linux apple macintosh atari st zx81 trs-80 color computer sony playstation nintendo 64 neo geo pocket color acorn archimedes orao z88 pmd 85 hp48 microsoft zune acorn atom commodore 128 sam coupé version programmed matthew holt like zx original requires pixel-perfect timing graphics audio latter františek fuka greatly updated addition original twenty caverns forty additional caverns included release levels designed david ledbury winners competition run sam computers ltd although sam coupé broadly spectrum clone avoided spectrum original limitations colour graphics spectrum pixels could many colours 8 horizontally adjacent pixels within span character block one two colours manic miner port made use removal restriction detailed use colour visibly character sprites version scored 84 sinclair 88 crash game ported czechoslovak computers pmd 85 1985 authors pmd 85 version vít libovický daniel jenne made accurate could bbc micro version solar power generator instead containing completely different room called meteor shower reflecting machines solar power generator beam light instead meteors descend top screen disintegrate hit platforms like skylabs skylab landing bay also forcefields turn layout completely different also last screen still called final barrier complex difficult unlike spectrum version considered fairly easy completely different layout also features blinking forcefields amstrad version effectively spectrum version software projects except eugene lair renamed eugene layout final barrier completely different similar spectrum version bbc version dragon 32 version programmed roy coates two extra rooms i.e 22 altogether cheat mode accessed typing p p penguin retain resolution original dragon version used pmode 4 black/white mode z88 port functionality cheats bug-byte software projects versions levels even background music hp 48 series version somewhat limited low resolution screen size scrolling area rather displaying level whole makes difficult port previously mastered another version otherwise fairly loyal zx spectrum version sound somewhat different sounding colour omitted obvious hardware reasons game play remains similar despite awkward platform commodore 16 version limited number respects mainly due initial lack developer material c16 machine two-week deadline produce test game generate master tape duplication house issues related lack fast loader system c16 cassette deck result took seven minutes game load bug resulted game entering first screen soon tape finished loading instead waiting user start game issues related lack music game sound way video memory mapped c16 resulted number screens removed load time video mapping could correctly handled version game released xbox 360 xbox live indie game name manic miner 360 21st june 2012 sequel manic miner jet set willy followed jet set willy ii software projects also released game style manic miner commodore vic-20 called perils willy addition quite unofficial sequels remakes homages updates released even day including zx81 version homage loading screen appeared one episode 2005 british sitcom nathan barley
[ 3496, 4759, 578, 7588 ]
Test
6,492
4
Slashdot_effect:slashdot effect slashdot effect also known slashdotting occurs popular website links smaller website causing massive increase traffic overloads smaller site causing slow even temporarily become unavailable name stems huge influx web traffic would result technology news site slashdot linking websites original circumstances changed flash crowds slashdot reported 2005 diminishing due competition similar sites general adoption elastically scalable cloud hosting platforms effect associated websites metablogs fark digg drudge report imgur reddit twitter leading terms farked drudged reddit effect —or receiving hug death site question google doodles link search results doodle topic also result high increases traffic search results page typically less robust sites unable cope huge increase traffic become unavailable – common causes lack sufficient data bandwidth servers fail cope high number requests traffic quotas sites maintained shared hosting services often fail confronted slashdot effect flash crowd generic term without using specific name describes network phenomenon network host suddenly receives lot traffic sometimes due appearance website blog news column according jargon file term slashdot effect refers phenomenon website becoming virtually unreachable many people hitting site mentioned interesting article popular slashdot news service later extended describe similar effect listed popular site similar generic term flash crowd appropriate term term flash crowd coined 1973 larry niven science fiction short story flash crowd predicted consequence inexpensive teleportation would huge crowds materializing almost instantly sites interesting news stories twenty years later term became commonly used internet describe exponential spikes website server usage passes certain threshold popular interest effect anticipated years earlier 1956 alfred bester novel stars destination reddit effect also used describe viral crowd fundraising efforts addition surge web traffic sites slashdot digg reddit stumbleupon fark consist brief submitted stories self-moderated discussion story typical submission introduces news item website interest linking response large masses readers tend simultaneously rush view referenced sites ensuing flood page requests readers exceed site available bandwidth ability servers respond render site temporarily unreachable major news sites corporate websites typically engineered serve large numbers requests therefore normally exhibit effect websites fall victim may hosted home servers offer large images movie files inefficiently generated dynamic content e.g many database hits every web hit even web hits requesting page websites often became unavailable within minutes story appearance even comments posted occasionally paying slashdot subscribers access stories non-paying users rendered site unavailable even story posted general readership definitive numbers exist regarding precise magnitude slashdot effect estimates put peak mass influx page requests anywhere several hundred several thousand hits per minute flood usually peaked article top site front page gradually subsided story superseded newer items traffic usually remained elevated levels article pushed front page could take 12 18 hours initial posting however articles significantly longer lifetimes due popularity newsworthiness interest linked article 2005 reporters commenting slashdot effect diminishing however effect seen involving twitter popular users mention website targeted website community-based structure term also refer secondary effect large group new users suddenly set accounts start participate community cases considered good thing others viewed disdain prior members quite often sheer number new people brings many unwanted aspects slashdot along trolling vandalism newbie-like behavior bears similarity 1990s usenet concept eternal september many solutions proposed sites deal slashdot effect several systems automatically mirror slashdot-linked pages ensure content remains available even original site becomes unresponsive sites process slashdotted may able mitigate effect temporarily redirecting requests targeted pages one mirrors slashdot mirror sites links servers endorse third party solution mirroring content may constitute breach copyright many cases cause ad revenue lost targeted site
[ 2430, 5983, 1691, 7880, 7063, 3338, 2379, 84, 4585, 8174, 7169 ]
Validation
6,493
4
Penelope_Endersby:penelope endersby penelope penny endersby british researcher academic specialising armour explosives appointed chief executive met office december 2018 prior led cyber information systems defence science technology laboratory endersby grew north london educated haberdashers aske school girls elstree studied natural sciences university cambridge member newnham college remains associate newnham became interested materials science metallurgy sponsored british gas researching fuel cells graduating joined royal armament research development establishment 1993 endersby researcher specialising armour explosives served royal armament research development establishment becoming uk expert electric intelligent armours appointed department manager defence science technology laboratory 2009 began focus c4isr cyber security holds royal academy engineering visiting professorship university southampton endersby made division head cyber information systems division defence science technology laboratory 2015 involved international women day celebrations joined council institute physics 2017 endersby appointed chief executive met office december 2018 first woman fill role serves board ploughshare innovations ministry defence united kingdom technology transfer office endersby expert choir singer two children interested wildlife records uk phenology trustee wiltshire wildlife trust
[]
Test
6,494
0
Aikuma:aikuma aikuma android app collecting speech recordings time-aligned translations app includes text-free interface consecutive interpretation designed users literate aikuma grand prize open source software world challenge 2013 aikuma means meeting place usarufa papuan language software first used 2012 aikuma developed sponsorship national science foundation including 101,501 us project use mobile telephones collect larger amounts data undocumented endangered languages would never possible usual fieldwork aikuma modified version lig-aikuma used collecting substantial quantities audio remote indigenous villages modified version app called lig-aikuma developed université grenoble alpes lig laboratory implements new features elicitation speech text images videos
[ 1314, 5571 ]
Test
6,495
2
Smart_tag_(Microsoft):smart tag microsoft smart tags early selection-based search feature found later versions microsoft word beta versions internet explorer 6 web browser application recognizes certain words types data converts hyperlink also included microsoft office programs well visual web developer selection-based search allows user invoke online service page using mouse microsoft initially intended technology built windows xp operating system changed plans due public criticism smart tags integrated instances user might benefit added formatting assistance part microsoft control technology presented special shortcut menu listing options paste autocorrect date person name addresses among others flag entered information accordingly smart tags work actions recognizers latter checks whether information entered user included list smart tag terms action associated executed accessed dedicated smart tag button smart tags enabled microsoft word attempts recognize certain types data document example dates names automatically makes text smart tag visually indicated purple dotted underline clicking smart tag selection-based search command bring list possible actions data type example microsoft word words john smith would recognized personal name smart tagged list actions available clicked might open contact schedule meeting add contacts insert address word version 2010 smart tag auto-recognition person name smart tag features longer available within web browser smart tag technology passes way web page underlines words pre-programmed react inserts hyperlinks selecting smart tag like many selection-based search commands involved hover followed mouse click keyboard commands required invoke search click takes destination specified smart tag developer without knowledge permission web site proprietor early tests almost links offered sites products microsoft affiliates smart tags also generated third parties example company might contract technology firm develop set smart tags actions specific products services product names automatically recognized linked actions check quantity stock check price security vendors feared smart tags could used propagating viruses user tracking data collection purposes might violate user privacy another concern could used negative harmful ways linking political candidate name website negative advertising sites response criticism microsoft removed technology windows xp operating system made feature could turned ie office xp however microsoft revisited concept smart tags later versions internet explorer 8 implemented selection-based search feature called internet explorer 8 accelerators unlike smarttags feature automatically parsed page looking text interest accelerators relied upon user select text accelerator applied accelerators interface open developers accelerators included default use microsoft affiliates products could replaced within category another provider desired smart tags also included email sms text messages windows phone example dates email messages automatically recognized tapped opens window allows appointment created date field already filled
[ 4026, 7793, 6696, 1444, 555, 5378, 8183, 6991, 7176, 5571, 7734, 315, 1861, 324, 6381, 7850, 1970, 422, 5252, 3920 ]
Test
6,496
2
Tom_Rolander:tom rolander thomas alan rolander american entrepreneur engineer developer multitasking multiuser operating system mp/m created microcomputers 1979 working first employee digital research gary kildall father cp/m cp/m mp/m laid groundwork later digital research operating system families concurrent cp/m concurrent dos multiuser dos also developed cp/net 2013 granted 2013 diamond award entrepreneurial excellence university washington uw
[ 4843, 2280, 2010, 8087, 5571, 126, 3210, 7020, 7032, 3664, 1894, 2160, 6499, 8043, 4745 ]
Validation
6,497
9
High-level_programming_language:high-level programming language computer science high-level programming language programming language strong abstraction details computer contrast low-level programming languages may use natural language elements easier use may automate even hide entirely significant areas computing systems e.g memory management making process developing program simpler understandable using lower-level language amount abstraction provided defines high-level programming language 1960s high-level programming languages using compiler commonly called autocodes examples autocodes cobol fortran first high-level programming language designed computers plankalkül created konrad zuse however implemented time original contributions largely isolated developments due world war ii aside language influence superplan language heinz rutishauser also degree algol first significantly widespread high-level language fortran machine-independent development ibm earlier autocode systems algol defined 1958 1960 committees european american computer scientists introduced recursion well nested functions lexical scope also first language clear distinction value name-parameters corresponding semantics algol also introduced several structured programming concepts while-do if-then-else constructs syntax first described formal notation – backus–naur form bnf roughly period cobol introduced records also called structs lisp introduced fully general lambda abstraction programming language first time high-level language refers higher level abstraction machine language rather dealing registers memory addresses call stacks high-level languages deal variables arrays objects complex arithmetic boolean expressions subroutines functions loops threads locks abstract computer science concepts focus usability optimal program efficiency unlike low-level assembly languages high-level languages language elements translate directly machine native opcodes features string handling routines object-oriented language features file input/output may also present one thing note high-level programming languages languages allow programmer detached separated machine unlike low-level languages like assembly machine language high-level programming amplify programmer instructions trigger lot data movements background without knowledge responsibility power executing instructions handed machine programmer high-level languages intend provide features standardize common tasks permit rich debugging maintain architectural agnosticism low-level languages often produce efficient code optimization specific system architecture abstraction penalty cost high-level programming techniques pay unable optimize performance use certain hardware n't take advantage certain low-level architectural resources high-level programming exhibits features like generic data structures operations run-time interpretation intermediate code files often result execution far operations necessary higher memory consumption larger binary program size reason code needs run particularly quickly efficiently may require use lower-level language even higher-level language would make coding easier many cases critical portions program mostly high-level language hand-coded assembly language leading much faster efficient simply reliably functioning optimised program however growing complexity modern microprocessor architectures well-designed compilers high-level languages frequently produce code comparable efficiency low-level programmers produce hand higher abstraction may allow powerful techniques providing better overall results low-level counterparts particular settings high-level languages designed independent specific computing system architecture facilitates executing program written language computing system compatible support interpreted jit program high-level languages improved designers develop improvements cases new high-level languages evolve one others goal aggregating popular constructs new improved features example scala maintains backward compatibility java means programs libraries written java continue usable even programming shop switches scala makes transition easier lifespan high-level coding indefinite contrast low-level programs rarely survive beyond system architecture written without major revision engineering 'trade-off 'abstraction penalty examples high-level programming languages active use today include python visual basic delphi perl php ecmascript ruby c java many others terms high-level low-level inherently relative decades ago c language similar languages often considered high-level supported concepts expression evaluation parameterised recursive functions data types structures assembly language considered low-level today many programmers might refer c low-level lacks large runtime-system garbage collection etc basically supports scalar operations provides direct memory addressing therefore readily blends assembly language machine level cpus microcontrollers assembly language may regarded higher level often still one-to-one used without macros representation machine code supports concepts constants limited expressions sometimes even variables procedures data structures machine code turn inherently slightly higher level microcode micro-operations used internally many processors three general modes execution modern high-level languages note languages strictly interpreted languages compiled languages rather implementations language behavior use interpreting compiling example algol 60 fortran interpreted even though typically compiled similarly java shows difficulty trying apply labels languages rather implementations java compiled bytecode executed either interpreting java virtual machine jvm compiling typically just-in-time compiler hotspot jvm moreover compiling transcompiling interpreting strictly limited description compiler artifact binary executable il assembly alternatively possible high-level language directly implemented computer – computer directly executes hll code known high-level language computer architecture – computer architecture designed targeted specific high-level language burroughs large systems target machines algol 60 example
[ 3930, 2540, 5363, 5012, 3944, 6428, 383, 390, 7541, 3966, 1102, 1478, 4705, 7557, 3981, 1114, 1867, 6498, 2619, 6507, 1908, 7246, 6172, 1180, 3368, 486, 839, 6922, 4078, 8025, 5171, 5173, 7680, 5190, 1616, 5897, 3772, 6981, 3784, 7357, ...
Test
6,498
9
Low-level_programming_language:low-level programming language low-level programming language programming language provides little abstraction computer instruction set architecture—commands functions language map closely processor instructions generally refers either machine code assembly language word low refers small nonexistent amount abstraction language machine language low-level languages sometimes described close hardware programs written low-level languages tend relatively non-portable low-level languages convert machine code without compiler interpreter – second-generation programming languages use simpler processor called assembler – resulting code runs directly processor program written low-level language made run quickly small memory footprint equivalent program high-level language less efficient use memory low-level languages simple considered difficult use due numerous technical details programmer must remember comparison high-level programming language isolates execution semantics computer architecture specification program simplifies development low-level programming languages sometimes divided two categories first generation second generation machine code language computer process directly without previous transformation currently programmers almost never write programs directly machine code requires attention numerous details high-level language handles automatically furthermore requires memorizing looking numerical codes every instruction extremely difficult modify true machine code stream raw usually binary data programmer coding machine code normally codes instructions data readable form decimal octal hexadecimal translated internal format program called loader toggled computer memory front panel although programs written machine language programmers often become adept reading working core dumps debugging front panel example function hexadecimal representation 32-bit x86 machine code calculate n th fibonacci number second-generation languages provide one abstraction level top machine code early days coding computers like tx-0 pdp-1 first thing mit hackers write assemblers assembly language little semantics formal specification mapping human-readable symbols including symbolic addresses opcodes addresses numeric constants strings typically one machine instruction represented one line assembly code assemblers produce object files link object files loaded assemblers provide macros generate common sequences instructions example fibonacci number calculator x86 assembly language using masm syntax code example hardware features x86 processor registers named manipulated directly function loads input precise location stack 8 bytes higher location stored esp stack pointer performs calculation manipulating values eax ebx ecx edx registers finished returns note assembly language concept returning value result stored eax register ret command simply moves code processing code location stored stack usually instruction immediately one called function author calling code know function stores result eax retrieve x86 assembly language imposes standard returning values function fact concept function calling code examine state procedure returns needs extract value compare function c code similar structure assembly language example significant differences terms abstraction abstractions make c code compilable without modification architecture c compiler written x86 assembly language code specific x86 architecture late 1960s high-level languages pl/s bliss bcpl extended algol burroughs large systems c included degree access low-level programming functions one method inline assembly assembly code embedded high-level language supports feature languages also allow architecture-dependent compiler optimization directives adjust way compiler uses target processor architecture
[ 6507, 1908, 2540, 5897, 6249, 4662, 6969, 3772, 3944, 3852, 6712, 1361, 4047, 7071, 1180, 3784, 5218, 3966, 1102, 7457, 2403, 1854, 7557, 4611, 931, 410, 2866, 7474, 7924, 4078, 5190, 421, 154, 336, 4986, 5171, 4544, 5781, 6053, 958, 76...
Test
6,499
4
IFolder:ifolder ifolder open-source application developed novell inc. intended allow cross-platform file sharing across computer networks ifolder operates concept shared folders folder marked shared contents folder synchronized computers network either directly computers peer-to-peer fashion server intended allow single user synchronize files different computers example work computer home computer share files users example group people collaborating project core ifolder actually project called simias simias actually monitors files changes synchronizes changes controls access permissions folders actual ifolder clients including graphical desktop client web client developed separate programs communicate simias back-end originally conceived developed pgsoft company taken novell 2000 ifolder announced novell march 19 2001 released june 29 2001 software package windows nt/2000 novell netware 5.1 included forthcoming novell netware 6.0 also included ability access shared files web browser ifolder professional edition 2 announced march 13 2002 released month later added support linux solaris web access support windows ce palm os edition also designed share files millions users large companies increased reporting features administrators 2003 ifolder codie award march 22 2004 purchase linux software companies ximian suse novell announced releasing ifolder open source project gpl license also announced open source version ifolder would use mono framework effort ease development ifolder 3.0 released june 22 2005 march 31 2006 novell announced ifolder enterprise server open source april 2 2009 novell released ifolder 3.7.2 included mac client 10.4 10.5 well windows vista client addition improved client lineup version supports ssl ldapgroup support auto-account creation ifolder merge enhanced web access administration ifolder.com website completely redesigned references earlier versions nov 25 2009 novell released ifolder 3.8
[ 2984, 3172, 4759, 6256, 7714, 7343, 2390, 5571, 578, 2664, 6025, 224, 2680, 2681, 3573, 2430, 2696, 3915, 5531, 6496, 4014 ]
Test
6,500
6
Journaling_file_system:journaling file system journaling file system file system keeps track changes yet committed file system main part recording intentions changes data structure known journal usually circular log event system crash power failure file systems brought back online quickly lower likelihood becoming corrupted depending actual implementation journaling file system may keep track stored metadata resulting improved performance expense increased possibility data corruption alternatively journaling file system may track stored data related metadata implementations allow selectable behavior regard 1990 ibm jfs introduced aix 3.1 one first unix commercial filesystems implemented journaling later 1993 microsoft ntfs filesystem 2001 ext3 implemented journaling updating file systems reflect changes files directories usually requires many separate write operations makes possible interruption like power failure system crash writes leave data structures invalid intermediate state example deleting file unix file system involves three steps crash occurs step 1 step 2 orphaned inode hence storage leak crash occurs steps 2 3 blocks previously used file used new files effectively decreasing storage capacity file system re-arranging steps help either step 3 preceded step 1 crash could allow file blocks reused new file meaning partially deleted file would contain part contents another file modifications either file would show hand step 2 preceded step 1 crash would cause file inaccessible despite appearing exist detecting recovering inconsistencies normally requires complete walk data structures example tool fsck file system checker must typically done file system next mounted read-write access file system large relatively little i/o bandwidth take long time result longer downtimes blocks rest system coming back online prevent journaled file system allocates special area—the journal—in records changes make ahead time crash recovery simply involves reading journal file system replaying changes journal file system consistent changes thus said atomic divisible either succeed succeeded originally replayed completely recovery replayed skipped yet completely written journal crash occurred file systems allow journal grow shrink re-allocated regular file others put journal contiguous area hidden file guaranteed move change size file system mounted file systems may also allow external journals separate device solid-state drive battery-backed non-volatile ram changes journal may journaled additional redundancy journal may distributed across multiple physical volumes protect device failure internal format journal must guard crashes journal written many journal implementations jbd2 layer ext4 bracket every change logged checksum understanding crash would leave partially written change missing mismatched checksum simply ignored replaying journal next remount physical journal logs advance copy every block later written main file system crash main file system written write simply replayed completion file system next mounted crash write logged journal partial write missing mismatched checksum ignored next mount physical journals impose significant performance penalty every changed block must committed twice storage may acceptable absolute fault protection required logical journal stores changes file metadata journal trades fault tolerance substantially better write performance file system logical journal still recovers quickly crash may allow unjournaled file data journaled metadata fall sync causing data corruption example appending file may involve three separate writes metadata-only journal step 3 would logged step 3 done steps 1 2 replayed recovery file appended garbage write cache operating systems sorts writes using elevator algorithm similar scheme maximize throughput avoid out-of-order write hazard metadata-only journal writes file data must sorted committed storage associated metadata tricky implement requires coordination within operating system kernel file system driver write cache out-of-order write hazard also occur device write blocks immediately underlying storage flush write-cache disk due deferred write enabled complicate matters many mass storage devices write caches may aggressively reorder writes better performance particularly common magnetic hard drives large seek latencies minimized elevator sorting journaling file systems conservatively assume write-reordering always takes place sacrifice performance correctness forcing device flush cache certain points journal called barriers ext3 ext4 ufs implementations avoid journaling instead implement soft updates order writes way on-disk file system never inconsistent inconsistency created event crash storage leak recover leaks free space map reconciled full walk file system next mount garbage collection usually done background log-structured file systems write-twice penalty apply journal file system occupies entire storage device structured traversed would normal file system full copy-on-write file systems zfs btrfs avoid in-place changes file data writing data newly allocated blocks followed updated metadata would point new data disown old followed metadata pointing superblock root file system hierarchy correctness-preserving properties journal without write-twice overhead
[ 1807, 3599, 4297, 2547, 7161, 4670, 5021, 4672, 13, 3951, 3271, 6431, 3276, 3626, 5738, 5041, 7546, 5049, 7550, 405, 1855, 6117, 5760, 4347, 3990, 759, 4722, 65, 7581, 4733, 5783, 6853, 5437, 6854, 5088, 4375, 785, 2266, 788, 3682, 6505...
Train
6,501
4
Authentication_server:authentication server authentication server provides network service applications use authenticate credentials usually account names passwords users client submits valid set credentials receives cryptographic ticket subsequently use access various services authentication used basis authorization determination whether privilege may granted particular user process privacy keeps information becoming known non-participants non-repudiation inability deny done something authorized done based authentication major authentication algorithms include passwords kerberos public key encryption
[ 6049, 4945, 5149, 7865, 7589, 4261, 3794, 5449 ]
Test
6,502
2
Hackintosh:hackintosh hackintosh portmanteau hack macintosh computer runs macos device authorized apple one longer receives official software updates hackintoshing began result apple 2005 transition intel processors away powerpc since 2005 mac computers use x86-64 computer architecture computer manufacturers maintaining binary-code compatibility hackintosh laptops sometimes referred hackbooks .. apple software license macos permits software use computers apple-branded however modern macintosh computers use intel-based hardware limitations keeping software running types intel-based pcs notably companies psystar attempted release products using macos non-apple machines though many hackintosh systems designed solely macos enthusiasts various hacking forums communities methods apple uses prevent macos installed non-apple hardware protected commercial circumvention united states digital millennium copyright act dmca specific changes law regarding concept jailbreaking placed circumvention methods like legal grey area june 6 2005 apple announced plans switch intel processors worldwide developers conference released developer transition kit selected developers cost 999 efforts immediately began attempt run mac os x non-apple hardware developers quickly found error message saying pc hardware configurations supported january 10 2006 apple released 10.4.4 first generation intel-based macs imac macbook pro machines used extensible firmware interface efi platform firmware instead older style bios found x86 motherboards time february 14 2006 initial hack v10.4.4 released internet programmer pseudonym crg92 within hours apple released 10.4.5 update patched author within two weeks april 3 2006 apple released 10.4.6 update patches released within two weeks allowed users install update non-apple computers although include updated kernel 10.4.6 june hackers released 10.4.7 update non-apple computers using 10.4.4 kernel release 10.4.8 update osx86 patches used 10.4.4 kernel rest operating system version 10.4.8 however newer frameworks relied newer kernels led users 10.4.8 encountering many problems apple also started making use sse3 instructions hardware making even difficult users cpus supporting sse2 older pentium 4s get fully compatible system running solve problem hackers community released kernels instructions emulated sse2 equivalents although produced performance penalty throughout years many distros released download internet distros copies mac os x installer disc modified include additional components necessary make os run non-apple hardware prominent member community jas released many distros mac os x tiger containing patched kernels popular distros iatkos kalyway ipc ideneb niresh distros fallen favour osx86 community grew new bootloaders developed made possible use actual copies os x installer early v10.5 build 9a466 community maintained version leopard run non-apple hardware hacker handle brazilmac created one earliest patching processes made convenient users install onto 3rd party hardware using legally obtained retail version apple simplification made brazilmac patch later revisions quickly popular choice many distros five popular builds go name jas kalyway iatkos ipc ideneb although recently builds way boot-132 method described gains popularity however compilations rely work kernel hackers made lorem build 9a466 synthetix builds 9a499 9a527 9a559 toh builds 9a581 9b13 9b18 recently group calling stagexnu called voodoo darwin 9.4.0 contributions trickled various mac osx86 installers readily available internet continue refined updated builds released maintain compatibility apple releases ever-increasing number third-party components osx86 community quick make necessary modifications enable apple latest releases run non-apple hardware within hours leopard release amd/intel sse2/3 kernel patcher created removed hpet requirement original untouched mach_kernel file core component mac os snow leopard released russian hacker netkas created version chameleon boot mac os x v10.6 main problem many people forced modify dsdt use kexts due specific issues soon possible modbin dmitrik released test versions kernel allow boot snow leopard amd machines stable xnu kernels v10.6 released qoopz pcj popular builds based retail name universal intel hazard iatkos since v10.6.2 nawcom qoopz andy vandijck working legacy kernel unsupported cpus apple released developer preview 1 russian hackintosh developer usr-sse2 first created method install lion method consists deploying mac os x v10.7 image flash drive booting via xpc uefi bootloader see duet changes made chameleon source code became possible boot lion updated version chameleon dmitrik also known bronzovka luck creating kernel supported amd systems months 10.7.3 v2 amd support iatkos l2 10.7.2 intel released shortly release developer preview 1 unknown developers managed install version os x pc using modified version chameleon bootloader version released via main project starting version r1997 general public due problems sourced lion era ways installing required patches never made public leaves scene unknown state towards mountain lion since retail release mountain lion several users reported successful setups using installers purchased mac app store along updated versions chameleon tools including distros niresh distro 10.8 intel first released updated 10.8.2 amd intel 10.8.5 uefi support amd intel support versions iatkos ml2 released niresh release multiple new kernels hackintosh 10.9 works although still minor issues kernels aim allow users run mavericks amd older intel cpus lack certain instruction sets latest intel cpus significant efforts made emulate instruction sets like ssse3 present amd k10-based cpus older intel cpus like intel core duo amd latest cpus 'bulldozer architecture onwards contain almost latest instruction sets hence kernels full sse4 support also released two months niresh distro released mavericks supports amd cpus latest intel cpus also custom kernel allows intel atom processors boot mavericks niresh free distro released mavericks since iatkos team decided release mavericks distro specific hardware donation basis initial release os x yosemite 10.10 beta various developers took role updating bootloaders system members osx86 forum insanelymac set update efi bootloader chameleon new os release time later niresh independent osx86 developer released standalone tool known yosemite zone would automatically install new os various features non-apple device minimal input method consisted torrenting os x 10.10 dmg onto usb flash drive macpwn vanilla installation unibeast updated support yosemite distribution yosemite zone released amd processor support vanilla installation yosemite possible via insanelymac pandora box beta 2.0 unibeast type installation uses kexts drivers possible addition using unaltered version os x installation app preferred distributions clover chameleon updated compatible el capitan unibeast macpwn updated support el capitan well since el capitan unibeast multibeast use clover bootloader instead chimera chameleon-based bootloader clover chameleon updated compatible sierra unibeast pandora box macpwn updated support distribution sierra zone 10.12.3 released amd processor support clover macpwn unibeast updated support distro high sierra zone hackintosh zone 10.13 released amd processor support including ryzen cpus clover updated support mojave revision 4514 unibeast also received mojave support intel-based machines apple authorize use mac os x x86 pc ones developed company used technical means although trusted platform module tpm widely mis-reported tie mac os systems distributed developers announcing switch intel chips macos eula forbids installations macos non-apple-branded computer july 3 2008 apple filed lawsuit psystar corporation violating restriction among claims apple claimed psystar violated digital millennium copyright act dmca dodging copy-protection technologies apple uses protect apple employs technological protection measures effectively control access apple copyrighted works specifically apple charged psystar acquiring creating code avoids bypasses removes descrambles decrypts deactivates impairs technological protection measure without apple authority purpose gaining unauthorized access apple copyrighted works brief revealed apple considers methods uses prevent macos installed non-apple hardware protected digital millennium copyright act dmca november 13 2009 court granted apple motion summary judgment found apple copyrights violated well dmca psystar installed apple operating system non-apple computers hearing remedies set december 14 january 14 2009 gadget lab site wired magazine posted video tutorial installing msi wind netbook removed following complaint apple textual instructions remain include eula violation disclaimer may 15 2012 case apple vs. psystar corporation finally ended court ruled psystar violated apple exclusive reproduction right distribution right right create derivative works putting end case copies mac os x tiger started running non-apple hardware found processors unable run os rosetta binary translator made possible run powerpc programs intel processors later kernel required support sse3 instruction set circumvent programmers community released patched kernels included support emulating sse3 instructions using sse2 equivalents october 2005 apple released update 10.4.3 developers required nx bit microprocessor support however patches released circumvent well patched kernels also later released supported amd processors mac os x leopard released october 26 2007 patches created remove hpet requirement kernel efforts also made emulate ssse3 instruction set processors support kernel used os x mavericks made use ssse3 instructions requiring patches extensible firmware interface efi specification defines software interface operating system platform firmware since method generally require copying modification macos considered legal way installing macos non-apple computers despite untested courts early november 2007 group hackers fronted russian hacker known netkas using already modified boot-132 source root david elliot also known dfe developed method emulating efi environment using specially modified darwin bootloader practical terms meant regular pcs meeting minimum set hardware requirements could seen real macintosh computers os allowing use unmodified stock apple kernels long cpu supports thus giving transparent reliable operation several methods real world deployment innovative solution arisen around internet explanation achievement along usage guide provided website digitmemo.com true efi emulation highly sought asset osx86 community previous efforts based upon apple open source darwin project hackintosh gurus allowed users use macos normal pcs patched kernels/kernel modules simply bypassed efi using efi patch hackintosh could boot vanilla unmodified macos kernels use vanilla kernel extensions allowed system compatible future system updates also offered increased stability method also circumvents one aspect apple end user license agreement states modification non-open source components os forbidden mid-2008 new commercial product efi-x released claims allow full simple booting official leopard install disks subsequent install without patching required possibly repackaging boot-132 technology usb-attached device rebel efi another commercial product also seems use open source software thought windows 7 support efi would result pc motherboards replacing bios efi msi announced efinity mainboard early 2008 2011 efi-based computers entered market however none natively boot mac os x due lack hfs+ driver efi implementation boot-132 bootloader provided apple loading xnu kernel mid-2008 new modified boot-132 came scene method allows users conduct leopard-based osx86 installation using stock retail-purchased copy leopard eradicates necessity hacked installation like jas kalyway mentioned previously boot-132 bootloader essentially preloads environment system leopard boot operate bootloader stores necessary files kext files .img collection simply folder luxury new installation method includes ability boot install retail leopard dvd update straight apple without breaking dmca possible problem breaks macos eula bootloader behaves like linux kernel one use mboot-compatible patched syslinux used hack bootloader tells boot-dfe .img file ramdisk initrd known linux users boot-dfe use kexts mkext new boot-dfe tested retail leopard dvd boot install run leopard without build modified dvd since early developer builds mac os x v10.6 members osx86 community booting new operating system using yet another bootloader called pc efi provided russian hacker netkas bootloader voodoo team chameleon chameleon based david elliot boot-132 bootloader supports acpi smbios graphics ethernet injections allows boot macos non-macintosh hardware chameleon supports lot amd well nvidia graphics cards lot branches different developers chameleon currently 2.1 development state fakeefi invented david elliot many years ago operates assumption efi already work leaves activity traces boot-args tables tree efiruntime routines simple form memory starts kernel mach_kernel realefi theoretically flashed instead bios alternatively loadable efi used bios motherboard system invented intel currently active open source development tianocore bootloader named duet capable loading efi designed load mac os x one step needed adapt duet requirements mac os x also newer motherboards already contain efi suitable running macintosh beginning march 2011 slice discussed idea community members resulting development bootloader emulate efi firmware one choice use real uefi firmware boot mac os x march 2007 osx86 community made significant progress development live dvd live dvd allows booting working system mac os x v10.4.8 january 2 2009 insanelymac live dvd team published new method mac os x v10.5.x live dvd could produced allowing users boot fully working macos desktop dvd usb flash drive method reliable previous methods manipulated apple existing netboot imageboot functionalities behaved system running network disk easier produce requiring single script added existing installation distributions live dvd made since inception since notable method shown work normal apple mac hardware also possible run macos virtual machine inside operating systems installed standard pc hardware using virtualization software oracle virtualbox though officially supported oracle likewise also possible install macos vmware software though company states officially supported vmware running apple-labeled computers according apple licensing policies
[ 4295, 713, 5559, 1465, 578, 4077, 2430, 1502, 6051, 163, 1052, 3747, 352, 8043, 3248 ]
Test
6,503
4
Generalized_TTL_security_mechanism:generalized ttl security mechanism generalized ttl security mechanism gtsm proposed internet data transfer security method relying packet time live ipv4 hop limit ipv6 thus protect protocol stack spoofing denial service attacks desired purpose proposal verify whether packet originated adjacent node protect router infrastructure overload-based attacks protocols gtsm enabled following procedure performed many people given credit creating idea among paul traina jon stewart similar method also proposed ryan mcdowell
[ 1691, 3819 ]
Test
6,504
2
VxD:vxd vxd device driver model used microsoft windows/386 386 enhanced mode windows 3.x windows 9x extent also novell dos 7 opendos 7.01 dr-dos 7.02 higher multitasker codice_1 vxds access memory kernel running processes well raw access hardware name vxd abbreviation virtual xxx driver xxx class hardware device derives fact drivers filenames form codice_2 windows 3.x examples vjoyd.386 joystick vmm.386 memory manager vxds usually filename extension codice_3 windows 3.x codice_4 windows 9x vxds written windows 3.x used windows 9x vice versa prior advent windows dos applications would either communicate directly various pieces hardware responding interrupts reading writing device memory etc go dos device driver dos multitasking application would exclusive complete control hardware running though windows applications n't often communicate directly hardware way windows drivers still real standard modes windows 3.x windows/386 onward allowed multiple dos applications execute concurrently executing within virtual machine share physical resources among virtual machines microsoft introduced virtual device drivers drivers solved issues relating conflicting usage physical resources intercepting calls hardware instead machine port representing actual device would represent virtual device could managed operating system although windows 98 introduced windows driver model wdm vxd device drivers used windows 98 windows vxds usable windows nt descendants starting windows 2000 windows nt-based operating systems also use windows driver model windows nt 4 earlier versions must use drivers written specifically using vxd drivers instead wdm drivers windows 9x resulted advanced acpi states like hibernation unavailable vxds confused similarly named ntvdm-specific 'vdds virtual device drivers provide method emulating direct i/o windows nt dos box ntvdm vdds run regular 32-bit user-mode dlls must rely win32 api another wdm driver emulate desired i/o behalf 16-bit program
[ 7149, 6420, 714, 720, 1460, 2204, 2928, 7907, 5747, 2953, 6840, 422, 4017, 447, 4022, 4026, 7607, 1526, 3687, 4759, 2283, 5479, 7263, 126, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 3751, 1989, 8043, 4848, 6256, 4129, 807...
Test
6,505
6
ZFS:zfs zfs combined file system logical volume manager designed sun microsystems zfs scalable includes extensive protection data corruption support high storage capacities efficient data compression integration concepts filesystem volume management snapshots copy-on-write clones continuous integrity checking automatic repair raid-z native nfsv4 acls precisely configured two main implementations oracle openzfs project extremely similar making zfs widely available within unix-like systems zfs name stands nothing—briefly assigned backronym zettabyte file system longer considered initialism originally zfs proprietary closed-source software developed internally sun part solaris team led cto sun storage business unit sun fellow jeff bonwick 2005 bulk solaris including zfs licensed open-source software common development distribution license cddl opensolaris project zfs became standard feature solaris 10 june 2006 2010 sun microsystems acquired oracle zfs became registered trademark belonging oracle oracle stopped releasing updated source code new opensolaris zfs development effectively reverting oracle zfs closed source response illumos project founded maintain enhance existing open source solaris 2013 openzfs founded coordinate development open source zfs openzfs maintains manages core zfs code organizations using zfs maintain specific code validation processes required zfs integrate within systems openzfs widely used unix-like systems 2017 one analyst described openzfs proven open source data-validating enterprise file system management stored data generally involves two aspects physical volume management one block storage devices hard drives sd cards organization logical block devices seen operating system often involving volume manager raid controller array manager suitable device driver management data files stored logical block devices file system data storage zfs unusual unlike storage systems unifies roles acts volume manager file system therefore complete knowledge physical disks volumes including condition status logical arrangement volumes also files stored zfs designed ensure subject suitable hardware data stored disks lost due physical errors misprocessing hardware operating system bit rot events data corruption may happen time complete control storage system used ensure every step whether related file management disk management verified confirmed corrected needed optimized way storage controller cards separate volume file managers achieve zfs also includes mechanism dataset pool level snapshots replication including snapshot cloning described freebsd documentation one powerful features features even file systems snapshot functionality lack large numbers snapshots taken without degrading performance allowing snapshots used prior risky system operations software changes entire production live file system fully snapshotted several times hour order mitigate data loss due user error malicious activity snapshots rolled back live previous file system states viewed even large file systems leading savings comparison formal backup restore processes snapshots also cloned form new independent file systems pool level snapshot known checkpoint available allows rollback operations may affect entire pool structure add remove entire datasets examples features specific zfs include unlike many file systems zfs intended work towards specific aims primary targets enterprise standard data management commercial environments hardware capable supporting zfs capabilities data resilience resources needed serve data efficiently system configuration poorly matched zfs zfs may underperform significantly 2017 zfs benchmarks zfs developers calomel stated common system design failures include zfs acts volume manager file system terminology layout zfs storage covers two aspects many terms particular zfs list covers zfs commands allow examination physical storage terms devices vdevs organized data pools stored across vdevs various ways various commands expose in-depth statistics zfs internal status internal performance/statistics data allow settings optimized physical devices used zfs hard drives hdds ssds organized groups known vdevs virtual devices used store data vdevs fundamental part zfs conceived groups disks provide redundancy failure physical devices vdev must able maintain integrity data holds must contain enough disks risk data loss within acceptably tiny vdev become unreadable due disk errors otherwise entire pool part also fail see data recovery vdev one vdev acts independent unit redundant storage devices might vdev unused spare disks disks formatted non-zfs filing systems offline disks cache devices physical structure pool defined configuring many vdevs type adding pool zfs exposes manages individual disks within system well vdevs pools datasets volumes organized within pool data automatically distributed zfs across vdevs making pool zfs stripes data pool across vdevs pool speed efficiency vdev user defines completely independent every vdev different types vdev mixed arbitrarily single zfs system data redundancy required data protected physical device failure ensured user organize devices vdevs either using mirrored vdev raidz vdev data single device vdev may lost device develops fault data mirrored raidz vdev lost enough disks fail time system resilvered replacements due recent disk failures zfs vdev continue function service capable providing least one copy data stored although may become slower due error fixing resilvering part self-repair data integrity processes however zfs designed become unreasonably slow due self-repair unless directed administrator since one goals capable uninterrupted continual use even self checking self repair since zfs device redundancy vdev level also means pool stored across several vdevs one vdevs completely fails entire pool content lost similar raid redundancy systems require data stored capable reconstruction enough devices ensure data unlikely lost due physical devices failing therefore intended vdevs made either mirrored devices raidz array devices sufficient redundancy important data zfs automatically limit possible avoid data loss device fails backups replication also expected part data protection vdevs manipulated active use single disk additional devices added create mirrored vdev mirrored vdev physical devices added removed leave larger smaller number mirrored devices single device raidz vdev converted mirror although additional vdevs always added expand storage capacity kind including raidz device vdev marked removal zfs de-allocate data allow removed replaced note devices vdev size zfs may use full capacity disks vdev larger others applies devices within single vdev vdevs independent zfs care different vdevs different sizes built different devices also vdev shrunk size common set aside small amount unused space example 1-2gb multi-tb disk disk needs replacing possible allow slight manufacturing variances replace another disk nominal capacity slightly smaller actual capacity addition devices used main data storage zfs also allows manages devices used caching purposes single devices multiple mirrored devices fully dedicated type cache designated cache usage detailed settings fully deleted created modified without limit live use list zfs cache types given zfs handle devices formatted partitions certain purposes common use generally caches data pools given complete devices multiple complete devices top level data management zfs pool zpool zfs system multiple pools defined vdevs used pool specified pool created others added later zfs use specified vdevs maximize performance storing data – form striping across vdevs therefore important ensure vdev sufficiently redundant loss vdev pool would cause loss pool striping zfs pool expanded time adding new vdevs including system 'live storage space vdevs already allocated pool shrunk data stored across vdevs pool even yet full however explained individual vdevs modified time within stated limits new vdevs added time since addition removal mirrors marking redundant disk offline affect ability vdev store data within pools zfs recognizes two types data store since volumes presented block devices also formatted file system add zfs features file system although usual practice example zfs volume created block device presents partitioned formatted file system ext4 ntfs done either locally network using iscsi similar resulting file system accessible normal also gain zfs benefits data resilience data integrity/scrubbing snapshots additional option data compression snapshots integral feature zfs provide immutable read copies file system single point time even large file systems snapshotted many times every hour sustain tens thousands snapshots snapshot versions individual files entire dataset pool easily accessed searched restored entire snapshot cloned create new copy copied separate server replicated backup pool dataset quickly rolled back specific snapshot snapshots also compared current data check modified data.snapshots take much disk space data deleted space marked free data longer referenced current system snapshot snapshots also easy way avoid impact ransomware generally zfs expect reduce size pool tools reduce set vdevs pool stored tools remove vdevs rolled oracle zfs also exist derivatives openzfs yet generally released openzfs platforms generally therefore 2018 remove entire vdev active use reduce size pool data stored must moved another pool temporary copy made easier deleted later restored backups/copies devices making vdev freed use pool deleted recreated using fewer vdevs smaller size additional capacity added pool time simply adding devices needed defining unused devices vdevs adding new vdevs pool capacity individual vdev generally fixed defined one exception rule single drive mirrored vdevs expanded larger smaller capacities without affecting vdev operation adding larger disks replacing/removing smaller disks shown example pool expanded unused space datasets volumes within pool likewise expanded use unused pool space datasets need fixed size dynamically grow data stored volumes block devices need size defined user must manually resized required done 'live resizing example one major feature distinguishes zfs file systems designed focus data integrity protecting user data disk silent data corruption caused data degradation current spikes bugs disk firmware phantom writes previous write make disk misdirected reads/writes disk accesses wrong block dma parity errors array server memory driver since checksum validates data inside array driver errors data winds wrong buffer inside kernel accidental overwrites swapping live file system etc 1999 study showed neither then-major widespread filesystems ufs ext xfs jfs ntfs hardware raid issues data integrity provided sufficient protection data corruption problems initial research indicates zfs protects data better earlier efforts also faster ufs seen replacement within zfs data integrity achieved using fletcher-based checksum sha-256 hash throughout file system tree block data checksummed checksum value saved pointer block—rather actual block next block pointer checksummed value saved pointer checksumming continues way file system data hierarchy root node also checksummed thus creating merkle tree in-flight data corruption phantom reads/writes data written/read checksums correctly actually wrong undetectable filesystems store checksum data zfs stores checksum block parent block pointer entire pool self-validates block accessed regardless whether data meta-data checksum calculated compared stored checksum value checksums match data passed programming stack process asked values match zfs heal data storage pool provides data redundancy internal mirroring assuming copy data undamaged matching checksums optionally possible provide additional in-pool redundancy specifying means data stored twice three times disk effectively halving reducing one third storage capacity disk additionally kinds data used zfs manage pool stored multiple times default safety even default copies=1 setting copies damaged data exist reconstructed checksums parity data zfs use copy data recreate via raid recovery mechanism recalculate checksum—ideally resulting reproduction originally expected value data passes integrity check system update faulty copies known-good data redundancy restored consistency data held memory cached data arc checked default zfs expected run enterprise quality hardware error correcting ram capability check in-memory data exists enabled using debug flags zfs able guarantee data integrity needs multiple copies data usually spread across multiple disks typically achieved using either raid controller so-called soft raid built file system zfs work hardware raid devices zfs usually work efficiently greater protection data raw access storage devices disks connected system using hardware firmware soft raid controller modifies usual zfs-to-disk i/o path zfs relies disk honest view determine moment data confirmed safely written numerous algorithms designed optimize use caching cache flushing disk handling third-party device performs caching presents drives zfs single system without low level view zfs relies upon much greater chance system perform less optimally failure preventable zfs quickly fully recovered zfs example hardware raid card used zfs may able determine condition disks whether raid array degraded rebuilding may know data corruption place data optimally across disks make selective repairs control repairs balanced ongoing use may able make repairs even could usually hardware raid card interfere raid controllers also usually add controller-dependent data drives prevents software raid accessing user data possible read data compatible hardware raid controller n't always possible controller card develops fault replacement may available cards may understand manufacturer custom data needed manage restore array new card therefore unlike systems raid cards similar used offload resources processing enhance performance reliability zfs strongly recommended methods used typically reduce system performance reliability disks must connected raid controller recommended use plain hba host adapter fanout card configure card jbod mode i.e turn raid caching functions allow devices attached zfs-to-disk i/o pathway unchanged raid card jbod mode may still interfere cache depending upon design may detach drives respond time seen many energy-efficient consumer-grade hard drives may require time-limited error recovery tler /cctl/erc-enabled drives prevent drive dropouts cards suitable even raid functions disabled instead hardware raid zfs employs soft raid offering raid-z parity based like raid 5 similar disk mirroring similar raid 1 schemes highly flexible raid-z data/parity distribution scheme like raid-5 uses dynamic stripe width every block raid stripe regardless blocksize resulting every raid-z write full-stripe write combined copy-on-write transactional semantics zfs eliminates write hole error raid-z also faster traditional raid 5 need perform usual read-modify-write sequence stripes different sizes raid-z reconstruction traverse filesystem metadata determine actual raid-z geometry would impossible filesystem raid array separate products whereas becomes feasible integrated view logical physical structure data going metadata means zfs validate every block 256-bit checksum goes whereas traditional raid products usually addition handling whole-disk failures raid-z also detect correct silent data corruption offering self-healing data reading raid-z block zfs compares checksum data disks return right answer zfs reads parity figures disk returned bad data repairs damaged data returns good data requestor raid-z mirroring require special hardware need nvram reliability need write buffering good performance data protection raid-z zfs provides fast reliable storage using cheap commodity disks five different raid-z modes raid-z0 similar raid 0 offers redundancy raid-z1 similar raid 5 allows one disk fail raid-z2 similar raid 6 allows two disks fail raid-z3 raid 7 configuration allows three disks fail mirroring similar raid 1 allows one disk fail need raid-z3 arose early 2000 muti-terabyte capacity drives became common increase capacity without corresponding increase throughput speeds meant rebuilding array due failed drive could take weeks even months complete time older disks array stressed additional workload could result data corruption drive failure increasing parity raid-z3 reduces chance data loss simply increasing redundancy zfs tool equivalent fsck standard unix linux data checking repair tool file systems instead zfs built-in scrub function regularly examines data repairs silent corruption problems differences official recommendation sun/oracle scrub enterprise-level disks month cheaper commodity disks week zfs 128-bit file system address 1.84 × 10 times data 64-bit systems btrfs maximum limits zfs designed large never encountered practice instance fully populating single zpool 2 bits data would require 3×10 tb hard disk drives theoretical limits zfs oracle solaris encryption capability zfs embedded i/o pipeline writes block may compressed encrypted checksummed deduplicated order policy encryption set dataset level datasets file systems zvols created wrapping keys provided user/administrator changed time without taking file system offline default behaviour wrapping key inherited child data sets data encryption keys randomly generated dataset creation time descendant datasets snapshots clones share data encryption keys command switch new data encryption key clone time provided—this re-encrypt already existing data instead utilising encrypted master-key mechanism zfs automatically allocate data storage across vdevs pool devices vdev way generally maximises performance pool zfs also update write strategy take account new disks added pool added general rule zfs allocates writes across vdevs based free space vdev ensures vdevs proportionately less data already given writes new data stored helps ensure pool becomes used situation develop vdevs become full forcing writes occur limited number devices also means data read reads much frequent writes uses different parts data read many disks possible time giving much higher read performance therefore general rule pools vdevs managed new storage added situation arise vdevs pool almost full others almost empty make pool less efficient pools hot spares compensate failing disks mirroring block devices grouped according physical chassis filesystem continue case failure entire chassis storage pool composition limited similar devices consist ad-hoc heterogeneous collections devices zfs seamlessly pools together subsequently doling space needed arbitrary storage device types added existing pools expand size storage capacity vdevs available file system instances zpool quota set limit amount space file system instance occupy reservation set guarantee space available file system instance zfs uses different layers disk cache speed read write operations ideally data stored ram usually expensive therefore data automatically cached hierarchy optimize performance versus cost often called hybrid storage pools frequently accessed data stored ram less frequently accessed data stored slower media solid state drives ssds data often accessed cached left slow hard drives old data suddenly read lot zfs automatically move ssds ram zfs caching mechanisms include one reads writes case two levels caching exist one computer memory ram one fast storage usually solid state drives ssds total four caches number caches cache divisions queues also exist within zfs example vdev data cache arc cache divided data stored user metadata used zfs control balance zfs uses copy-on-write transactional object model block pointers within filesystem contain 256-bit checksum 256-bit hash currently choice fletcher-2 fletcher-4 sha-256 target block verified block read blocks containing active data never overwritten place instead new block allocated modified data written metadata blocks referencing similarly read reallocated written reduce overhead process multiple updates grouped transaction groups zil intent log write cache used synchronous write semantics required blocks arranged tree checksums see merkle signature scheme advantage copy-on-write zfs writes new data blocks containing old data retained allowing snapshot version file system maintained zfs snapshots consistent reflect entire data existed single point time created extremely quickly since data composing snapshot already stored entire storage pool often snapshotted several times per hour also space efficient since unchanged data shared among file system snapshots snapshots inherently read-only ensuring modified creation although relied sole means backup entire snapshots restored also files directories within snapshots writeable snapshots clones also created resulting two independent file systems share set blocks changes made clone file systems new data blocks created reflect changes unchanged blocks continue shared matter many clones exist implementation copy-on-write principle zfs file systems moved pools also remote hosts network send command creates stream representation file system state stream either describe complete contents file system given snapshot delta snapshots computing delta stream efficient size depends number blocks changed snapshots provides efficient strategy e.g. synchronizing offsite backups high availability mirrors pool dynamic striping across devices maximize throughput means additional devices added zpool stripe width automatically expands include thus disks pool used balances write load across zfs uses variable-sized blocks 128 kb default size available features allow administrator tune maximum block size used certain workloads perform well large blocks data compression enabled variable block sizes used block compressed fit smaller block size smaller size used disk use less storage improve io throughput though cost increased cpu use compression decompression operations zfs filesystem manipulation within storage pool easier volume manipulation within traditional filesystem time effort required create expand zfs filesystem closer making new directory volume manipulation systems pools associated zfs file systems moved different platform architectures including systems implementing different byte orders zfs block pointer format stores filesystem metadata endian-adaptive way individual metadata blocks written native byte order system writing block reading stored endianness match endianness system metadata byte-swapped memory affect stored data usual posix systems files appear applications simple arrays bytes applications creating reading data remain responsible way independent underlying system endianness data deduplication capabilities added zfs source repository end october 2009 relevant opensolaris zfs development packages available since december 3 2009 build 128 effective use deduplication may require large ram capacity recommendations range 1 5 gb ram every tb storage accurate assessment memory required deduplication made referring number unique blocks pool number bytes disk ram core required store record figures reported inbuilt commands zpool zdb insufficient physical memory lack zfs cache result virtual memory thrashing using deduplication cause performance plummet result complete memory starvation deduplication occurs write-time also cpu-intensive also significantly slow system storage vendors use modified versions zfs achieve high data compression ratios two examples 2012 greenbytes tegile may 2014 oracle bought greenbytes zfs deduplication replication technology described deduplication usually recommended due heavy resource requirements especially ram impact performance especially writing specific circumstances system data well-suited space-saving technique authors 2010 study examined ability file systems detect prevent data corruption particular focus zfs observed zfs effective detecting correcting data errors storage devices assumes data ram safe prone error study comments single bit flip memory causes small non-negligible percentage runs experience failure probability committing bad data disk varying 0 3.6 according workload zfs caches pages stores copies metadata ram holds data dirty cache writing disk test made whether checksums still match data point use much risk mitigated one two ways zfs protect data disk failure needs configured redundant storage either raid-z mirrored data copied least two disks single disk used redundant copies data enabled duplicates data logical drive far less safe since vulnerable failure single disk using zfs copies good feature use notebooks desktop computers since disks large least provides limited redundancy single drive historically zfs shipped tools fsck repair damaged file systems file system designed self-repair long built sufficient attention design storage redundancy data pool compromised poor hardware inadequate design redundancy unfortunate mishap point zfs unable mount pool traditionally tools allowed end-user attempt partial salvage stored data led threads online forums zfs developers sometimes tried provide ad-hoc help home small scale users facing loss data due inadequate design poor system management modern zfs improved considerably situation time continues zfs part sun solaris operating system thus available sparc x86-based systems oracle solaris 11 express release os/net consolidation main os code made proprietary closed-source zfs upgrades implementations inside solaris encryption compatible non-proprietary implementations use previous versions zfs creating new zfs pool retain ability use access pool non-proprietary solaris-based distributions recommended upgrade solaris 11 express opensolaris snv_134b thereby stay zfs version 28 opensolaris 2008.05 2008.11 2009.06 use zfs default filesystem dozen 3rd-party distributions nearly dozen mentioned openindiana illumos two new distributions included opensolaris distribution reference page openindiana uses openzfs feature flags implemented illumos zfs version 28 used version 151a3 upgrading opensolaris snv_134 openindiana solaris 11 express one also ability upgrade separately boot solaris 11 express zfs pool one install solaris 11 express first zfs incompatibilities introduced oracle past zfs version 28 openzfs osx abbreviated o3x implementation zfs macos o3x active development close relation zfs linux illumos zfs implementation maintaining feature flag compatibility zfs linux o3x implements zpool version 5000 includes solaris porting layer spl originally written maczfs enhanced include memory management layer based illumos kmem vmem allocators o3x fully featured supporting lz4 compression deduplication arc l2arc slog maczfs free software providing support zfs macos stable legacy branch provides zfs pool version 8 zfs filesystem version 2 development branch based zfs linux openzfs provides updated zfs functionality zfs zpool version 5000 feature flags proprietary implementation zfs zevo available cost greenbytes inc. implementing zfs file system version 5 zfs pool version 28 zevo offered limited zfs feature set pending commercial development sold oracle 2014 unknown future plans edward o'callaghan started initial port zfs dragonflybsd netbsd zfs port started part 2007 google summer code august 2009 code merged netbsd source tree paweł jakub dawidek ported zfs freebsd part freebsd since version 7.0 includes zfsboot allows booting freebsd directly zfs volume freebsd zfs implementation fully functional missing features kernel cifs server iscsi latter added using externally available packages samba used provide userspace cifs server freebsd 7-stable updates series versions 7.x committed uses zpool version 6 freebsd 8 includes much-updated implementation zfs zpool version 13 supported zpool version 14 support added 8-stable branch january 11 2010 included freebsd release 8.1. zpool version 15 supported release 8.2 8-stable branch gained support zpool version v28 zfs version 5 early june 2011 changes released mid-april 2012 freebsd 8.3 freebsd 9.0-release uses zfs pool version 28 freebsd 9.2-release first freebsd version use new feature flags based implementation thus pool version 5000 midnightbsd desktop operating system derived freebsd supports zfs storage pool version 6 0.3-release derived code included freebsd 7.0-release update storage pool 28 progress 0.4-current based 9-stable sources around freebsd 9.1-release code trueos formerly known pc-bsd desktop-oriented distribution freebsd inherits zfs support freenas embedded open source network-attached storage nas distribution based freebsd zfs support freebsd pc-bsd zfs guru embedded open source network-attached storage nas distribution based freebsd pfsense open source bsd based router supports zfs including installation booting zfs pools version 2.4 nas4free embedded open source network-attached storage nas distribution based freebsd zfs support freebsd zfs storage pool version 5000 project continuation freenas 7 series project based freebsd kernel debian gnu/kfreebsd zfs support kernel however additional userland tools required possible zfs root /boot file system case required grub configuration performed debian installer since wheezy release 31 january 2013 zpool version available 14 squeeze release 28 wheezy-9 release although zfs filesystem supports linux-based operating systems difficulties arise linux distribution maintainers wishing provide native support zfs products due potential legal incompatibilities cddl license used zfs code gpl license used linux kernel enable zfs support within linux loadable kernel module containing cddl-licensed zfs code must compiled loaded kernel according free software foundation wording gpl license legally prohibits redistribution resulting product derivative work though viewpoint caused controversy one potential workaround licensing incompatibility trialed 2006 experimental port zfs code linux fuse system filesystem ran entirely userspace instead integrated linux kernel therefore considered derivative work kernel approach functional suffered significant performance penalties compared integrating filesystem native kernel module running kernel space 2016 zfs fuse project appears defunct native port zfs linux produced lawrence livermore national laboratory llnl released march 2013 following key events zfs linux uses openzfs pool version number 5000 indicates features supports defined via feature flags pool version unchanging number expected never conflict version numbers given oracle another native port linux developed kq infotech 2010 port used zvol implementation lawrence livermore national laboratory starting point release supporting zpool v28 announced january 2011 april 2011 kq infotech acquired stec inc. work zfs ceased source code port found github work kq infotech ultimately integrated llnl native port zfs linux license incompatibility may arise distribution compiled binaries containing zfs code generally agreed distribution source code affected gentoo configuring zfs root filesystem well documented required packages installed package repository slackware also provides documentation supporting zfs kernel module built kernel question cddl license compatibility gpl license resurfaced 2015 linux distribution ubuntu announced intended make precompiled openzfs binary kernel modules available end-users directly distribution official package repositories 2016 ubuntu announced legal review resulted conclusion providing support zfs via binary kernel module violation provisions gpl license others software freedom law center followed ubuntu conclusion fsf sfc reiterated opposing view ubuntu 16.04 lts xenial xerus released april 21 2016 allows user install openzfs binary packages directly ubuntu software repositories legal challenge brought canonical regarding distribution packages 2019 ubuntu support install zfs root filesystem maas allows zfs installed root filesystem port open source zfs attempted 2010 hiatus one year development ceased 2012 october 2017 new port openzfs announced jörgen lundman openzfs developer summit list operating systems distributions add-ons support zfs zpool version supports solaris build based zfs designed implemented team sun led jeff bonwick bill moore matthew ahrens announced september 14 2004 development started 2001 source code zfs integrated main trunk solaris development october 31 2005 released part build 27 opensolaris november 16 2005 sun announced zfs included 6/06 update solaris 10 june 2006 one year opening opensolaris community name one point said stand zettabyte file system 2006 longer considered abbreviation zfs file system store 256 quadrillion zettabytes zb september 2007 netapp sued sun claiming zfs infringed netapp patents write anywhere file layout sun counter-sued october year claiming opposite lawsuits ended 2010 undisclosed settlement following list events development open-source zfs implementations first indication apple inc. interest zfs april 2006 post opensolaris.org zfs-discuss mailing list apple employee mentioned interested porting zfs mac os x operating system release version mac os x 10.5 zfs available read-only mode command line lacks possibility create zpools write 10.5 release apple released zfs beta seed v1.1 allowed read-write access creation zpools however installer zfs beta seed v1.1 reported work version 10.5.0 updated version 10.5.1 august 2007 apple opened zfs project mac os forge web site site apple provided source code binaries port zfs includes read-write access installer available third-party developer created one october 2009 apple announced shutdown zfs project mac os forge say hosting involvement zfs summarily discontinued explanation given following statement zfs project discontinued mailing list repository also removed shortly apple would eventually release legally required cddl-derived portion source code final public beta zfs code named 10a286 complete zfs support advertised feature snow leopard server mac os x server 10.6 however time operating system released references feature silently removed features page apple commented regarding omission apple 10a286 source code release versions previously released source binaries preserved new development adopted group enthusiasts maczfs project acted quickly mirror public archives apple project materials would disappeared internet resume development elsewhere maczfs community curated matured project supporting zfs mac os releases since 10.5 project active mailing list july 2012 maczfs implements zpool version 8 zfs version 2 october 2008 release solaris additional historical information commentary found maczfs web site faq 17th september 2013 launch openzfs included zfs-osx become new version maczfs distribution darwin zfs oracle solaris new features introduced version numbers pool file system incremented designate format features available features available specific file system versions require specific pool version distributed development openzfs involves feature flags pool version 5000 unchanging number expected never conflict version numbers given oracle legacy version numbers still exist pool versions 1–28 implied version 5000 illumos uses pool version 5000 purpose future on-disk format changes enabled disabled independently via feature flags note solaris version development sun since release solaris 10 2005 codenamed 'nevada derived opensolaris codebase 'solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled successively new opensolaris 'nevada snapshot builds opensolaris discontinued openindiana forked final build b134 opensolaris published oracle 2010-nov-12 upgrade path solaris 11 express
[ 1438, 7161, 22, 5760, 1494, 1502, 5786, 4375, 1523, 1534, 1547, 4406, 7258, 4418, 1561, 1562, 5842, 5843, 5859, 4441, 5865, 4444, 163, 1605, 174, 5889, 1624, 5900, 4480, 7335, 191, 200, 4494, 1640, 4498, 7355, 212, 1666, 3129, 3134, 242...
Test
6,506
7
Cloudera:cloudera cloudera inc. us-based software company provides software platform data engineering data warehousing machine learning analytics runs cloud premises cloudera started hybrid open-source apache hadoop distribution cdh cloudera distribution including apache hadoop targeted enterprise-class deployments technology cloudera states 50 engineering output donated upstream various apache-licensed open source projects apache spark apache hive apache avro apache hbase combine form apache hadoop platform cloudera also sponsor apache software foundation cloudera founded 2008 three engineers google yahoo facebook christophe bisciglia amr awadallah jeff hammerbacher respectively joined former oracle executive mike olson form cloudera 2008 olson ceo sleepycat software creator open-source embedded database engine berkeley db acquired oracle 2006 awadallah yahoo ran one first business units using apache hadoop data analysis facebook hammerbacher used hadoop building analytic applications involving massive volumes user data architect doug cutting also former chairman apache software foundation authored open-source lucene nutch search technologies mike cafarella wrote initial hadoop software 2004 designed managed hadoop storage analysis cluster yahoo joining cloudera 2009 chief operating officer kirk dunn 2015 march 2009 cloudera announced availability cloudera distribution including apache hadoop conjunction 5 million investment led accel partners 2011 company raised 40 million ignition partners accel partners greylock partners meritech capital partners in-q-tel venture capital firm open connections cia june 2013 tom reilly became chief executive although olson remained chairman board chief strategist reilly chief executive arcsight acquired hewlett-packard 2010 march 2014 cloudera announced 900 million funding round led intel capital 740 million intel received 18 share cloudera intel dropped hadoop distribution dedicated 70 intel engineers work exclusively cloudera projects additional funds came rowe price google ventures affiliate msd capital l.p. private investment firm michael s. dell others january 2012 oracle corporation announced partnership cloudera oracle big data appliance january 2013 dell announced partnership cloudera march 2013 intel invested 740 million cloudera 18 investment may 2013 sas institute announced partnership june 2014 accenture announced service offering based cloudera june 2014 cloudera acquired gazzang developed encryption key management software october 2014 cloudera announced first payment card industry data security standard pci mastercard february 2015 deloitte announced alliance cloudera may 2015 capgemini announced marketing program sap hana cloudera july 9 2015 cloudera announced partnership teradata september 2015 cloudera announced kudu storage manager september 2015 microsoft azure announced full support cloudera enterprise january 2016 tata consultancy services announced internet things framework based cloudera sensor data analytics february 2016 emc announces evolution advanced storage dssd support cloudera 2016 cloudera ranked 5 forbes cloud 100 list cloudera filed initial public offering march 2017 april 28 2017 shares listed new york stock exchange symbol cldr september 2017 cloudera acquired fast forward labs ffl leading machine learning applied artificial intelligence research development company effort deepen cloudera ’ expertise application machine learning practical business problems new division headed ffl co-founder ceo hilary mason october 2018 cloudera hortonworks announced would merging all-stock merger equals.. merger completed january 2019 cloudera offers software services support five bundles available on-premise across multiple cloud providers cloudera also offers managed-service offering cloud cloudera also offers following free software versions additional technologies addition open-source distribution
[ 3764, 7705, 4298, 5728, 7805, 6092, 7444, 1105, 840, 679, 5863, 6387, 7502, 1511, 972 ]
Test
6,507
9
Programming_paradigm:programming paradigm programming paradigms way classify programming languages based features languages classified multiple paradigms paradigms concerned mainly implications execution model language allowing side effects whether sequence operations defined execution model paradigms concerned mainly way code organized grouping code units along state modified code yet others concerned mainly style syntax grammar common programming paradigms include symbolic techniques reflection allow program refer might also considered programming paradigm however compatible major paradigms thus real paradigm right example languages fall imperative paradigm two main features state order operations occur constructs explicitly control order allow side effects state modified one point time within one unit code later read different point time inside different unit code communication units code explicit meanwhile object-oriented programming code organized objects contain state modified code part object object-oriented languages also imperative languages contrast languages fit declarative paradigm state order execute operations instead supply number operations available system along conditions allowed execute implementation language execution model tracks operations free execute chooses order comparison multi-paradigm programming languages software engineering process defined differing methodologies programming languages models computation defined differing paradigms languages designed support one paradigm smalltalk supports object-oriented programming haskell supports functional programming programming languages support multiple paradigms object pascal c++ java c scala visual basic common lisp scheme perl php python ruby wolfram language oz f example programs written c++ object pascal php purely procedural purely object-oriented contain elements paradigms software designers programmers decide use paradigm elements object-oriented programming programs treated set interacting objects functional programming programs treated sequence stateless function evaluations programming computers systems many processors process-oriented programming programs treated sets concurrent processes act logical shared data structures many programming paradigms well known techniques forbid enable instance pure functional programming disallows use side-effects structured programming disallows use goto statement partly reason new paradigms often regarded doctrinaire overly rigid accustomed earlier styles yet avoiding certain techniques make easier understand program behavior prove theorems program correctness programming paradigms also compared programming models allow invoking execution model using api programming models also classified paradigms based features execution model parallel computing using programming model instead language common reason details parallel hardware leak abstractions used program hardware causes programmer map patterns algorithm onto patterns execution model inserted due leakage hardware abstraction consequence one parallel programming language maps well computation problems thus convenient use base sequential language insert api calls parallel execution models via programming model parallel programming models classified according abstractions reflect hardware shared memory distributed memory message passing notions place visible code forth considered flavors programming paradigm apply parallel languages programming models programming language researchers criticise notion paradigms classification programming languages e.g harper krishnamurthi argue many programming languages strictly classified one paradigm rather include features several paradigms see comparison multi-paradigm programming languages different approaches programming developed time identified either time retrospectively early approach consciously identified structured programming advocated since mid 1960s concept programming paradigm dates least 1978 turing award lecture robert w. floyd entitled paradigms programming cites notion paradigm used thomas kuhn structure scientific revolutions 1962 lowest-level programming paradigms machine code directly represents instructions contents program memory sequence numbers assembly language machine instructions represented mnemonics memory addresses given symbolic labels sometimes called first- second-generation languages 1960s assembly languages developed support library copy quite sophisticated conditional macro generation preprocessing abilities call subroutines external variables common sections globals enabling significant code re-use isolation hardware specifics via use logical operators read/write/get/put assembly still used time critical systems often embedded systems gives direct control machine next advance development procedural languages third-generation languages first described high-level languages use vocabulary related problem solved example languages follow procedural paradigm describe step step exactly procedure according particular programmer least followed solve specific problem efficacy efficiency solution therefore entirely subjective highly dependent programmer experience inventiveness ability following widespread use procedural languages object-oriented programming oop languages created simula smalltalk c++ c eiffel php java languages data methods manipulate kept one unit called object perfect encapsulation one distinguishing features oop way another object user would able access data via object methods thus inner workings object may changed without affecting code uses object still controversy raised alexander stepanov richard stallman programmers concerning efficacy oop paradigm versus procedural paradigm need every object associative methods leads skeptics associate oop software bloat attempt resolve dilemma came polymorphism object-oriented programming considered paradigm language possible create even object-oriented assembler language high level assembly hla example fully supports advanced data types object-oriented assembly language programming despite early origins thus differing programming paradigms seen rather like motivational memes advocates rather necessarily representing progress one level next precise comparisons efficacy competing paradigms frequently made difficult new differing terminology applied similar entities processes together numerous implementation distinctions across languages literate programming form imperative programming structures programs human-centered web hypertext essay documentation integral program program structured following logic prose exposition rather compiler convenience independent imperative branch declarative programming paradigms developed languages computer told problem solve problem program structured set properties find expected result procedure follow given database set rules computer tries find solution matching desired properties archetype declarative language fourth generation language sql family functional languages logic programming functional programming subset declarative programming programs written using paradigm use functions blocks code intended behave like mathematical functions functional languages discourage changes value variables assignment making great deal use recursion instead logic programming paradigm views computation automated reasoning body knowledge facts problem domain expressed logic formulas programs executed applying inference rules answer problem found set formulas proved inconsistent symbolic programming paradigm describes programs able manipulate formulas program components data programs thus effectively modify appear learn making suited applications artificial intelligence expert systems natural-language processing computer games languages support paradigm include lisp prolog differentiable programming structures programs differentiated throughout usually via automatic differentiation programming languages support one programming paradigm allow programmers use suitable programming style associated language constructs given job
[ 1445, 4302, 5734, 1478, 84, 95, 7246, 111, 1549, 1557, 1569, 154, 7298, 160, 7303, 1600, 5878, 5883, 3069, 1607, 180, 3075, 4472, 185, 4497, 3106, 214, 4508, 5932, 1655, 3115, 1662, 7382, 7383, 7385, 5948, 236, 244, 3141, 4543, 5965, ...
Test
6,508
4
Agent.BTZ:agent.btz agent.btz also named autorun computer worm infects usb flash drives spyware variant sillyfdc worm used massive 2008 cyberattack us military agent.btz worm dll file written assembler x86-32 bit spreads creating autorun.inf file root drive dll file ability scan computers data open backdoors send backdoors remote command control server 2008 us military base middle east usb flash drive infected agent.btz inserted laptop attached united states central command spread undetected systems classified unclassified order try stop spread worm pentagon banned usb drives removable media device also disabled windows autorun feature computers pentagon spent nearly 14 months cleaning worm military networks russian hackers thought behind attack used code made agent.btz previous attacks according article economist clear agent.btz designed specifically target military networks indeed comes either russia china article los angeles times reported us defense officials described malicious software apparently designed specifically target military networks thought inside russia although clear whether destructive program created individual hacker whether russian government may involvement 2010 american journalist noah shachtman wrote article investigate theory worm written single hacker later analyses kaspersky lab found relations spyware including red october turla flame december 2016 united states fbi dhs issued joint analysis report included attribution agent.btz one russian civilian military intelligence services ris
[ 5452, 4025, 74, 336 ]
Test
6,509
9
Sanguino3_G-Code:sanguino3 g-code sanguino3 g-code protocol 3rd-generation reprap project electronics communicate host machine well protocol reprap host communicates subsystems also written binary format storage later replay usually file .s3g extension protocol intended simplification g-code ease processing somewhat limited cpu sanguino arduino-based controller
[]
Test
6,510
9
Advanced_Multimedia_Supplements:advanced multimedia supplements computing advanced multimedia supplements also jsr-234 amms api specification java platform practically speaking extension jsr 135 mobile media api providing new features positional 3d audio processing audio video effects processing better controls digital camera better support analog radio tuner including radio data system amms developed java community process jsr 234 jsr-234 defines six feature sets namely media capabilities define minimum implementation requirements order try avoid fragmentation define common minimal base line implementations every jsr-234 implementation must support least one media capability six media capabilities described table addition media capabilities device free support optional features including also implementations targeted mainly mobile device manufacturers
[ 2520, 2564, 5062, 6280, 2422 ]
Validation
6,511
2
IBM_Power_(software):ibm power software power ibm operating system enhancement package provided spooling facilities ibm system/360 running dos/360 retrofitted modified dos/360 upgrades power/vs power/vse available ibm system/370 running dos/vs dos/vse respectively power acronym priority output writers execution processors input readers power operating system enhancement available dos/360 dos/vs dos/vse came packaged third party dos-based operating systems international business machines released power 1969 following public introduction ibm wall street data center 'spooled queued printer card data freeing programs dependent upon speed printers punched card equipment power competed non-ibm products namely datacorp spooler sdi grasp unlike products power required dedicated partition allowed single printer 1403/2311 punch 2520 2540 reader 2540 2501 shared two processing partitions input data asynchronously loaded directed proper partition job class output directed disk stored directed printer punch writer type prt pun job class priority form code provided prt pun control cards input stream operator put proper form printer/punch told power start g pun g prt console device would continue output type available new form encountered would alert operator change forms wait next go command product ran ibm systems s/360 model 30 larger machines generally smaller machines less 128k core memory would called ram today actually magnetic cores strung wire matrices ability run power power/vs ran well later s/370 series usually models 135 145 later 4331 4341 product ran several dos-related platforms hardware platforms included clones included
[ 2810, 6507, 3166, 7331, 1456, 5571, 1376, 7999, 839, 2769, 7017, 330, 5424, 1600, 2354, 360 ]
Test
6,512
5
Directory_Access_Protocol:directory access protocol directory access protocol dap computer networking standard promulgated itu-t iso 1988 accessing x.500 directory service dap intended used client computer systems popular implementations full osi protocol stack desktop computers available run hardware operating systems typical time basic operations dap bind read list search compare modify add delete modifyrdn adapted novell directory services nds internet lightweight directory access protocol ldap dap specified x.511
[ 7144 ]
Test
6,513
9
Codea:codea codea lua code editor ios devices made two lives left designed rapidly prototyping visual ideas especially games simulations finished projects exported directly app xcode closely related processing programming language using many methods drawing functions found processing codea released app store late 2011 making one first ios lua editors april 2012 first game programmed entirely ipad using codea released app store march 2014 codea 2.0 released added 64-bit architecture redesigned code editor various api improvements october 4 2017 version 2.5 released added 3d voxel editing capability construction 3d worlds loading 3d models wavefront .obj file format also added february 2018 latest version codea released 2.52
[ 3368, 7308, 6312 ]
Validation
6,514
2
Input/Output_Configuration_Program:input/output configuration program original s/360 s/370 architectures processor set i/o channels addressed i/o devices 12-bit cuu address containing 4-bit channel number 8-bit unit device number sent channel bus order select device operating system configured reflect processor cuu address device operating system logic queue pending i/o channel handle selection alternate channels initiating i/o channel different processor required causing shoulder tap interrupt processor could initiate i/o starting ibm 3081 ibm 4381 s/370-extended architecture mode ibm changed i/o architecture allow channel subsystem handle channel scheduling operating system handle s/370 mode new i/o architecture used 16-bit channel path id chpid channel subsystem responsible mapping chpid channel device numbers queuing i/o requests selecting available paths installation responsible defining input/output configuration data sets iocds operator could select specific iocds part power reset por input/output configuration program iocp program ibm mainframes compiles description channel subsystem lpar configuration optionally loading input/output configuration data set iocds recognizes syntax mvs configuration program mvscp input need maintain separate input files direct use iocp mvscp mostly supplanted hardware configuration definition hcd
[ 7331, 4421, 5571 ]
Train
6,515
4
Mobile_security:mobile security mobile security specifically mobile device security become increasingly important mobile computing particular concern security personal business information stored smartphones users businesses use smartphones communicate also plan organize users work also private life within companies technologies causing profound changes organization information systems therefore become source new risks indeed smartphones collect compile increasing amount sensitive information access must controlled protect privacy user intellectual property company smartphones computers preferred targets attacks attacks exploit weaknesses inherent smartphones come communication mode—like short message service sms aka text messaging multimedia messaging service mms wifi bluetooth gsm de facto global standard mobile communications also exploits target software vulnerabilities browser operating system malicious software relies weak knowledge average user security countermeasures developed applied smartphones security different layers software dissemination information end users good practices observed levels design use development operating systems software layers downloadable apps smartphone user exposed various threats use phone last two-quarters 2012 number unique mobile threats grew 261 according abi research threats disrupt operation smartphone transmit modify user data applications must guarantee privacy integrity information handle addition since apps could malware functionality activities limited example restricting apps accessing location information via gps blocking access user address book preventing transmission data network sending sms messages billed user etc. three prime targets attackers number threats mobile devices including annoyance stealing money invading privacy propagation malicious tools source attacks actors found non-mobile computing space smartphone infected attacker attacker attempt several things attacks derive flaws management sms mms mobile phone models problems managing binary sms messages possible sending ill-formed block cause phone restart leading denial service attacks user siemens s55 received text message containing chinese character would lead denial service another case standard requires maximum size nokia mail address 32 characters nokia phones verify standard user enters email address 32 characters leads complete dysfunction e-mail handler puts commission attack called curse silence study safety sms infrastructure revealed sms messages sent internet used perform distributed denial service ddos attack mobile telecommunications infrastructure big city attack exploits delays delivery messages overload network another potential attack could begin phone sends mms phones attachment attachment infected virus upon receipt mms user choose open attachment opened phone infected virus sends mms infected attachment contacts address book real-world example attack virus commwarrior uses address book sends mms messages including infected file recipients user installs software received via mms message virus began send messages recipients taken address book attacker may try break encryption mobile network gsm network encryption algorithms belong family algorithms called a5 due policy security obscurity possible openly test robustness algorithms originally two variants algorithm a5/1 a5/2 stream ciphers former designed relatively strong latter designed weak purpose allow easy cryptanalysis eavesdropping etsi forced countries typically outside europe use a5/2 since encryption algorithm made public proved possible break encryption a5/2 could broken fly a5/1 6 hours july 2007 3gpp approved change request prohibit implementation a5/2 new mobile phones means decommissioned longer implemented mobile phones stronger public algorithms added gsm standard a5/3 a5/4 block ciphers otherwise known kasumi uea1 published etsi network support a5/1 a5 algorithm implemented phone base station specify a5/0 null-algorithm whereby radio traffic sent unencrypted even case mobile phones able use 3g 4g much stronger encryption 2g gsm base station downgrade radio communication 2g gsm specify a5/0 encryption basis eavesdropping attacks mobile radio networks using fake base station commonly called imsi catcher addition tracing mobile terminals difficult since time mobile terminal accessing accessed network new temporary identity tmsi allocated mobile terminal tsmi used identity mobile terminal next time accesses network tmsi sent mobile terminal encrypted messages encryption algorithm gsm broken attacker intercept unencrypted communications made victim smartphone attacker try eavesdrop wi-fi communications derive information e.g username password type attack unique smartphones vulnerable attacks often wi-fi means communication access internet security wireless networks wlan thus important subject initially wireless networks secured wep keys weakness wep short encryption key connected clients addition several reductions search space keys found researchers wireless networks protected wpa security protocol wpa based temporal key integrity protocol tkip designed allow migration wep wpa equipment already deployed major improvements security dynamic encryption keys small networks wpa pre-shared key based shared key encryption vulnerable length shared key short limited opportunities input i.e numeric keypad mobile phone users might define short encryption keys contain numbers increases likelihood attacker succeeds brute-force attack successor wpa called wpa2 supposed safe enough withstand brute force attack gsm attacker succeeds breaking identification key possible attack phone also entire network connected many smartphones wireless lans remember already connected mechanism prevents user re-identify connection however attacker could create wifi access point twin parameters characteristics real network using fact smartphones remember networks could confuse two networks connect network attacker intercept data transmit data encrypted form lasco worm initially infects remote device using sis file format sis file format software installation script script file executed system without user interaction smartphone thus believes file come trusted source downloads infecting machine security issues related bluetooth mobile devices studied shown numerous problems different phones one easy exploit vulnerability unregistered services require authentication vulnerable applications virtual serial port used control phone attacker needed connect port take full control device another example phone must within reach bluetooth discovery mode attacker sends file via bluetooth recipient accepts virus transmitted example cabir worm spreads via bluetooth connection worm searches nearby phones bluetooth discoverable mode sends target device user must accept incoming file install program installing worm infects machine attacks based flaws os applications phone mobile web browser emerging attack vector mobile devices common web browsers mobile web browsers extended pure web navigation widgets plug-ins completely native mobile browsers jailbreaking iphone firmware 1.1.1 based entirely vulnerabilities web browser result exploitation vulnerability described underlines importance web browser attack vector mobile devices case vulnerability based stack-based buffer overflow library used web browser libtiff vulnerability web browser android discovered october 2008 iphone vulnerability due obsolete vulnerable library significant difference iphone vulnerability android sandboxing architecture limited effects vulnerability web browser process smartphones also victims classic piracy related web phishing malicious websites software run background etc big difference smartphones yet strong antivirus software available sometimes possible overcome security safeguards modifying operating system real-world examples section covers manipulation firmware malicious signature certificates attacks difficult 2004 vulnerabilities virtual machines running certain devices revealed possible bypass bytecode verifier access native underlying operating system results research published detail firmware security nokia symbian platform security architecture psa based central configuration file called swipolicy 2008 possible manipulate nokia firmware installed fact downloadable versions file human readable possible modify change image firmware vulnerability solved update nokia theory smartphones advantage hard drives since os files rom changed malware however systems possible circumvent symbian os possible overwrite file file name windows os possible change pointer general configuration file editable file application installed signing application verified series certificates one create valid signature without using valid certificate add list symbian os certificates directory firmware changes explained easy insert seemingly valid malicious certificate 2015 researchers french government agency agence nationale de la sécurité des systèmes d'information anssi demonstrated capability trigger voice interface certain smartphones remotely using specific electromagnetic waveforms exploit took advantage antenna-properties headphone wires plugged audio-output jacks vulnerable smartphones effectively spoofed audio input inject commands via audio interface juice jacking physical hardware vulnerability specific mobile platforms utilizing dual purpose usb charge port many devices susceptible data exfiltrated malware installed onto mobile device utilizing malicious charging kiosks set public places hidden normal charge adapters jail-breaking also physical access vulnerability mobile device users initiate hack devices unlock exploit weaknesses operating system mobile device users take control device jail-breaking customize interface installing applications change system settings allowed devices thus allowing tweak mobile devices operating systems processes run programs background thus devices expose variety malicious attack lead compromise important private data 2010 researcher university pennsylvania investigated possibility cracking device password smudge attack literally imaging finger smudges screen discern user password researchers able discern device password 68 time certain conditions outsiders may perform over-the-shoulder victims watching specific keystrokes pattern gestures unlock device password passcode smartphones permanent point access internet mostly compromised easily computers malware malware computer program aims harm system resides mobile malware variants increased 54 year 2017 trojans worms viruses considered malware trojan program smartphone allows external users connect discreetly worm program reproduces multiple computers across network virus malicious software designed spread computers inserting legitimate programs running programs parallel however must said malware far less numerous important smartphones computers nonetheless recent studies show evolution malware smartphones rocketed last years posing threat analysis detection typically attack smartphone made malware takes place 3 phases infection host accomplishment goal spread malware systems malware often uses resources offered infected smartphones use output devices bluetooth infrared may also use address book email address person infect user acquaintances malware exploits trust given data sent acquaintance infection means used malware get smartphone either use one faults previously presented may use gullibility user infections classified four classes according degree user interaction malware infected phone also seek accomplish goal usually one following monetary damage damage data and/or device concealed damage malware infected smartphone always aims spread one way another various malware exist world smartphones short description mobile ransomware type malware locks users mobile devices pay-to-unlock-your-device ploy grown leaps bounds threat category since 2014 specific mobile computing platforms users often less security-conscious particularly pertains scrutinizing applications web links trusting native protection capability mobile device operating system mobile ransomware poses significant threat businesses reliant instant access availability proprietary information contacts likelihood traveling businessman paying ransom unlock device significantly higher since disadvantage given inconveniences timeliness less likely direct access staff recent ransomware attack caused stir world attack caused many internet connected devices work companies spent large amount recover attacks diagram loads different behaviors smartphone malware terms effects smartphones see graph least 50 malware varieties exhibit negative behavior except ability spread multitude malware partly due variety operating systems smartphones however attackers also choose make malware target multiple platforms malware found attacks os able spread different systems begin malware use runtime environments like java virtual machine .net framework also use libraries present many operating systems malware carry several executable files order run multiple environments utilize propagation process practice type malware requires connection two operating systems use attack vector memory cards used purpose synchronization software used propagate virus security mechanisms place counter threats described presented section divided different categories act level range management security operating system behavioral education user threats prevented various measures depending case considering two cases mentioned first case one would protect system corruption application second case installation suspicious software would prevented first layer security smartphone operating system os beyond needing handle usual roles operating system e.g resource management scheduling processes device must also establish protocols introducing external applications data without introducing risk central paradigm mobile operating systems idea sandbox since smartphones currently designed accommodate many applications must mechanisms ensure applications safe phone applications data system user malicious program reaches mobile device vulnerable area presented system must small possible sandboxing extends idea compartmentalize different processes preventing interacting damaging based history operating systems sandboxing different implementations example ios focus limiting access public api applications app store default managed open allows restrict apps access types data android bases sandboxing legacy linux trustedbsd following points highlight mechanisms implemented operating systems especially android operating system security layer security software layer composed individual components strengthen various vulnerabilities prevent malware intrusions identification user human user authentication contains software components learned experience computer security however smartphones software must deal greater constraints see limitations mobile antivirus product would scan files compare database known mobile malware code signatures application passes various security barriers take actions designed actions triggered activity malicious application sometimes detected one monitors various resources used phone depending goals malware consequences infection always malicious applications intended harm devices deployed following sections describe different ways detect suspicious activity various points mentioned indications provide certainty legitimacy activity application however criteria help target suspicious applications especially several criteria combined network traffic exchanged phones monitored one place safeguards network routing points order detect abnormal behavior mobile use network protocols much constrained computer expected network data streams predicted e.g protocol sending sms permits detection anomalies mobile networks production distribution chain mobile devices responsibility manufacturers ensure devices delivered basic configuration without vulnerabilities users experts many aware existence security vulnerabilities device configuration provided manufacturers retained many users listed several points manufacturers consider much malicious behavior allowed carelessness user smartphone users found ignore security messages application installation especially application selection checking application reputation reviews security agreement messages simply leaving device without password precise control permissions granted applications added smartphone user large responsibility cycle security vector intrusion precaution especially important user employee company stores business data device detailed precautions user take manage security smartphone recent survey internet security experts bullguard showed lack insight rising number malicious threats affecting mobile phones 53 users claiming unaware security software smartphones 21 argued protection unnecessary 42 admitted n't crossed mind using apa 2011 statistics show consumers concerned security risks believe serious problem key always remember smartphones effectively handheld computers vulnerable latest android smartphones come inbuilt encryption setting securing information saved device makes difficult hacker extract decipher information case device compromised settings – security – encrypt phone encrypt sd card precautions measures leave easy solution intrusion people malicious applications smartphone users careful many attacks defeated especially phishing applications seeking obtain rights device one form mobile protection allows companies control delivery storage text messages hosting messages company server rather sender receiver phone certain conditions met expiration date messages deleted security mechanisms mentioned article large extent inherited knowledge experience computer security elements composing two device types similar common measures used antivirus software firewalls however implementation solutions necessarily possible least highly constrained within mobile device reason difference technical resources offered computers mobile devices even though computing power smartphones becoming faster limitations computing power furthermore common find updates exist developed deployed always done one example find user know newer version operating system compatible smartphone user may discover known vulnerabilities corrected end long development cycle allows time exploit loopholes expected four mobile environments make security framework
[ 2173, 3932, 3933, 2, 6788, 7151, 6417, 7881, 6795, 6419, 1461, 2564, 2566, 5393, 7186, 740, 2577, 5401, 6823, 1108, 7207, 2240, 7209, 74, 1899, 4746, 3680, 3681, 7956, 7603, 4025, 2996, 4400, 3698, 5124, 7637, 5485, 2310, 5848, 5149, 72...
Test
6,516
7
Style_Jukebox:style jukebox style jukebox hi-fi high-resolution audio cloud music streaming storage player windows ios android windows phone platforms web player also available mac windows linux style jukebox allows users upload personal music collection computer style jukebox servers listen another compatible device android ios windows mac windows phone streaming downloading songs offline playback basic accounts 10 gb storage pro accounts 2 tb music july 2016 style jukebox 250,000 registered users december 1st 2017 style jukebox discontinued service small post home page details released style jukebox consists cloud-based services user management music storage programmatic interfaces apis clients music streaming storage desktop mobile operating systems upload available desktop client style jukebox enables users drop music files folders music player automatically uploaded synced style jukebox cloud-based services made available user computers devices also style jukebox client installed style jukebox cloud-based services automatically transcodes formats match device supported formats example 320kbit/s wma transcoded 320kbit/s mp3 ios devices flac lossless transcoded wma lossless windows phone devices
[ 7232, 3915, 4759, 7736, 2233, 532, 5571, 84, 578 ]
Test
6,517
2
Nokia_E63:nokia e63 nokia e63 budget business smartphone announced 12 november 2008 released later year based symbian s60 platform although looks similar nokia e71 fascia made plastic aluminium e71 plastic chassis also keypad made different material laid slightly different e71 many specifications identical e71 except lack gps infrared lesser ram lack hsdpa lower-quality camera fixed-focus lens e63 come ability use camera flash light present e71 also standard 3.5 mm audio jack e71 uses 2.52 mm jack e63 retailed 199 euros taxes specifications current firmware version 510.21.010 released 28 march 2011 operating frequency
[ 1066, 5979, 2271, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 7545, 6015, 5044, 5493, 1202, 5315, 3029, 5499, 7012, 139, 6378, 6465, 5062, 3039, 3653, 1582, 4894, 5068, 59...
Test
6,518
2
SHARE_Operating_System:share operating system share operating system sos created 1959 improvement general motors gm-naa i/o operating system first operating system share user group main target improve sharing programs gm-naa i/o share operating system provided new methods manage buffers input/output devices like gm-naa i/o allowed execution programs written assembly language initially worked ibm 709 computer transistorized compatible successor ibm 7090 series articles describing innovations system appears april 1959 journal association computing machinery 1962 ibm discontinued support sos announced entirely new incompatible operating system ibm 7090/94 ibsys
[ 1522, 7605, 4670, 8173, 299, 5481, 5571, 5041, 7546, 5396, 7003, 3874, 402, 839, 4428, 850, 5244, 336, 607, 2431, 6849, 4366, 1516, 1994 ]
Validation
6,519
2
DataAdapter:dataadapter ado.net dataadapter functions bridge data source disconnected data class dataset simplest level specify sql commands provide elementary crud functionality advanced level offers functions required order create strongly typed datasets including datarelations data adapters integral part ado.net managed providers set objects used communicate data source dataset addition adapters managed providers include connection objects data reader objects command objects adapters used exchange data data source dataset many applications means reading data database dataset writing changed data dataset back database however data adapter move data source dataset example could adapter moves data microsoft exchange server dataset sometimes data work primarily read-only rarely need make changes underlying data source situations also call caching data memory minimize number database calls data change data adapter makes easy accomplish things helping manage data disconnected mode data adapter fills dataset object reading data writes single batch persisting changes back database data adapter contains reference connection object opens closes connection automatically reading writing database additionally data adapter contains command object references select insert update delete operations data data adapter defined table dataset take care communication database need tell data adapter load write database
[ 519 ]
Test
6,520
4
Heuristic_analysis:heuristic analysis heuristic analysis method employed many computer antivirus programs designed detect previously unknown computer viruses well new variants viruses already wild heuristic analysis expert based analysis determines susceptibility system towards particular threat/risk using various decision rules weighing methods multicriteria analysis mca one means weighing method differs statistical analysis bases available data/statistics antivirus programs utilize heuristic analysis perform function executing programming commands questionable program script within specialized virtual machine thereby allowing anti-virus program internally simulate would happen suspicious file executed keeping suspicious code isolated real-world machine analyzes commands performed monitoring common viral activities replication file overwrites attempts hide existence suspicious file one virus-like actions detected suspicious file flagged potential virus user alerted another common method heuristic analysis anti-virus program decompile suspicious program analyze machine code contained within source code suspicious file compared source code known viruses virus-like activities certain percentage source code matches code known viruses virus-like activities file flagged user alerted heuristic analysis capable detecting many previously unknown viruses new variants current viruses however heuristic analysis operates basis experience comparing suspicious file code functions known viruses means likely miss new viruses contain previously unknown methods operation found known viruses hence effectiveness fairly low regarding accuracy number false positives new viruses discovered human researchers information added heuristic analysis engine thereby providing engine means detect new viruses heuristic analysis method detecting viruses examining code suspicious properties traditional methods virus detection involve identifying malware comparing code program code known virus types already encountered analyzed recorded database – known signature detection useful still use signature detection method also become limited due development new threats exploded around turn century continuing emerge time counter problem heuristic model specifically designed spot suspicious characteristics found unknown new viruses modified versions existing threats well known malware samples cybercriminals constantly developing new threats heuristic analysis one methods used deal huge volume new threats seen daily heuristic analysis also one methods capable combating polymorphic viruses — term malicious code constantly changes adapts heuristic analysis incorporated advanced security solutions offered companies like kaspersky labs detect new threats cause harm without need specific signature heuristic analysis employ number different techniques one heuristic method known static heuristic analysis involves de-compiling suspect program examining source code code compared viruses already known heuristic database particular percentage source code matches anything heuristic database code flagged possible threat another method known dynamic heuristics scientists want analyze something suspicious without endangering people contain substance controlled environment like secure lab conduct tests process similar heuristic analysis — virtual world isolates suspicious program piece code inside specialized virtual machine — sandbox — gives antivirus program chance test code simulate would happen suspicious file allowed run examines command activated looks suspicious behaviors self-replication overwriting files actions common viruses potential issues reported user heuristic analysis ideal identifying new threats effective heuristics must carefully tuned provide best possible detection new threats without generating false positives perfectly innocent code reason heuristic tools often typically one weapon sophisticated antivirus arsenal typically deployed along methods virus detection signature analysis proactive technologies
[ 2791, 1838, 5401 ]
Validation
6,521
5
MQTT:mqtt mqtt message queuing telemetry transport iso standard iso/iec prf 20922 publish-subscribe-based messaging protocol works top tcp/ip protocol suite designed connections remote locations small code footprint required network bandwidth limited publish-subscribe messaging pattern requires message broker andy stanford-clark ibm arlen nipper cirrus link authored first version protocol 1999 2013 ibm submitted mqtt v3.1 oasis specification body charter ensured minor changes specification could accepted mqtt-sn variation main protocol aimed embedded devices non-tcp/ip networks zigbee historically mq mqtt came ibm mq 'mqseries message queuing product line however queuing required supported standard feature situations alternative message-oriented middleware includes advanced message queuing protocol amqp streaming text oriented messaging protocol stomp ietf constrained application protocol xmpp dds opc ua web application messaging protocol wamp mqtt system consists clients communicating server often called broker client may either publisher information subscriber client connect broker information organized hierarchy topics publisher new item data distribute sends control message data connected broker broker distributes information clients subscribed topic publisher need data number locations subscribers subscribers turn configured data publishers broker receives topic current subscribers discard topic unless publisher indicates topic retained allows new subscribers topic receive current value rather waiting next update publisher publishing client first connects broker set default message sent subscribers broker detects publishing client unexpectedly disconnected broker clients interact broker system may contain several broker servers exchange data based current subscribers topics minimal mqtt control message little two bytes data control message carry nearly 256 megabytes data needed fourteen defined message types used connect disconnect client broker publish data acknowledge receipt data supervise connection client server mqtt relies tcp protocol data transmission variant mqtt-sn used transports udp bluetooth mqtt sends connection credentials plain text format include measures security authentication provided underlying tcp transport using measures protect integrity transferred information interception duplication waits connection established server creates link nodes waits mqtt client finish work must tcp/ip session disconnect returns immediately application thread passing request mqtt client connection broker specify quality service measure classified increasing order overhead field affect handling underlying tcp data transmissions used mqtt senders receivers several projects implement mqtt examples
[ 7148, 7876, 709, 4295, 6415, 4676, 4677, 7170, 4683, 6432, 1462, 5386, 5039, 6446, 2219, 3640, 4709, 3312, 5064, 7214, 7217, 2612, 3337, 1900, 456, 6879, 2281, 106, 2644, 6531, 2650, 121, 7637, 4414, 6908, 3379, 5492, 3383, 494, 7297, 5...
Validation
6,522
5
Wireless_Datagram_Protocol:wireless datagram protocol wireless datagram protocol wdp defines movement information receiver sender resembles user datagram protocol internet protocol suite wireless datagram protocol wdp protocol wap architecture covers transport layer protocols internet model general transport service wdp offers upper layers invisible interface independent underlying network technology used consequence interface common transport protocols upper layer protocols wap architecture operate independently underlying wireless network letting transport layer deal physical network-dependent issues global interoperability acquired using mediating gateways
[ 884, 796, 4101, 3855 ]
Test
6,523
3
F16C:f16c f16c previously/informally known cvt16 instruction set x86 instruction set architecture extension provides support converting half-precision standard ieee single-precision floating-point formats cvt16 instruction set announced amd may 1 2009 extension 128-bit sse core instructions x86 amd64 instruction set cvt16 revision part sse5 instruction set proposal announced august 30 2007 supplemented xop fma4 instruction sets revision makes binary coding proposed new instructions compatible intel avx instruction extensions functionality instructions unchanged recent documents name f16c formally used intel amd x86-64 architecture specifications variants convert four floating-point values xmm register 8 floating-point values ymm register instructions abbreviations vector convert packed half packed single vice versa 8-bit immediate argument codice_5 selects rounding mode values 0–4 select nearest truncate mode set codice_6 support instructions indicated bit 29 ecx cpuid eax=1
[ 2000, 1252, 3173, 4845, 2989, 3443, 4224, 5559, 6616, 1465, 5665, 5934, 742, 5669, 5670, 584, 5055, 6647, 2226, 1961, 1770, 2498, 4077, 6563, 3248, 5165, 3139, 6133, 2332, 1881, 5431, 3747, 6675, 6236, 352, 971, 6956, 1335 ]
Test
6,524
4
Project_25:project 25 project 25 p25 apco-25 suite standards digital mobile radio communications designed use public safety organizations north america p25 radios direct replacement analog uhf example fm radios add ability transfer data well voice allowing natural implementation encryption messaging p25 radios commonly implemented dispatch organizations police fire ambulance emergency rescue service using vehicle-mounted radios combined walkie-talkie handheld use starting around 2012 products became available newer phase 2 modulation protocol older protocol known p25 became p25 phase 1 p25 phase 2 products use advanced ambe2+ vocoder allows audio pass compressed bitstream provides two tdma voice channels rf bandwidth 12.5 khz phase 1 provide one voice channel two protocols compatible however p25 phase 2 infrastructure provide dynamic transcoder feature translates phase 1 phase 2 needed addition phase 2 radios backwards compatible phase 1 modulation analog fm modulation per standard hand eu area created standard terrestrial trunked radio similar project 25 p25 fills similar role tetra dmr protocols public safety radios upgraded analog fm digital since 1990s increased use data radio systems features gps location trunking text messaging metering encryption various user protocols different public safety radio spectrum made difficult public safety agencies achieve interoperability widespread acceptance however lessons learned disasters united states faced past decades forced agencies assess requirements disaster basic infrastructure failed meet growing demands public safety digital radio communication united states federal communications commission fcc direction united states congress initiated 1988 inquiry recommendations users manufacturers improve existing communication systems based recommendations find solutions best serve needs public safety management october 1989 apco project 25 came existence coalition steering committee consisting representatives above-mentioned agencies along fpic department homeland security federal partnership interoperable communication coast guard department commerce national institute standards technology nist office law enforcement standards established decide priorities scope technical development p25 interoperable emergency communication integral initial response public health community safety national security economic stability problems experienced disaster events one serious poor communication due lack appropriate efficient means collect process transmit important information timely fashion cases radio communication systems incompatible inoperable within jurisdiction within departments agencies community non-operability occurs due use outdated equipment limited availability radio frequencies isolated independent planning lack coordination cooperation agencies community priorities competing resources funding ownership control communications systems recognizing understanding need project 25 p25 initiated collaboratively public safety agencies manufacturers address issue emergency communication systems p25 collaborative project ensure two-way radios interoperable goal p25 enable public safety responders communicate thus achieve enhanced coordination timely response efficient effective use communications equipment p25 established address need common digital public safety radio communications standards first-responders homeland security/emergency response professionals telecommunications industry association tr-8 engineering committee facilitates work role ansi-accredited standards development organization sdo published p25 suite standards tia-102 series documents include 49 separate parts land mobile radio tdma implementations technology public safety p25-compliant systems increasingly adopted deployed radios communicate analog mode legacy radios either digital analog mode p25 radios additionally deployment p25-compliant systems allow high degree equipment interoperability compatibility p25 standards use proprietary improved multi-band excitation imbe advanced multi-band excitation ambe+2 voice codecs designed digital voice systems inc. encode/decode analog audio signals rumored licensing cost voice-codecs used p25 standard devices main reason cost p25 compatible devices high p25 may used talk around mode without intervening equipment two radios conventional mode two radios communicate repeater base station without trunking trunked mode traffic automatically assigned one voice channels repeater base station protocol supports use data encryption standard des encryption 56 bit 2-key triple-des encryption three-key triple-des encryption advanced encryption standard aes encryption 256 bits keylength rc4 40 bits sold motorola advanced digital privacy encryption protocol also supports accordion 1.3 baton firefly mayfly saville type 1 ciphers p25 suite standards specify eight open interfaces various components land mobile radio system interfaces p25-compliant technology deployed two main phases future phases yet finalized phase 1 radio systems operate 12.5 khz digital mode using fdma access method phase 1 radios use continuous 4 level fm c4fm modulation—a special type 4fsk modulation—for digital transmissions 4,800 baud 2 bits per symbol yielding 9,600 bits per second total channel throughput 9,600 4,400 voice data generated imbe codec 2,800 forward error correction 2,400 signalling control functions receivers designed c4fm standard also demodulate compatible quadrature phase shift keying cqpsk standard parameters cqpsk signal chosen yield signal deviation symbol time c4fm phase 1 uses imbe voice codec systems involve standardized service facility specifications ensuring manufacturers compliant subscriber radio access services described specifications abilities include backward compatibility interoperability systems across system boundaries regardless system infrastructure addition p25 suite standards provides open interface radio frequency rf subsystem facilitate interlinking different vendors systems improve spectrum use p25 phase 2 developed trunking systems using 2-slot tdma scheme required new trunking systems 700 mhz band phase 2 uses ambe+2 voice codec reduce needed bitrate one voice channel require 6,000 bits per second including error correction signalling phase 2 backwards compatible phase 1 due tdma vs fdma operation although tdma radios systems capable operating phase 1 fdma required subscriber radio use tdma transmissions without time source therefore direct radio radio communications talkaround resorts fdma subscriber radios also resort narrow-band fm least common denominator almost two way radio could make analog narrow-band fm de facto interoperability mode time originally implementation phase 2 planned use 6.25 khz bandwidth per frequency allocation fdma however proved advantageous use existing 12.5 khz frequency allocations tdma mode number reasons first eliminated huge administrative process reallocating frequency assignments fcc existing phase 1 users second reduced amount base station transmitters one transmitter needed broadcast two voice slots third allowed subscriber radios save battery life transmitting half time also yields ability subscriber radio listen respond system requests transmissions phase 2 known 6.25 khz bandwidth equivalent satisfies fcc requirement voice transmissions occupy less bandwidth voice traffic phase 2 system transmits full 12.5 khz per frequency allocation phase 1 system however faster data rate 12 kbit/s allowing two simultaneous voice transmissions subscriber radios also transmit full 12.5 khz on/off repeating fashion resulting half transmission thus equivalent 6.25 khz per radio accomplished using ambe voice coder uses half rate phase 1 imbe voice coders 2000 2009 european telecommunications standards institute etsi tia working collaboratively public safety partnership project project mesa mobility emergency safety applications sought define unified set requirements next-generation aeronautical terrestrial digital wideband/broadband radio standard could used transmit receive voice video high-speed data wide-area multiple-agency networks deployed public safety agencies final functional technical requirements released etsi expected shape next phases american project 25 european dmr dpmr tetra interest industry followed since requirements could met available commercial off-the-shelf technology project closed 2010 united states 2008 wireless spectrum auction fcc allocated 20 mhz 700 mhz uhf radio band spectrum freed digital tv transition public safety networks fcc expects providers employ lte high-speed data video applications p25 systems resort using band signaling continuous tone-coded squelch system ctcss tone digital-coded squelch dcs codes access control instead use called network access code nac included outside digital voice frame 12 bit code prefixes every packet data sent including carrying voice transmissions nac feature similar ctcss dcs analog radios radios programmed pass audio receiving correct nac nacs programmed three-hexadecimal-digit code transmitted along digital signal transmitted since nac three-hexadecimal-digit number 12 bits 4,096 possible nacs programming far analog methods combined three possible nacs special functions adoption standards slowed budget problems us however funding communications upgrades department homeland security usually requires migrating project 25 also used countries worldwide including australia new zealand brazil canada india russia mid-2004 660 networks p25 deployed 54 countries time 2005 european terrestrial trunked radio tetra deployed sixty countries preferred choice europe china countries largely based tetra systems many times cheaper p25 systems 900 vs 6,000 radio time however p25 radio prices rapidly approaching parity tetra radio prices increased competition p25 market majority p25 networks based northern america advantage p25 system coverage frequency bandwidth earlier analog systems use channels easily upgraded one one p25 networks also allow intelligent migration analog radios digital radios operating within network p25 tetra offer varying degrees functionality depending available radio spectrum terrain project budget interoperability major goal p25 many p25 features present interoperability challenges theory p25 compliant equipment interoperable practice interoperable communications n't achievable without effective governance standardized operating procedures effective training exercises inter-jurisdictional coordination difficulties inherent developing p25 networks using features digital voice encryption trunking sometimes result feature-backlash organizational retreat minimal feature-free p25 implementations fulfill letter project 25 migration requirement without realizing benefits thereof additionally technical issue per se frictions often result unwieldy bureaucratic inter-agency processes tend develop order coordinate interoperability decisions securecomm 2011 conference london security researcher steve glass presented paper written co-author matt ames explained des-ofb motorola proprietary adp rc4 based ciphers vulnerable brute force key recovery research result op25 project uses gnu radio ettus universal software radio peripheral usrp implement open source p25 packet sniffer analyzer op25 project founded steve glass early 2008 performing research wireless networks part phd thesis paper available download nicta website 2011 wall street journal published article describing research security flaws system including user interface makes difficult users recognize transceivers operating secure mode according article r esearchers university pennsylvania overheard conversations included descriptions undercover agents confidential informants plans forthcoming arrests information technology used surveillance operations researchers found messages sent radios sent segments blocking portion segments result entire message jammed research also shows radios effectively jammed single radio short range using highly modified pink electronic child ’ toy standard used radios 'provides convenient means attacker continuously track location radio ’ user systems jammers expend lot power block communications p25 radios allow jamming relatively low power enabling researchers prevent reception using 30 toy pager designed pre-teens report presented 20th usenix security symposium san francisco august 2011 report noted number security flaws project 25 system specific way implemented inherent security design report find breaks p25 encryption however observed large amounts sensitive traffic sent clear due implementations problems found switch markings secure clear modes difficult distinguish ∅ vs. exacerbated fact p25 radios set secure mode continue operate without issuing warning another party switches clear mode addition report authors said many p25 systems change keys often increasing risk individual radio net may properly keyed forcing users net transmit clear maintain communications radio one design choice use lower levels error correction portions encoded voice data deemed less critical intelligibility result bit errors may expected typical transmissions harmless voice communication presence errors force use stream ciphers tolerate bit errors prevents use standard technique message authentication codes macs protect message integrity stream cipher attacks varying levels error correction implemented breaking p25 message frames subframes allows attacker jam entire messages transmitting certain short subframes critical reception entire frame result attacker effectively jam project 25 signals average power levels much lower power levels used communication attacks targeted encrypted transmissions forcing users transmit clear project 25 radios designed work existing two-way radio frequency channels use spread spectrum modulation inherently jam-resistant optimal spread spectrum system require effective jammer use 1,000 times much power 30 db individual communicators according report p25 jammer could effectively operate 1/25th power 14 db less communicating radios authors developed proof-of-concept jammer using texas instruments cc1110 single chip radio found inexpensive toy certain metadata fields project 25 protocol encrypted allowing attacker perform traffic analysis identify users project 25 radios respond bad data packets addressed retransmission request attacker deliberately send bad packets forcing specific radio transmit even user attempting maintain radio silence tracking authorized users considered feature p25 referred presence report authors concluded saying reasonable wonder protocol developed many years used sensitive critical applications difficult use vulnerable attack authors separately issued set recommendations p25 users mitigate problems found include disabling secure/clear switch using network access codes segregate clear encrypted traffic compensating unreliability p25 over-the-air rekeying extending key life p25 tetra used fifty-three countries worldwide public safety private sector radio networks differences features capacities
[ 2087, 547, 5175, 2208, 2566, 7824 ]
Test
6,525
3
Kernel_debugger:kernel debugger kernel debugger debugger present operating system kernels ease debugging kernel development kernel developers kernel debugger might stub implementing low-level operations full-blown debugger gdb running another machine sending commands stub serial line network connection might provide command line used directly machine debugged operating systems operating system kernels contain kernel debugger
[ 6396, 5275, 5760, 1579, 4435, 6256, 947 ]
Test
6,526
4
WannaCry_ransomware_attack:wannacry ransomware attack wannacry ransomware attack may 2017 worldwide cyberattack wannacry ransomware cryptoworm targeted computers running microsoft windows operating system encrypting data demanding ransom payments bitcoin cryptocurrency propagated eternalblue exploit developed united states national security agency nsa older windows systems eternalblue stolen leaked group called shadow brokers months prior attack microsoft released patches previously close exploit much wannacry spread organizations applied using older windows systems past end-of-life wannacry also took advantage installing backdoors onto infected systems attack stopped within days discovery due emergency patches released microsoft discovery kill switch prevented infected computers spreading wannacry attack estimated affected 200,000 computers across 150 countries total damages ranging hundreds millions billions dollars security experts believed preliminary evaluation worm attack originated north korea agencies working country december 2017 united states united kingdom australia formally asserted north korea behind attack new variant wannacry ransomware forced taiwan semiconductor manufacturing company tsmc temporarily shut several chip-fabrication factories august 2018 virus spread 10,000 machines tsmc advanced facilities wannacry ransomware cryptoworm targeted computers running microsoft windows operating system encrypting data demanding ransom payments bitcoin cryptocurrency worm also known wannacrypt wana decrypt0r 2.0 wanacrypt0r 2.0 wan na decryptor considered network worm also includes transport mechanism automatically spread transport code scans vulnerable systems uses eternalblue exploit gain access doublepulsar tool install execute copy wannacry versions 0 1 2 created using microsoft visual c++ 6.0 eternalblue exploit windows server message block smb protocol released shadow brokers much attention comment around event occasioned fact u.s. national security agency nsa exploit likely stolen already discovered vulnerability used create exploit offensive work rather report microsoft microsoft eventually discovered vulnerability tuesday 14 march 2017 issued security bulletin ms17-010 detailed flaw announced patches released windows versions currently supported time windows vista windows 7 windows 8.1 windows 10 windows server 2008 windows server 2008 r2 windows server 2012 windows server 2016 doublepulsar backdoor tool also released shadow brokers 14 april 2017 starting 21 april 2017 security researchers reported tens thousands computers doublepulsar backdoor installed 25 april reports estimated number infected computers could several hundred thousand numbers increasing every day wannacry code take advantage existing doublepulsar infection installs executed wannacry malware first checks kill switch domain name found ransomware encrypts computer data attempts exploit smb vulnerability spread random computers internet laterally computers network modern ransomware payload displays message informing user files encrypted demands payment around us 300 bitcoin within three days us 600 within seven days three hardcoded bitcoin addresses wallets used receive payments victims wallets transactions balances publicly accessible even though cryptocurrency wallet owners remain unknown several organizations released detailed technical writeups malware including microsoft cisco malwarebytes symantec mcafee attack began friday 12 may 2017 evidence pointing initial infection asia 07:44 utc initial infection likely exposed vulnerable smb port rather email phishing initially assumed within day code reported infected 230,000 computers 150 countries organizations installed microsoft security update april 2017 affected attack still running unsupported versions microsoft windows windows xp windows server 2003 particularly high risk security patches released since april 2014 exception one emergency patch released may 2014 kaspersky lab study reported however less 0.1 percent affected computers running windows xp 98 percent affected computers running windows 7 controlled testing environment cybersecurity firm kryptos logic found unable infect windows xp system wannacry using exploits payload failed load caused operating system crash rather actually execute encrypt files however executed manually wannacry could still operate windows xp experts quickly advised affected users paying ransom due reports people getting data back payment high revenues would encourage campaigns 14 june 2017 attack subsided total 327 payments totaling us 130,634.77 51.62396539 xbt transferred day initial attack may microsoft released out-of-band security updates end life products windows xp windows server 2003 windows 8 patches created february year following tip vulnerability january year organizations advised patch windows plug vulnerability order protect cyber attack head microsoft cyber defense operations center adrienne hall said “ due elevated risk destructive cyber-attacks time made decision take action applying updates provides protection potential attacks characteristics similar wannacrypt alternative name wannacry ” researcher marcus hutchins accidentally discovered kill switch domain hardcoded malware registering domain name dns sinkhole stopped attack spreading worm ransomware encrypted computer files unable connect domain computers infected wannacry website registration unable help already infected systems severely slowed spread initial infection gave time defensive measures deployed worldwide particularly north america asia attacked extent elsewhere 14 may first variant wannacry appeared new second kill-switch registered matt suiche day followed second variant third last kill-switch 15 may registered check point threat intelligence analysts days later new version wannacry detected lacked kill switch altogether 19 may reported hackers trying use mirai botnet variant effect distributed attack wannacry kill-switch domain intention knocking offline 22 may hutchins protected domain switching cached version site capable dealing much higher traffic loads live site separately researchers university college london boston university reported paybreak system could defeat wannacry several families ransomware recovering keys used encrypt user data discovered windows encryption apis used wannacry may completely clear prime numbers used generate payload private keys memory making potentially possible retrieve required key yet overwritten cleared resident memory key kept memory wannacry process killed computer rebooted infected behaviour used french researcher develop tool known wannakey automates process windows xp systems approach iterated upon second tool known wanakiwi tested work windows 7 server 2008 r2 well within four days initial outbreak new infections slowed trickle due responses linguistic analysis ransom notes indicated authors likely fluent chinese proficient english versions notes languages probably human-written rest seemed machine-translated according analysis fbi cyber behavioral analysis center computer created ransomware language files hangul language fonts installed evidenced presence \fcharset129 rich text format tag metadata language files also indicated computers created ransomware set used korea google security researcher initially posted tweet referencing code similarities wannacry previous malware cybersecurity companies kaspersky lab symantec said code similarities previously used lazarus group believed carried cyberattack sony pictures 2014 bangladesh bank heist 2016—and linked north korea could also either simple re-use code another group attempt shift blame—as cyber false flag operation leaked internal nsa memo alleged also linked creation worm north korea brad smith president microsoft said believed north korea originator wannacry attack uk national cyber security centre reached conclusion 18 december 2017 united states government formally announced publicly considers north korea main culprit behind wannacry attack president trump homeland security advisor tom bossert wrote op-ed wall street journal charge saying make allegation lightly based evidence press conference following day bossert said evidence indicates kim jong-un given order launch malware attack bossert said canada new zealand japan agree united states assessment evidence links attack north korea united kingdom foreign commonwealth office says also stands behind united states assertion north korea however denied responsible cyberattack 6 september 2018 us department justice doj announced formal charges park jin-hyok involvement sony pictures hack 2014 doj contended park north korean hacker working part team experts north korean reconnaissance general bureau department justice asserted team also involved wannacry attack among activities ransomware campaign unprecedented scale according europol estimates around 200,000 computers infected across 150 countries according kaspersky lab four affected countries russia ukraine india taiwan one largest agencies struck attack national health service hospitals england scotland 70,000 devices – including computers mri scanners blood-storage refrigerators theatre equipment – may affected 12 may nhs services turn away non-critical emergencies ambulances diverted 2016 thousands computers 42 separate nhs trusts england reported still running windows xp 2018 report members parliament concluded 200 nhs hospitals organizations checked wake wannacry attack still failed cyber security checks nhs hospitals wales northern ireland unaffected attack nissan motor manufacturing uk tyne wear england halted production ransomware infected systems renault also stopped production several sites attempt stop spread ransomware spain telefónica fedex deutsche bahn hit along many countries companies worldwide attack impact said relatively low compared potential attacks type could much worse marcus hutchins discovered kill-switch built creators specifically targeted highly critical infrastructure like nuclear power plants dams railway systems according cyber-risk-modeling firm cyence economic losses cyber attack could reach us 4 billion groups estimating losses hundreds millions following alphabetical list organisations confirmed affected number experts highlighted nsa non-disclosure underlying vulnerability loss control eternalblue attack tool exploited edward snowden said nsa privately disclosed flaw used attack hospitals found lost attack may happened british cybersecurity expert graham cluley also sees culpability part u.s. intelligence services according others could done something ages ago get problem fixed n't also said despite obvious uses tools spy people interest duty protect countries citizens others also commented attack shows practice intelligence agencies stockpile exploits offensive purposes rather disclosing defensive purposes may problematic microsoft president chief legal officer brad smith wrote repeatedly exploits hands governments leaked public domain caused widespread damage equivalent scenario conventional weapons would u.s. military tomahawk missiles stolen russian president vladimir putin placed responsibility attack u.s. intelligence services created eternalblue 17 may 2017 united states bipartisan lawmakers introduced patch act aims exploits reviewed independent board balance need disclose vulnerabilities national security interests increasing transparency accountability maintain public trust process 15 june 2017 united states congress hold hearing attack two subpanels house science committee hear testimonies various individuals working government non-governmental sector us improve protection mechanisms systems similar attacks future cybersecurity researcher working loose collaboration uk national cyber security centre researched malware discovered kill switch later globally dispersed security researchers collaborated online develop open source tools allow decryption without payment circumstances snowden states nsa-enabled ransomware eats internet help comes researchers spy agencies asks case experts also used publicity around attack chance reiterate value importance good regular secure backups good cybersecurity including isolating critical systems using appropriate software latest security patches installed adam segal director digital cyberspace policy program council foreign relations stated patching updating systems broken basically private sector government agencies addition segal said governments apparent inability secure vulnerabilities opens lot questions backdoors access encryption government argues needs private sector security arne schönbohm president germany federal office information security bsi stated current attacks show vulnerable digital society wake-up call companies finally take security seriously effects attack also political implications united kingdom impact national health service quickly became political claims effects exacerbated government underfunding nhs particular nhs ceased paid custom support arrangement continue receiving support unsupported microsoft software used within organization including windows xp home secretary amber rudd refused say whether patient data backed shadow health secretary jon ashworth accused health secretary jeremy hunt refusing act critical note microsoft national cyber security centre ncsc national crime agency received two months previously others argued hardware software vendors often fail account future security flaws selling systems − due technical design market incentives − eventually wo n't able properly receive apply patches nhs denied still using xp claiming 4.7 devices within organization ran windows xp cost attack nhs estimated £92 million disruption services upgrades attack nhs digital refused finance estimated £1 billion meet cyber essentials plus standard information security certification organized uk ncsc saying would constitute value money invested £60 million planned spend £150 million next two years address key cyber security weaknesses suggested future attack magnitude may defined terrorism act parliament adds provision stating malicious use computer matter world located degrades seriously harms healthcare power life support critical infrastructure form terrorism may elicit proportional response possibly could added revision policing crime act 2017 late june hundreds computer users reported sent email someone multiple people claiming developers wannacry email threatened destroy victims data unless sent 0.1 btc bitcoin address hackers
[ 704, 3932, 2912, 376, 2560, 3277, 2923, 744, 7560, 2587, 1122, 3323, 5779, 5434, 74, 2618, 7600, 5452, 4025, 1528, 4759, 2991, 1173, 5485, 6904, 4783, 6541, 6194, 496, 2678, 3038, 8014, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 732...
Test
6,527
9
Modelica:modelica modelica object-oriented declarative multi-domain modeling language component-oriented modeling complex systems e.g. systems containing mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents free modelica language developed non-profit modelica association modelica association also develops free modelica standard library contains 1360 generic model components 1280 functions various domains version 3.2.1 modelica resembles object-oriented programming languages c++ java differs two important respects first modelica modeling language rather conventional programming language modelica classes compiled usual sense translated objects exercised simulation engine simulation engine specified language although certain required capabilities outlined second although classes may contain algorithmic components similar statements blocks programming languages primary content set equations contrast typical assignment statement left-hand side statement assigned value calculated expression right-hand side equation may expressions right- left-hand sides example equations describe assignment equality modelica terms equations pre-defined causality simulation engine may usually must manipulate equations symbolically determine order execution components equation inputs outputs modelica design effort initiated september 1996 hilding elmqvist goal develop object-oriented language modeling technical systems order reuse exchange dynamic system models standardized format modelica 1.0 based phd thesis hilding elmqvist experience modeling languages allan dymola nmf objectmath omola sidops+ smile hilding elmqvist key architect modelica many people contributed well see appendix e september 1997 version 1.0 modelica specification released basis prototype implementation within commercial dymola software system year 2000 non-profit modelica association formed manage continually evolving modelica language development free modelica standard library year usage modelica industrial applications started table presents timeline modelica specification history commercial front-ends modelica include amesim french company imagine sa part siemens plm software dymola swedish company dynasim ab part dassault systemes cymodelica american company cydesign labs esi group wolfram systemmodeler formerly mathmodelica swedish company wolfram mathcore ab part wolfram research simulationx german company esi iti gmbh maplesim canadian company maplesoft catia systems jmodelica.org extensible modelica-based open source platform optimization simulation analysis complex dynamic systems main objective project create industrially viable open source platform simulation optimization modelica models offering flexible platform serving virtual lab algorithm development research openmodelica open-source modelica-based modeling simulation environment intended industrial academic usage long-term development supported non-profit organization – open source modelica consortium osmc goal openmodelica effort create comprehensive open source modelica modeling compilation simulation environment based free software distributed binary source code form research teaching industrial usage free simulation environment scicos uses subset modelica component modeling support larger part modelica language currently development nevertheless still incompatibility diverging interpretation different tools concerning modelica language following code fragment shows simple example first order system formula_1 model firstorder equation end firstorder interesting things note example 'parameter qualifier indicates given variable time-invariant 'der operator represents symbolically time derivative variable also worth noting documentation strings associated declarations equations main application area modelica modeling physical systems basic structuring concepts shown hand simple examples electrical domain modelica four built-in types real integer boolean string typically user-defined types derived associate physical quantity unit nominal values attributes type voltage real quantity= electricalpotential unit= v type current real quantity= electricalcurrent unit= interaction component components defined physical ports called connectors e.g. electrical pin defined connector pin electrical pin end pin drawing connection lines ports meaning corresponding connector variables without flow prefix identical v corresponding connector variables flow prefix defined zero-sum equation sum corresponding flow variables zero motivation automatically fulfill relevant balance equations infinitesimally small connection point basic model component defined model contains equations describe relationship connector variables declarative form i.e. without specifying calculation order model capacitor equation end capacitor goal connected set model components leads set differential algebraic discrete equations number unknowns number equations identical modelica achieved requiring called balanced models full rules defining balanced models rather complex read however cases simple rule issued counts variables equations way simulation tools given variables equations must counted according following rule note standard input connectors realinput integerinput contribute count variables since new variables defined inside reason rule understood thinking capacitor defined pins contain flow variable i.e current check connected nothing corresponds set equation pin.i=0 pin must add equation flow variable obviously example extended cases kinds flow variables involved e.g forces torques etc. capacitor connected another balanced model one pins connection equation generated substitute two i=0 equations pins connected since connection equation corresponds two scalar equations connection operation leave balanced larger model constituted capacitor model connected capacitor model balanced since verification using openmodelica model gives fact another example containing input connectors physical connectors following component modelica standard library model signalvoltage equation end signalvoltage component signalvoltage balanced since checking openmodelica gives hierarchical model built-up basic models instantiating basic models providing suitable values model parameters connecting model connectors typical example following electrical circuit model circuit equation end circuit via language element annotation ... definitions added model influence simulation annotations used define graphical layout documentation version information basic set graphical annotations standardized ensure graphical appearance layout models different modelica tools freely available book modelica example contains many examples like along detailed explanations nearly language features modelica version 3.3 modelica designed domain neutral result used wide variety applications fluid systems example steam power generation hydraulics etc automotive applications especially powertrain mechanical systems example multi-body systems mechatronics etc. automotive sector many major automotive oems using modelica include ford general motors toyota bmw daimler modelica also increasingly used simulation thermo-fluid energy systems characteristics modelica acausal object-oriented domain neutral make well suited system-level simulation domain modelica well established
[ 6507, 7516, 5117, 5300, 5571, 5659, 4504, 6912, 4067, 7841, 6566, 3148, 8137, 3915, 2524, 1336 ]
Test
6,528
2
Windows_To_Go:windows go windows go feature windows 8 enterprise windows 8.1 enterprise windows 10 education windows 10 enterprise windows 10 pro limited education enterprise image allows boot run certain usb mass storage devices usb flash drives external hard disk drives certified microsoft compatible fully manageable corporate windows environment intended allow enterprise administrators provide users imaged version windows reflects corporate desktop creation windows go drives officially supported non-enterprise education windows 8.1 editions however enterprise education versions windows 10 supported information published describing various ways install windows go using version windows 8.x 10 bootable usb device windows 8 embedded versions windows windows embedded standard 7 supported booting usb storage devices april 2011 leak windows 8 build 7850 users noticed builds included program called portable workspace creator indicating intended create bootable usb drives windows 8 september 2011 microsoft officially announced windows go build conference distributed bootable 32 gb usb flash drives windows go pre-installed windows go several significant differences compared standard installation windows 8 non-removable storage hard disk drives solid-state drives windows go works usb 2.0 faster usb connections legacy bios uefi firmware usb drives used environment microsoft set specific requirements usb drive must meet order supported device june 2017 12 usb devices listed supported microsoft windows go using pc host hardware certified use either windows 7 windows 8 work well windows go although microsoft provide support feature windows rt macintosh computers possible boot windows go mac new companion device license microsoft software assurance employees use windows go software assurance licensed computer well home pc simon bisson writing zdnet called windows go one interesting features windows 8 noting even though using usb 2.0 port performance good noticeable lag calling useful way running windows 8 michael s. lasky writing laptopmag.com wrote departments want ensure employees safely access corporate network windows go usb drives incredibly convenient ability instantly remake windows pc secure personal computer worthwhile productive time-saver release windows 10 may 2019 update version 1903 microsoft announced windows go longer developed feature support os major feature updates therefore enable user stay current specific certified type performant usb media needed feature provide good user experience also longer produced oems
[ 7879, 3937, 3263, 378, 3271, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 6835, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 788, 7602, 5805, 6164, 4759, 6168, 7616, 1534, 6885, 7619, 2999, 5475, 2290, 3700, 4774, 1181, 3711, 5134, ...
Test
6,529
7
TOA_Technologies:toa technologies toa technologies provides software service-based field service management software customer appointment scheduling solutions services enterprises worldwide headquartered beachwood ohio company develops markets sells etadirect web-based applications solution provides advanced tools companies small medium large mobile workforces automate optimize planning scheduling appointment booking well routing job allocation real-time management type field service event etadirect include applications forecasting capacity management routing real-time field management/dispatch advanced html 5-based mobility app field employees also includes apps collaboration location-based information customer communications etadirect powered patented algorithm continuously learns mobile employees ’ work patterns analyzes statistically uses pattern recognition accurately predict employee time arrival customer location length job/appointment take thereby providing enhanced accuracy planning customer experience management etadirect typically narrows wait window less 60 minutes using time-based predictions etadirect communicate consumers exact time field service employee arrive via voice/ivr email text/sms twitter communications channels reducing customer frustration wasted time inquiry calls service provider call centers software delivered businesses internet using software service/esaas model etadirect currently used seven top ten cable television companies north america including cox communications major broadband operators europe virgin media ono spain global communications companies telefonica global utility companies like e.on toa technologies founded yuval brisker irad carmi 2003 company privately held employs 550 employees worldwide headquartered beachwood ohio additional offices london united kingdom sao paulo brazil principal venture shareholders technology crossover ventures draper triangle ventures dfj network affiliate intel capital sutter hill ventures toa stands time arrival concept time central etadirect software solution set central algorithm measures time predicts performance based resource specific pattern recognition predictive analytics yields accurate time arrival estimates alternative managing service appointments according averages human resource capabilities availability december 2013 toa 85,000 users oracle corporation announced acquiring toa technologies july 31 2014 april 6 2010 toa issued u.s. patent 7,693,735 entitled dynamic schedule mediation predictive performance-pattern based mobile workforce management system proactive customer communications methodology october 2012 gartner recognized toa technologies leader magic quadrant field service management first time toa technologies named leader gartner magic quadrant field service management 2013 report gartner stated toa best-of-breed field service optimization vendor based solely cloud toa named one america promising companies 2013 forbes magazine july 2013 toa closed major round funding technology crossover ventures raising 66 million transform global field service management july 31 2014 oracle corporation announced buying toa technologies transaction closed mid-september 2014
[ 330 ]
Validation
6,530
0
International_Committee_on_Computational_Linguistics:international committee computational linguistics international committee computational linguistics iccl founded dr. david hays rand corporation 1965 promote biennial international conference computational linguistics since third conference stockholm known acronym coling swedish fictional character kolingen albert engström current president iccl professor jun-ichi tsujii university tokyo membership committee permanent
[ 1314, 2921, 2595, 1488 ]
Test
6,531
5
Real_Time_Streaming_Protocol:real time streaming protocol real time streaming protocol rtsp network control protocol designed use entertainment communications systems control streaming media servers protocol used establishing controlling media sessions end points clients media servers issue vhs-style commands play record pause facilitate real-time control media streaming server client video demand client server voice recording transmission streaming data task rtsp rtsp servers use real-time transport protocol rtp conjunction real-time control protocol rtcp media stream delivery however vendors implement proprietary transport protocols rtsp server software realnetworks example also used realnetworks proprietary real data transport rdt rtsp developed realnetworks netscape columbia university first draft submitted ietf 1996 standardized multiparty multimedia session control working group mmusic wg internet engineering task force ietf published rfc 2326 1998 rtsp 2.0 published rfc 7826 2016 replacement rtsp 1.0 rtsp 2.0 based rtsp 1.0 backwards compatible basic version negotiation mechanism similar ways http rtsp defines control sequences useful controlling multimedia playback http stateless rtsp state identifier used needed track concurrent sessions like http rtsp uses tcp maintain end-to-end connection rtsp control messages sent client server commands travel direction i.e server client presented basic rtsp requests typical http requests like options request also available default transport layer port number 554 tcp udp latter rarely used control requests rtsp using rtp rtcp allows implementation rate adaptation many cctv security cameras often called ip cameras support rtsp streaming especially onvif profiles g
[ 7148, 709, 4676, 4677, 7169, 7170, 2201, 4683, 6432, 1462, 5039, 6446, 2219, 3640, 4709, 3312, 7214, 7217, 2612, 3337, 1900, 456, 6879, 2281, 6521, 106, 2644, 2650, 121, 7637, 4414, 6908, 3379, 5492, 3383, 494, 5847, 7297, 5169, 2335, 1...
Test
6,532
2
Authorized_Program_Analysis_Report:authorized program analysis report apar authorized program analysis report pronounced a-par rhymes far ibm designation document intended identify situations could result potential problems also serves request correction defect current releases ibm-supplied programs occasionally ibm software bug ascertained situation caused problems third-party hardware software user configuration errors ibm support staff suspect defect current release ibm program cause file formal report confirming existence issue addition confirming existence issue apars include information known workarounds information whether formal fix scheduled included future releases whether program temporary fix ptf planned ibm program facilitate documenting problem least 2 levels fix ptf permanent correction respect vrm version release modification level product applicable temporary fix sense problem correction temporarily available permanent fix later incorporated product base code thereby longer fix although associated ptf and/or apar numbers rule included source documentation associated ensuing base code update sidr xerox acronym covering apar ptf acronym referred system improvement difficulty report sir system improvement request terminology digital equipment corporation used much xerox used sidr
[ 1516 ]
Test
6,533
5
Internet_Security_Association_and_Key_Management_Protocol:internet security association key management protocol isakmp internet security association key management protocol protocol defined rfc 2408 establishing security associations sa cryptographic keys internet environment isakmp provides framework authentication key exchange designed key exchange independent protocols internet key exchange kerberized internet negotiation keys provide authenticated keying material use isakmp example ike describes protocol using part oakley part skeme conjunction isakmp obtain authenticated keying material use isakmp security associations ah esp ietf ipsec doi isakmp defines procedures authenticating communicating peer creation management security associations key generation techniques threat mitigation e.g denial service replay attacks framework isakmp typically utilizes ike key exchange although methods implemented kerberized internet negotiation keys preliminary sa formed using protocol later fresh keying done isakmp defines procedures packet formats establish negotiate modify delete security associations sas contain information required execution various network security services ip layer services header authentication payload encapsulation transport application layer services self-protection negotiation traffic isakmp defines payloads exchanging key generation authentication data formats provide consistent framework transferring key authentication data independent key generation technique encryption algorithm authentication mechanism isakmp distinct key exchange protocols order cleanly separate details security association management key management details key exchange may many different key exchange protocols different security properties however common framework required agreeing format sa attributes negotiating modifying deleting sas isakmp serves common framework isakmp implemented transport protocol implementations must include send receive capability isakmp using udp port 500 openbsd first implemented isakmp 1998 via isakmpd 8 software ipsec services service microsoft windows handles functionality kame project implements isakmp linux open source bsds modern cisco routers implement isakmp vpn negotiation leaked nsa presentations released der spiegel indicate isakmp exploited unknown manner decrypt ipsec traffic ike researchers discovered logjam attack state breaking 1024-bit diffie–hellman group would break 66 vpn servers 18 top million https domains 26 ssh servers consistent researchers claim consistent leaks
[ 7626, 1130, 3434, 4759, 1118, 8093, 516, 2644, 6367 ]
Train
6,534
4
Melvin_Currie:melvin currie melvin mel robert currie american mathematician cryptographer former chief cryptographic research design division national security agency recognitions include 2007 crypto-mathematics institute leadership award director distinguished service medal author 2018 popular mathematics book mathematics rhyme reason published jointly american mathematical society mathematical sciences research institute currie african-american born pittsburgh pennsylvania 1948 parents separated six currie spent rest childhood living mother younger brother maternal grandparents currie received ba yale university majored mathematics economics went graduate school university pittsburgh received phd 1983 advisor william fleissner title dissertation metric characterization irrationals via group operation
[ 1243 ]
Test
6,535
1
TransLattice:translattice translattice software company based santa clara california geographically distributes databases applications enterprise cloud hybrid environments translattice offers newsql database application platform translattice founded 2007 officially launched 2010 company co-founders frank huerta ceo mike lyle executive vp engineering robert geiger previously worked together recourse technologies translattice based santa clara california august 2008 company received 9.5 million series funding dcm early stage capital venture funding company 2013 translattice acquired stormdb database-as-a-service startup stormdb clustered postgresql fork open sourced 2014 name postgres-xl translattice specializes distributed databases application platforms enterprise cloud systems company developed geographically-distributed computing-architecture allows single database run multiple nodes located anywhere translattice elastic database ted newsql database management system enables building highly available fault tolerant data fabric multiple nodes located anywhere world translattice database fully sql/acid-compliant ted operates cohesive single database translattice provided world first geographically-distributed relational database management system rdbms deploy multiple public-cloud-provider networks time well virtual machines physical hardware combination thereof
[ 5956, 3425 ]
Test
6,536
8
LiteSpeed_Web_Server:litespeed web server litespeed web server lsws proprietary web server software 4th popular web server estimated used 4.6 websites august 2019 lsws developed privately held litespeed technologies software uses configuration format apache http server compatible apache features lsws released 2003 august 2008 became 16th popular web server november 2016 litespeed market share grew 0.39 3.29 increasing position 10th 4th popular web server according netcraft 2017 team hong kong polytechnic university found one six popular web servers estimated team rwth aachen university running 9.2 http/2-enabled websites august 2019 lsws used 58.9 websites using quic litespeed web server lsws compatible commonly-used apache features including mod_rewrite .htaccess mod_security lsws load apache configuration files directly works drop-in replacement apache fully integrating popular control panels lsws replaces apache functions uses event driven approach handle requests litespeed technologies founded early 2002 team engineers led george wang july 1 2003 litespeed web server officially released full-featured web server 2007 litespeed web server became litespeed web server enterprise configured apache drop-in replacement year web server integrated cpanel directadmin plesk litespeed web server officially began supporting http/2 2015 version 5.0 also released lscache cache plugin wordpress esi version 5.0.10 2017 lsws released quic support
[ 3168, 5369, 1349, 5206, 5820, 5214, 2646, 6270, 1834, 2291, 5824, 8182, 26, 5571, 7544, 7988, 4701, 1392, 7786, 417, 3135, 2506, 1686, 3408, 1602, 6586, 6061, 7411, 7952, 1435, 2807, 2901 ]
Train
6,537
6
ZipIt:zipit zipit shareware data compression utility archiving compressing files classic mac os mac os x platforms designed highly compatible pkzip ms-dos machines reading writing files well performing necessary line ending conversion macbinary encoding ensure files usable platforms advanced user interface offered number automation features including applescript support first released 1993 latest version zipit version 2.2.2 released late 2002 unique feature original mac file system use forks essentially two separate files finder maintained illusion single file files copied storage media automatically copied forks systems support feature risked problem transmitting one two forks producing unusable file led number archive formats combined two forks along extended metadata single file suitable hosting platforms original pkzip archive format include number features intended help support file systems like mac including things like longer filenames basic metadata however support forks therefore directly capable supporting mac files zip archives present major problem many use-cases mac archive utilities support features like stuffit compact pro early 1990s however zip format becoming almost universal number systems required data exchange notable among fidonet mailers offline mail readers like qwk format times mac users exchange simple files like text file pc user utilities like unzip maczip worked single files include mac-like interface suitable basic tasks zipit introduced address problem explicitly modeling program user interface compact pro lauded one easiest use archivers available zipit essentially replaced compact pro internal compression system pkzips producing program looked similar read wrote zip files instead cpt zipit also included number automation features notably support applescript allowed used programs like freddie qwk reader setting zterm allowed downloaded zip files automatically associated zipit making download-and-open simple task initial stable version 1.1.1 released march 1993 allowed multiple archives opened created one separate window version support hierarchical directories instead encoded files single-level archive downside would allow one file given name archive addressed 1.2.x versions settled final version 1.2.x series version 1.2.6 1994 2001 version 2.0 released version supported mac os x mac os 9 tests 1.1.1 zipit consistently outperformed compact pro stuffit terms compression 10 average speed stuffit making half speed fast compact pro
[ 405, 1710, 2391, 7058, 6380, 5571, 510, 1675 ]
Test
6,538
1
Firebird_(database_server):firebird database server firebird open-source sql relational database management system runs linux microsoft windows macos several unix platforms database forked borland open source edition interbase 2000 since firebird 1.5 code largely rewritten within week interbase 6.0 source released borland 25 july 2000 firebird project created sourceforge firebird 1.0 released linux microsoft windows mac os x 11 march 2002 ports solaris freebsd 4 hp-ux following next two months work porting codebase c c++ began 2000 23 february 2004 firebird 1.5 released first stable release new codebase version 1.5 featured improved query optimizer sql-92 conditional expressions savepoints support explicit locking firebird 2.0 released 12 november 2006 adding support 64-bit architectures tables nested clauses programmable lock timeouts blocking transactions previous stable release version 2.1.6 added new features including procedural triggers recursive queries support merge statements firebird 2.5 introduced new features like improved multithreading regular expression syntax ability query remote databases recent stable version firebird 3.0 released 19 april 2016 focus performance security major re-architecture code allowed total support smp machines using superserver version google summer code 2013 work begun integrating firebird replacement hsqldb libreoffice april 2003 mozilla organization announced rename web browser phoenix firebird trademark dispute phoenix technologies decision caused concern within firebird database project due assumption users internet search engines would confused database web browser using name firebird mozilla developers issued statement making clear software package called mozilla firebird firebird statement also said mozilla firebird name project codename dispute resolved february 9 2004 mozilla changed name browser mozilla firefox thus ending conflict firebird inherited storage architecture interbase ensure acid properties transactions database engine keeps different versions record changed active users database transactions committed last version every changed record marked definitive transactions rolled back database engine keeps mark original record versions leaving untouched result firebird disk writes reduced compared databases use traditional transaction log architecture writing transactions prevent reading vice versa one sees version database tradeoff maintenance “ sweeping ” required time time clean old record versions free disk space multi-generational architecture ensures oltp dss/olap operations run simultaneously without delays caused locking mechanisms found products firebird makes indices database behave like well-tuned “ clustered indexes ” used architectures firebird index buckets ’ subject two-phase locking boolean “ ” “ ” operations performed intermediate bitmaps negligible cost eliminating need optimizer choose alternative indexes firebird database engine modules released open-source license initial developer public license idpl variant mozilla public license mpl version 1.1 require developer open products using firebird even custom-derivatives made source code developer chooses terms conditions honored idpl allows developer make proprietary closed-source applications use firebird based firebird native api used directly indirectly applications middleware connect firebird database implemented client library fbclient.dll windows systems libfbclient.so unix ones services api special function set accessing controlling service administration tasks user management backup/restore statistics gathering embedded sql technique simplifies development c/c++ cobol firebird applications using preprocessor called gpre allows embedding sql statements directly source code host language
[ 4028, 4759, 7248, 4306, 900, 3776, 7067, 8078, 5571, 2571, 578, 7830, 3975, 1655, 7916, 2674, 3894, 7109, 2054, 6386, 7115, 5340, 955, 3915, 1695, 5711, 1435 ]
Test
6,539
4
Hengzhi_chip:hengzhi chip hengzhi chip 联想 恒智 安全芯片 microcontroller store secured information designed people republic china government manufactured china functionalities similar offered trusted platform module unlike tpm follow trusted computing group specifications lenovo selling pcs installed hengzhi security chips chip could development ibm ess embedded security subsystem chip public key smart card placed directly motherboard system management bus september 2006 public specifications chip available
[ 1698 ]
Test
6,540
4
Extended_Validation_Certificate:extended validation certificate extended validation certificate ev certificate conforming x.509 proves legal entity owner signed certificate authority key issue ev certificates ev certificates used manner x.509 certificates including securing web communications https signing software documents ev certificates different domain-validated certificates organization-validation certificates issued subset certificate authorities cas require verification requesting entity legal identity certificate issuance august 2019 google chrome mozilla firefox apple safari web browsers show verified legal identity user interface either instead domain name plan remove distinction near future mobile browsers typically show difference ev certified websites desktop behaviour phased recent versions popular browsers example safari browser apple macos mojave ten popular websites online none use ev certificates trend away usage software verified legal identity displayed user operating system e.g. microsoft windows proceeding installation extended validation certificates stored file format specified typically use encryption organization-validated certificates domain-validated certificates compatible server user agent software criteria issuing ev certificates defined guidelines extended validation promulgated ca/browser forum voluntary organization whose members include leading cas vendors internet software well representatives legal audit professions issue extended validation certificate ca requires verification requesting entity identity operational status control domain name hosting server 2005 melih abdulhayoglu ceo comodo group convened first meeting organization became ca/browser forum hoping improve standards issuing ssl/tls certificates june 12 2007 ca/browser forum officially ratified first version extended validation ev ssl guidelines took effect immediately formal approval successfully brought close two years effort provided infrastructure trusted web site identity internet april 2008 forum announced version 1.1 guidelines building practical experience member cas relying-party application software suppliers gained months since first version approved use major browsers created special user interface indicators pages loaded via https secured ev certificate soon creation standard includes microsoft edge 12 google chrome 1.0 internet explorer 7.0 firefox 3 safari 3.2 opera 9.5 furthermore mobile browsers including safari ios windows phone firefox android chrome android ios added ui indicators usually browsers ev support display validated identity—usually combination organization name jurisdiction—contained ev certificate 'subject field implementations enhanced display includes clicking lock symbol user obtain information certificate including name certificate authority ca issued ev certificate august 2019 google chrome 76 firefox 70 browsers plan remove ui indicators ev certificates important motivation using digital certificates ssl/tls add trust online transactions requiring website operators undergo vetting certificate authority ca order get certificate however commercial pressures led cas introduce domain-validated certificates domain-validated certificates existed validation standards generally require proof domain control particular domain-validated certificates assert given legal entity relationship domain although domain may resemble particular legal entity past browsers user interfaces clearly differentiate low-validation certificates undergone rigorous vetting since successful ssl/tls connection would cause green padlock icon appear browsers users likely aware whether website owner validated result fraudsters including phishing websites could use tls add perceived credibility websites users modern browsers always check identity certificate owners examining details issued certificate always indicates certificate owner information name organization location ev certificates validated baseline requirements extended validation requirements place additional requirements authorities vet companies include manual checks domain names requested applicant checks official government sources checks independent information sources phone calls company confirm position applicant certificate accepted government-registered serial number business well physical address stored ev certificate establishing stricter issuing criteria requiring consistent application criteria participating cas ev certificates intended restore confidence among users website operator legally established business organization verifiable identity said still concern lack accountability led loss public confidence domain-validated certificates lead lax certification practices erode value ev certificates well cas pass independent qualified audit review may offer ev cas globally must follow detailed issuance requirements aim exception extended validation certificates .onion domains otherwise possible get wildcard extended validation certificate – instead fully qualified domain names must included certificate inspected certificate authority ev certificates standard x.509 digital certificates primary way identify ev certificate referencing certificate policies extension field issuer uses different object identifier oid field identify ev certificates oid documented issuer certification practice statement root certificate authorities general browsers may recognize issuers ev https certificates contain subject x.509 oids codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 pointing id relevant secretary state us government business registrar outside us well ca-specific policy identifier ev-aware software web browser recognize criteria issuing extended validation certificates require issuing certificate authorities immediately support online certificate status protocol revocation checking however requirement timely response revocation checks browser prompted certificate authorities previously done implement ocsp support section 26-a issuing criteria requires cas support ocsp checking certificates issued dec. 31 2010 legal entity names unique therefore attacker wants impersonate entity might incorporate different business name e.g. different state country obtain valid certificate use certificate impersonate original site one demonstration researcher incorporated business called stripe inc. kentucky showed browsers display similarly display certificate payment processor stripe inc. incorporated delaware researcher claimed demonstration setup took hour time us 100 legal costs us 77 certificate also noted enough mouse clicks user may able view city state entity incorporated neither helpful typical user likely blindly trust bright green indicator since ev certificates promoted reported mark trustworthy website small business owners voiced concerns ev certificates give undue advantage large businesses published drafts ev guidelines excluded unincorporated business entities early media reports focused issue version 1.0 ev guidelines revised embrace unincorporated associations long registered recognized agency greatly expanding number organizations qualified extended validation certificate 2006 researchers stanford university microsoft research conducted usability study ev display internet explorer 7 paper concluded participants received training browser security features notice extended validation indicator outperform control group whereas participants asked read internet explorer help file likely classify real fake sites legitimate proponents ev certificates claim help phishing attacks security expert peter gutmann states new class certificates restore ca profits eroded due race bottom occurred among issuers industry gutmann calls phenomenon pki-me-harder introduction … so-called high-assurance extended validation ev certificates allow cas charge standard ones simply case rounding twice usual number suspects—presumably somebody ’ going impressed effect phishing minimal since fixing problem phishers exploiting indeed cynics would say exactly problem certificates cas supposed solve first place “ high-assurance ” certificates way charging second time existing service years ago certificates still cost several hundred dollars shifting baseline certificate prices quality moved point obtained 9.95 even nothing big commercial cas reinvent defining new standard convincing market go back prices paid good old days deja-vu-all-over-again approach seen examining verisign ’ certificate practice statement cps document governs certificate issuance security requirements ev-certificate 2008 cps except minor differences legalese used express practically identical requirements class 3 certificates listed verisign ’ version 1.0 cps 1996 ev certificates simply roll back clock approach already failed first time tried 1996 resetting shifting baseline charging 1996 prices side-effect even proposals kind sliding-window approach certificate value inevitable race bottom cheapens effective value established classes certificates ’ regarded less less effective software uses them…
[ 4655, 363, 6795, 1460, 6809, 393, 3291, 2574, 5399, 2577, 6458, 2587, 7567, 7925, 4352, 4725, 7214, 1136, 1513, 2620, 1152, 794, 4759, 1168, 1173, 2644, 5821, 7628, 5824, 5127, 3383, 6553, 4071, 8006, 3043, 1589, 6221, 2691, 520, 3057, ...
Validation
6,541
4
Evercookie:evercookie evercookie javascript-based application created samy kamkar produces zombie cookies web browser intentionally difficult delete 2013 top-secret nsa document leaked edward snowden citing evercookie method tracking tor users traditional http cookie relatively small amount textual data stored user browser cookies used save preferences login session information however also employed track users marketing purposes due concerns privacy major browsers include mechanisms deleting and/or refusing accept cookies websites adobe systems claimed size restrictions likelihood eventual deletion simple textual nature traditional cookies motivated add local shared object lso mechanism adobe flash player adobe published mechanism deleting lso cookies store 100 kb data per website default met criticism security privacy experts since version 4 firefox treated lso cookies way traditional http cookies deleted together samy kamkar released v0.4 beta evercookie september 13 2010 open source according project website evercookie merely difficult delete actively resists deletion copying different forms user machine resurrecting notices copies missing expired specifically creating new cookie evercookie uses following storage mechanisms available developer looking add following features
[ 704, 3932, 2912, 376, 3277, 2923, 7910, 2587, 3323, 5779, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6194, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 8085, 208, 2021, 5922, 6628, 924, 591, 4531, 600, 1307, 954, 2435...
Train
6,542
7
DocuWare:docuware docuware provider solutions document management workflow automation also referred enterprise content management ecm recently content services company headquartered germany united states docuware also name flagship product offered company besides offered cloud-based software service saas also available feature parity installation on-premises software available 16 languages docuware distributed via global network 500 authorized docuware partners adp well directly key accounts january 2017 docuware used 16,000 customers 70 countries october 27 1988 docunet gmbh founded germering germany near munich president jürgen biffar since 1990 mr biffar managing company colleague thomas schneck currently president sales docunet ag renamed docuware ag august 2000 since 1999 docuware outsourced parts development sofia bulgaria 2016 nemetschek ood 42 employees working docuware product docuware gmbh holds 20 percent stake nemetschek ood • docuware corporation new windsor founded january 1 2001 • docuware ltd nottinghamshire founded april 1 2005 • docuware sarl paris founded september 1 2008 • docuware s.l barcelona founded july 1 2009 april 2012 investment agreement signed company morgan stanley expansion capital lp morgan stanley investment management private equity fund aim promoting accelerating global growth docuware legal form ag public holding company changed gmbh limited liability corporation company acquired u.s.-based westbrook technologies inc. developer fortis ecm software august 2013 2014 westbrook technologies inc. merged docuware corporation beginning 2016 docuware appointed dr michael berger chief technology officer cto dr berger joined company 2008 vice president research development 1988 – development dacs-board dacs document archiving communication system 1990 – dacs office first software solution running windows 3.0 store search display print documents windows 3.0 released may 22 1990 1993 – docuware 3.0 customizable file cabinets structure pre-set sending documents docuware 1998 – docuware 4.0 first 32-bit version 2006 – docuware 5.0 new development based .net technology 2008 – docuware web client web-based document management 2009 – docuware saas first saas via private cloud 2012 – docuware online first saas via public cloud 2014 – docuware online renamed docuware cloud ported microsoft azure platform iso 9001 soc 2 idw ers fait 3 hipaa-compliant keypoint intelligence buyers lab bli 2018 outstanding content workflow management platform buyers laboratory inc. bli 2014 5-star rated product program version 6 online buyers laboratory inc. bli 2013 5-star rated product program version 6 wins summer pick award outstanding document management solution
[ 2961, 5908 ]
Validation
6,543
1
Relational_model:relational model relational model rm database management approach managing data using structure language consistent first-order predicate logic first described 1969 english computer scientist edgar f. codd data represented terms tuples grouped relations database organized terms relational model relational database purpose relational model provide declarative method specifying data queries users directly state information database contains information want let database management system software take care describing data structures storing data retrieval procedures answering queries relational databases use sql data definition query language systems implement regarded engineering approximation relational model table sql database schema corresponds predicate variable contents table relation key constraints constraints sql queries correspond predicates however sql databases deviate relational model many details codd fiercely argued deviations compromise original principles relational model central idea describe database collection predicates finite set predicate variables describing constraints possible values combinations values content database given time finite logical model database i.e set relations one per predicate variable predicates satisfied request information database database query also predicate models hierarchical model network model systems using older architectures still use today data centers high data volume needs existing systems complex abstract would cost-prohibitive migrate systems employing relational model also note newer object-oriented databases several attempts produce true implementation relational database model originally defined codd explained date darwen others none popular successes far rel one recent attempts relational model first database model described formal mathematical terms hierarchical network databases existed relational databases specifications relatively informal relational model defined many attempts compare contrast different models led emergence rigorous descriptions earlier models though procedural nature data manipulation interfaces hierarchical network databases limited scope formalization relational model invented edgar f. codd general model data subsequently promoted chris date hugh darwen among others third manifesto first published 1995 date darwen attempt show relational model allegedly accommodate certain desired object-oriented features codd years publication 1970 model proposed three-valued logic true false missing/null version deal missing information relational model database management version 2 1990 went step four-valued logic true false missing applicable missing inapplicable version never implemented presumably attending complexity sql null construct intended part three-valued logic system fell short due logical errors standard implementations fundamental assumption relational model data represented mathematical n -ary relations n -ary relation subset cartesian product n domains mathematical model reasoning data done two-valued predicate logic meaning two possible evaluations proposition either true false particular third value unknown applicable either often associated concept null data operated upon means relational calculus relational algebra equivalent expressive power relational model data permits database designer create consistent logical representation information consistency achieved including declared constraints database design usually referred logical schema theory includes process database normalization whereby design certain desirable properties selected set logically equivalent alternatives access plans implementation operation details handled dbms engine reflected logical model contrasts common practice sql dbmss performance tuning often requires changes logical model basic relational building block domain data type usually abbreviated nowadays type tuple ordered set attribute values attribute ordered pair attribute name type name attribute value specific valid value type attribute either scalar value complex type relation consists heading body heading set attributes body n -ary relation set n -tuples heading relation also heading tuples relation defined set n -tuples mathematics relational database model set unordered collection unique non-duplicated items although dbmss impose order data mathematics tuple order allows duplication e.f. codd originally defined tuples using mathematical definition later one e.f. codd great insights using attribute names instead ordering would much convenient general computer language based relations insight still used today though concept changed name tuple immediate important consequence distinguishing feature relational model cartesian product becomes commutative table accepted visual representation relation tuple similar concept row relvar named variable specific relation type times relation type assigned though relation may contain zero tuples basic principle relational model information principle information represented data values relations accordance principle relational database set relvars result every query presented relation consistency relational database enforced rules built applications use rather constraints declared part logical schema enforced dbms applications general constraints expressed using relational comparison operators one subset ⊆ theoretically sufficient practice several useful shorthands expected available important candidate key really superkey foreign key constraints fully appreciate relational model data essential understand intended interpretation relation body relation sometimes called extension interpreted representation extension predicate set true propositions formed replacing free variable predicate name term designates something one-to-one correspondence free variables predicate attribute names relation heading tuple relation body provides attribute values instantiate predicate substituting free variables result proposition deemed account appearance tuple relation body true contrariwise every tuple whose heading conforms relation appear body deemed false assumption known closed world assumption often violated practical databases absence tuple might mean truth corresponding proposition unknown example absence tuple 'john 'spanish table language skills necessarily taken evidence john speak spanish formal exposition ideas see section set-theoretic formulation data type used typical relational database might set integers set character strings set dates two boolean values true false corresponding type names types might strings int char date boolean etc important understand though relational theory dictate types supported indeed nowadays provisions expected available user-defined types addition built-in ones provided system attribute term used theory commonly referred column similarly table commonly used place theoretical term relation though sql term means synonymous relation table data structure specified list column definitions specifies unique column name type values permitted column attribute value entry specific column row john doe 35 tuple basically thing row except sql dbms column values row ordered tuples ordered instead attribute value identified solely attribute name never ordinal position within tuple attribute name might name age relation table structure definition set column definitions along data appearing structure structure definition heading data appearing body set rows database relvar relation variable commonly known base table heading assigned value time specified table declaration body recently assigned invoking update operator typically insert update delete heading body table resulting evaluation query determined definitions operators used expression query note sql heading always set column definitions described possible column name also two columns name also body always set rows sql possible row appear body sql initially pushed standard language relational databases deviates relational model several places current iso sql standard n't mention relational model use relational terms concepts however possible create database conforming relational model using sql one use certain sql features following deviations relational model noted sql note database servers implement entire sql standard particular allow deviations whereas null ubiquitous example allowing duplicate column names within table anonymous columns uncommon users programs request data relational database sending query written special language usually dialect sql although sql originally intended end-users much common sql queries embedded software provides easier user interface many web sites wikipedia perform sql queries generating pages response query database returns result set list rows containing answers simplest query return rows table often rows filtered way return answer wanted often data multiple tables combined one join conceptually done taking possible combinations rows cartesian product filtering everything except answer practice relational database management systems rewrite optimize queries perform faster using variety techniques number relational operations addition join include project process eliminating columns restrict process eliminating rows union way combining two tables similar structures difference lists rows one table found intersect lists rows found tables product mentioned combines row one table row depending sources consult number operators – many defined terms listed include semi-join outer operators outer join outer union various forms division operators rename columns summarizing aggregating operators permit relation values attributes relation-valued attribute operators group ungroup select statement sql serves handle except group ungroup operators flexibility relational databases allows programmers write queries anticipated database designers result relational databases used multiple applications ways original designers foresee especially important databases might used long time perhaps several decades made idea implementation relational databases popular businesses relations classified based upon types anomalies 're vulnerable database first normal form vulnerable types anomalies database domain/key normal form modification anomalies normal forms hierarchical nature lowest level first normal form database meet requirements higher level normal forms without first met requirements lesser normal forms idealized simple example description relvars relation variables attributes design six relvars customer order order line invoice invoice line product bold underlined attributes candidate keys non-bold underlined attributes foreign keys usually one candidate key chosen called primary key used preference candidate keys called alternate keys candidate key unique identifier enforcing tuple duplicated would make relation something else namely bag violating basic definition set foreign keys superkeys includes candidate keys composite composed several attributes tabular depiction relation example customer relvar relation thought value attributed relvar attempted insert new customer id 1234567890 would violate design relvar since customer id primary key already customer 1234567890 dbms must reject transaction would render database inconsistent violation integrity constraint foreign keys integrity constraints enforcing value attribute set drawn candidate key another relation example order relation attribute customer id foreign key join operation draws information several relations joining relvars example could query database customers orders invoices wanted tuples specific customer would specify using restriction condition wanted retrieve orders customer 1234567890 could query database return every row order table customer id 1234567890 join order table order line table based order flaw database design invoice relvar contains order attribute tuple invoice relvar one order implies precisely one order invoice reality invoice created many orders indeed particular order additionally order relvar contains invoice attribute implying order corresponding invoice always true real world order sometimes paid several invoices sometimes paid without invoice words many invoices per order many orders per invoice many-to-many relationship order invoice also called non-specific relationship represent relationship database new relvar introduced whose role specify correspondence orders invoices order relvar one-to-many relationship orderinvoice table invoice relvar want retrieve every invoice particular order query orders order order relation equals order orderinvoice invoice orderinvoice equals invoice invoice basic notions relational model relation names attribute names represent strings person name usually use variables formula_1 formula_2 range another basic notion set atomic values contains values numbers strings first definition concerns notion tuple formalizes notion row record table next definition defines relation formalizes contents table defined relational model relation closely corresponds usually called extension predicate first-order logic except identify places predicate attribute names usually relational model database schema said consist set relation names headers associated names constraints hold every instance database schema one simplest important types relation constraints key constraint tells us every instance certain relational schema tuples identified values certain attributes superkey set column headers values columns concatenated unique across rows formally candidate key superkey subdivided form another superkey functional dependency property value tuple may derived another value tuple input set fds contain subsets header h
[ 3928, 7512, 3255, 4299, 1449, 3268, 3951, 6430, 3633, 2937, 6462, 1861, 6128, 7205, 5419, 6130, 5778, 7213, 6144, 1891, 84, 784, 4747, 2265, 1905, 2624, 7248, 3005, 4775, 3011, 4408, 6543, 2662, 7999, 4798, 517, 7303, 4457, 6586, 4105, ...
Test
6,544
4
Cyber_Storm_III:cyber storm iii cyber storm iii international cyber security exercise sponsored united states department homeland security 2010 week-long exercise centered washington dc concluded oct. 1st
[ 580 ]
Test
6,545
3
Socket_FT3:socket ft3 amd socket ft3 bga-769 targets mobile devices designed apus codenamed kabini temash beema mullins socket ft3b kabini temash -branded products combine jaguar islands gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors beema mullins -branded products puma amd radeon rx 200 series gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors desktop counterpart socket am1
[ 2539, 6599, 2541, 5895, 4931, 7163, 3362, 1735, 2016, 5377, 6351, 913, 7826, 4694, 2751, 6545, 6373, 1961, 5063, 6655, 6562, 6307, 3145, 4090, 866, 5436, 780, 1143, 7782 ]
Test
6,546
4
Ryan_Lackey:ryan lackey ryan donald lackey born march 17 1979 entrepreneur computer security professional co-founder havenco world first data also speaks numerous conferences trade shows including def con rsa data security conference various topics computer security field appeared cover wired magazine numerous television radio print articles havenco sealand lackey operated blueiraq vsat communications company serving dod domestic markets iraq afghanistan us conflicts lackey born west chester pennsylvania also lived throughout us europe anguilla sealand dubai iraq teenager briefly involved globewide network academy lackey attended mit majored course 18 mathematics student mit later dropped due financial constraints lackey became interested electronic cash distributed systems originally massively multiplayer online gaming interest led attending several conferences financial cryptography 98 various mit presentations participating mailing lists cypherpunks dbs eventually implementing patented chaumian digital cash underground library hinde ian goldberg named hinde ten berge dutch cypherpunk also present fc98 part contributed cypherpunks movement one longest anonymous remailer operators 1999 lackey lived san francisco bay area period anguilla moving unrecognized state sealand coast united kingdom establishing havenco december 2002 left havenco following dispute company directors sealand royal family eventually blueiraq business model became economically unfeasible due escalation anti-western violence primarily form improvised explosive devices troop draw downs blueiraq sought venture capital transform large general consumer cellular telephone company however 2008 financial crisis instability iraq afghanistan made fund raising impossible lackey returned us located san francisco worked number start-up companies applying combinator accepted combinator summer 2011 round lackey founded cryptoseal vpn service start-up small group people well known computer security community secured funding ron conway well known venture capital fund june 2014 cryptoseal acquired cloudflare br
[ 3770, 1805 ]
Validation
6,547
3
Motorola_X8_Mobile_Computing_System:motorola x8 mobile computing system motorola x8 mobile computing system chipset motorola android-based smartphones based qualcomm snapdragon system chip s4 pro cpu s4 pro arm-compatible dual-core krait gpu chip 4-core adreno 320 several low-power dsp chips added motorola s4 pro chipset process audio inputs sensors
[ 6910 ]
Test
6,548
2
Speakable_items:speakable items speakable items part speech recognition feature classic mac os macos operating systems allows user control computer natural speech without train computer beforehand commands must present speakable items folder though created something simple shortcut applescript keyboard command automator workflows speakable items first introduced part apple speech recognition software plaintalk 1993 originally available quadra av models later integrated system 7.1.2 release macintosh system software release mac os x v10.4 featured 12 list features os x mountain lion speakable items relocated accessibility panel system preferences mac os x v10.4 added automator workflows also used speakable items workflow saved application put speakable items folder becomes available speech recognition software words computer recognize execute command name saved automator application words might misspelt computer know proper pronunciation example computer best recognizes les misérables lay mizzer ob automator made comply applescript applications third party non applescript applications limewire final cut studio apps work speakable items unless configure commands define keyboard command 'll select application making keyboard command speakable items useful well innovative recognition gets hard distorted times
[ 3940, 713, 4690, 734, 405, 6832, 3989, 2597, 3322, 1502, 5786, 4740, 1897, 6505, 2627, 7609, 1171, 5109, 2284, 5477, 1178, 6188, 1187, 1562, 6909, 502, 6557, 2679, 6565, 2329, 3050, 163, 4453, 6582, 5535, 5191, 8051, 7335, 3445, 569, 55...
Test
6,549
2
CrunchBang_Linux:crunchbang linux crunchbang linux abbreviated linux distribution derived debian philip newborough commonly known username corenominal crunchbang designed use comparatively system resources instead desktop environment used customized implementation openbox window manager many preinstalled applications used gtk+ widget toolkit crunchbang software repository drew vast majority packages debian repositories philip newborough announced 6 february 2015 stopped developing crunchbang users would benefit using vanilla debian linux distributions arisen place effort continue environment among significant bunsenlabs crunchbang++ crunchbang linux provided openbox version i686 i486 amd64 architectures october 2010 also lite version fewer installed applications lite version effectively discontinued distribution based – ubuntu 9.04 – reached end-of-life crunchbang prepared switch different base system crunchbang 10 made available february 2011 first version based debian final version crunchbang 11 made available 6 may 2013 crunchbang linux release given version number well code name using name muppet show character first letter code name first letter upstream debian release previously debian squeeze crunchbang statler currently debian wheezy crunchbang waldorf may 2013 jim lynch desktoplinuxreviews.com reviewed crunchbang 11 newborough announced february 2015 abandoning development crunchbang linux feeling longer served purpose users agree number proceeded develop successor distributions bunsenlabs crunchbang++ ++ crunchbang-monara bunsenlabs linux community-organized successor crunchbang based debian 9 stretch stable release 17 30 september 2015 crunchbang domain began redirecting bunsenlabs crunchbang plusplus ++ developed response newborough announcement end crunchbang based debian jessie release 8.1 distribution release 1.0 announced 29 april 2015 latest version based debian 10.0 released 8 july 2019 crunchbang-monara another successor crunchbang based debian 8 stable release
[ 5540, 5197, 5200, 1629, 3444, 7251, 5912, 474, 7075, 1941, 314, 2758, 7463, 499, 1663, 2864, 4165, 3559, 6209, 7954, 6761, 2063, 343, 4824, 5523, 5259, 1893, 5530, 5704, 6317, 3751, 4910, 7587, 8142, 2170, 6244 ]
Train
6,550
2
BlackBerry_PlayBook:blackberry playbook blackberry playbook mini tablet computer developed blackberry made quanta computer original design manufacturer odm first released sale april 19 2011 canada united states playbook first device run blackberry tablet os based qnx neutrino runs apps developed using adobe air later announced blackberry tablet os would merged existing blackberry os produce new operating system blackberry 10 would used universally across blackberry product line second major revision blackberry playbook os released february 2012 playbook also supports android os applications allowing sold installed blackberry app world store early reviews mixed saying although hardware good several features missing shipments totaled approximately 500,000 units first quarter sales 200,000 following quarter many 700,000 units shipped retailers allegedly remained shelves months prompting blackberry introduce dramatic price reductions november 2011 increase sales sales rebounded following price cuts blackberry shipping approximately 2.5 million blackberry playbooks june 1 2013 end month ceo announced platform would developed rumors forthcoming computer nicknamed 'blackpad press expected similarity apple competing ipad circulated several months announcement research motion co-ceo mike lazaridis adobe systems cto kevin lynch staged first public demonstration playbook october 25 2010 onstage opening-day keynote adobe max 2010 conference among features demonstrated tight integration support adobe air applications full flash support according lazaridis 're trying dumb internet mobile device 've done bring mobile devices level desktop computers lazaridis announced end presentation developers get adobe air applications approved blackberry app world would eligible free blackberry playbook tablets since free playbook offer extended include webworks applications blackberry playbook supports 1080p video playback playbook features 3 mp front-facing camera video chatting wi-fi rear-facing 5 mp camera record 1080p video playbook 1024×600 wsvga aspect ratio 16:9 making device perfectly acceptable viewing hd video content media 7-inch display 3d graphics acceleration features variety sensors including invensense 6-axis gyroscope magnetometer accelerometer playbook uses dual-core texas instruments omap4430 processor newer faster playbook included dual-core texas instruments omap4460 processor blackberry playbook supports high resolution video playback h.264 mpeg4 wmv audio mp3 aac 5.1 wma 5.1 audio playback formats also micro-hdmi port hdmi video output blackberry playbook receives score 428 html5 test browser placing 4th tablets beating chrome beta chrome 18 ios 7 safari ios 6.0 safari opera mobile 12.10 silk 2.2 amazon kindle fire internet explorer 11 android 4.0 browsers blackberry tablet os 2.1 adobe flash version 11.1.121.74 support flash content usable blackberry playbook released canada usa april 19 2011 uk netherlands june 16 2011 united arab emirates june 25 2011 early reviews product mixed praising playbook fluid ui adobe flash supported webkit-based browser flash video support fast javascript html 5.0 web page rendering hdmi output multitasking capabilities playbook criticized initially requiring blackberry native email calendar applications although third party email calendar applications supported platform also relatively native third party applications compared platforms though number available steadily risen following mixed reviews blackberry playbook began gain traction receive better reviews temporary issues solved walt mossberg columnist wall street journal wrote got strong impression rim scrambling get product market rim co-ceo jim balsillie countered critics noting 60 million blackberry smartphones use ability pair playbook april 2013 blackberry ceo thorsten heins stated interview five years n't think 'll reason tablet anymore position analysts attributed blackberry spectacular failure tablet market playbook time launch 2,000 3,000 apps available blackberry app world may 1 2012 24,700 playbook applications available blackberry app world blackberry announced march 24 2011 would expand application ecosystem playbook include blackberry java android-based applications press release blackberry stated developers would able simply repackage code sign submit android apps blackberry app world however first update android 2.3 applications able run playbook applications became available blackberry tablet os 2.0 released february 21 2012 however java applications available future update popular android applications ported onto blackberry world pinterest whatsapp installed users sideloading process however 2.1 os update rim denied sideloading process first decision blackberry ship playbook without native applications e-mail calendar became source criticism derision reviewers users way access email web browser blackberry bridge third-party applications app world blackberry chose security reasons however blackberry made native applications available update system software playbook os 2.0 released february 21 2012 software update added integrated native email calendar contact apps also included visual changes operating system support variety android applications also brought three new applications built os press reader newspaper reader news rss reader print go used send documents pc playbook bbm aka blackberry messenger support included 2.0 update although blackberry intends support bbm future update bbm still supported blackberry bridge software allowing users continue access bridged blackberry smartphone october 3 2012 blackberry released playbook os 2.1 january 30 2013 blackberry confirmed wi-fi playbook newer cellular playbooks would receiving update new blackberry 10 operating system 2013 june 28 2013 company announced plans bring blackberry 10 playbook canceled sparking fears device potential scrapping according blackberry ceo thorsten heins multiple teams spent great deal time energy investigating ways bring os device ultimately heins intervened cancel project citing dissatisfaction level performance user experience immediate decisions device future certain heins promise blackberry would support playbook existing software platforms configurations blackberry bridge accesses mail calendar contacts directly tethered blackberry phone playbook meets encryption standards blackberry phone cryptographic components blackberry os kernels cryptography-related os java modules certified fips 140-2 makes tablet eligible use u.s. federal government agencies blackberry playbook os2.1 update september 2012 enabled full-disk encryption device using algorithm previously used limited enterprise kernel handling tethered content paired blackberry phone first playbook tablet wi-fi connectivity dual core 1 ghz texas instruments omap 4430 processor customers could purchase wifi playbook 16 gb 32 gb 64 gb storage configurations june 2012 16 gb model discontinued however 32 64 gb wi-fi versions remained sale august 2012 playbook 4g lte released canada featured dual-core 1.5 ghz processor 4g lte umts/hspa+ cellular connectivity nfc chip unlike earlier playbook model playbook 4g lte sold carrier channels november 2012 another variant 1.5 ghz playbook playbook 3g+ released uk unlike wi-fi models 4g lte 3g+ models available 16 gb 64 gb versions following launch blackberry 10 operating system blackberry z10 smartphone blackberry ceo thorsten heins confirmed company exploring opportunities future tablet releases announced plans tablet market playbook would converted new blackberry 10 os decided stop efforts focus core hardware portfolio mobile phones thereby bringing playbook end-of-life march 2015 blackberry announced blackberry secutablet tablet uses samsung knox hardware samsung galaxy tab 10.5 august 2011 blackberry advertised following made playbook accessories leather slipcase valextra italy premium charger delvaux belgium envelope-style leather case leather journal rapid charging pod neoprene zip sleeve convertible case blackberry earphones ganzo japan leather zipped pocket porter japan nylon canvas sleeve zipped bag want les essentiels de la vie canada leather zippered wallet-style case soft shell leather sleeve rapid travel charger brooklyn japan calfskin case ettinger england leather case neoprene sleeve torch smartphone accessing emails leather envelope various sources estimated sales figure launch day alone approximately 50,000 exceeding analyst expectations blackberry announced quarterly earnings half million playbook tablets shipped first quarter however lukewarm market reception reports company allegedly revised second-quarter estimates 2.4 million 800,000 – 900,000 units following several months poor sales blackberry started discounting price playbook original retail price improve product run rate retail december 2011 blackberry took 485 million write-down account offering price discounts sales improved subsequent quarters result according strategy analytics figures 2011 second quarter playbook market share middle 2011 3.3 compared ios ipads apple 61.3 android google 30.1 various windows microsoft 4.6 however playbook remained relatively popular tablet canada earlier years accounting nearly 20 tablet market research motion home country report released july 2012 strong discounting older wi-fi playbooks resulted strong sales uk christmas 2012
[ 7232, 4575, 4759, 6336, 291, 1544, 298, 1900, 5571, 6015, 740, 1659, 5405, 6378, 2048, 8009, 2233, 1970, 950, 158, 2795, 1237, 6858, 2706, 7871, 3420, 4380 ]
Test
6,551
8
Incremental_rendering:incremental rendering incremental rendering refers feature built modern web browsers specifically refers browser ability display partially downloaded web page user browser awaits remaining files server advantage user perceived improvement responsiveness web browser web site purpose incremental rendering similar purpose interlaced jpeg improves presentation speed user quickly displaying low-resolution version image improves high-resolution rather image slowly paints top bottom without incremental rendering web browser must wait code page fully loaded present content user earlier web browsers offered something compromise displaying html page entire html file retrieved inserting images one-by-one retrieved afterwards although utility incremental rendering seems intuitively obvious making happen something art well science sequence various elements web page render almost never strictly top-to-bottom programming fills missing pieces must certain amount guesswork determine best display partial content images particular virtually always loaded following html page browser must consult html file order know images request server server n't present automatically without follow-up request web designers web design software often include hints assist process example including expected heights widths images html code browser may allocate correct amount screen space image actually retrieved server
[ 6221, 84 ]
Test
6,552
5
Digital_Multiplex_System:digital multiplex system digital multiplex system dms name shared among several different telephony product lines nortel networks wireline wireless operators among dms-1 originally named dms-256 rural/urban digital loop carrier dms-10 telephone switch dms supernode family telephone switches dms-100 dms-200 dms-250 dms-300 dms-500 dms-gsp dms-msc dms-mtx s/dms optical transmission system exploratory development technology began northern telecom bell northern research labs ottawa ontario 1971 first class 5 switch dms-10 began service 21 october 1977 fort white florida first toll switch class 4 dms-200 entered service 1979 ottawa ontario dms-10 first commercially successful class 5 digital switch north american market profound impact industry numerous digital switching products introduced north american telephone market late 1970s nortel dms family still production genband acquired nortel cvas assets including dms line 2011 rolled ip-based genius platform genius-750nt first product include adaptive nano-tech compression resynchronization modules ericsson replace digital cross-connect dcs place since earliest dms releases previously new technology entered telecommunications industry slowly telephone companies amortizing equipment periods long forty years intending delay introduction digital switching 1990s dms introduction digital technology changed industry became one antecedents encouraged growth internet october 16 2006 nortel received special recognition award canada telecommunications hall fame role pioneering digital communications digital multiplex system dms name arose designation switching matrix design developed exploratory phase project digital multiplexed switch selected basic switching design project product intended successor nortel first electronic switch sp1 called sp2 however dms acronym mellifluous eventually 1975 adopted designation dms-10 dms-100 family products standing system rather switch applied entire digital switching family well dms-1 family digital transmission concentrators dms favoured many european cable operators switching platform voice networks dms-10 widely used rural wireline providers dms-100 200 switches widely deployed throughout u.s. canada regional bell operating companies bell canada independent telephone companies well us military dms-250 backbone number carriers long distance networks dms-300 international gateway switch dms-500 commonly deployed competitive local exchange carriers combines dms-100 250 capabilities dms switches run proprietary multitasking operating system known sos user interface called mapci consists series multi-level menus usually accessed connected vt100 compatible dumb terminal terminal emulator level overlay performs different functions
[ 5614, 7888 ]
Test
6,553
4
Padding_oracle_attack:padding oracle attack cryptography padding oracle attack attack uses padding validation cryptographic message decrypt ciphertext cryptography variable-length plaintext messages often padded expanded compatible underlying cryptographic primitive attack relies padding oracle freely responds queries whether message correctly padded padding oracle attacks mostly associated cbc mode decryption used within block ciphers padding modes asymmetric algorithms oaep may also vulnerable padding oracle attacks symmetric cryptography padding oracle attack applied cbc mode operation oracle usually server leaks data whether padding encrypted message correct data allow attackers decrypt sometimes encrypt messages oracle using oracle key without knowing encryption key standard implementation cbc decryption block ciphers decrypt ciphertext blocks validate padding remove pkcs7 padding return message plaintext server returns invalid padding error instead generic decryption failed error attacker use server padding oracle decrypt sometimes encrypt messages mathematical formula cbc decryption depicted cbc decryption xors plaintext block previous ciphertext block result single-byte modification block formula_3 make corresponding change single byte formula_4 suppose attacker two ciphertext blocks formula_5 wants decrypt second block get plaintext formula_4 attacker changes last byte formula_3 creating formula_8 sends formula_9 server server returns whether padding last decrypted block formula_10 correct equal 0x01 padding correct attacker knows last byte formula_11 formula_12 therefore formula_13 padding incorrect attacker change last byte formula_8 next possible value attacker need make 256 attempts one guess every possible byte find last byte formula_4 decrypted block contains padding information bytes used padding additional attempt need made resolve ambiguity determining last byte formula_4 attacker use technique obtain second-to-last byte formula_4 attacker sets last byte formula_4 formula_19 setting last byte formula_3 formula_21 attacker uses approach described time modifying second-to-last byte padding correct 0x02 0x02 block consists 128 bits aes example 16 bytes attacker obtain plaintext formula_4 255⋅16 4080 attempts significantly faster formula_23 attempts required bruteforce 128-bit key original attack published 2002 serge vaudenay concrete instantiations attack later realised ssl ipsec also applied several web frameworks including javaserver faces ruby rails asp.net well software steam gaming client 2012 shown effective hardened security devices earlier attacks fixed tls implementors following public announcement new variant lucky thirteen attack published 2013 used timing side-channel re-open vulnerability even implementations previously fixed early 2014 attack longer considered threat real-life operation though still workable theory see signal-to-noise ratio certain class machines active area development attacks upon cryptographic protocols used secure internet traffic downgrade attack logjam export rsa/freak attacks trick clients using less-secure cryptographic operations provided compatibility legacy clients secure ones available attack called poodle late 2014 combines downgrade attack ssl 3.0 padding oracle attack older insecure protocol enable compromise transmitted data may 2016 revealed cve-2016-2107 fix lucky thirteen openssl introduced another padding oracle
[ 363, 794, 887, 6795, 1168, 1173, 2644, 7347, 1460, 5824, 8189, 8093, 6540, 5399, 6458, 2587, 4071, 7567, 7925, 3899, 2691, 6049, 4990, 7214, 3588, 353, 1059, 1513, 2620, 359, 3426 ]
Validation
6,554
8
Social_Blade:social blade social blade sometimes spelled socialblade website tracks social media statistics analytics social blade notably tracks youtube platform also analytical information regarding twitch instagram twitter facebook mixer dailymotion social blade functions third-party respective social media platforms jason urgo ceo social blade jason urgo ceo social blade launched website february 2008 track statistics website digg 2010 website switched track youtube statistics october 2012 social blade became llc 2014 social blade launched consulting channel management services october 24 2018 social blade started popular live stream show subscriber difference t-series pewdiepie online competition stream regularly 900 viewers led large increase subscriber count accompany attention april 2019 social blade pulled april fools joke allowed users change subscriber counts ranks ridiculously high numbers frequently asked questions faq page social blade wrote order best scale tracking meet needs millions use social blade pull data youtube public api means 're getting information see public youtube channel pages work examine data across multiple days aggregate display format useful social blade website contains subscriber predictions social blade also provides real-time subscriber count updates social blade also noted work content creators youtube multi-channel networks mcns help creators get partnered official youtube twitter account teamyoutube wrote please know third party apps socialblade accurately reflect subscriber activity social blade twitter account responded tweet commenting n't make data get youtube api rely accuracy social blade community manager danny fratella suggested youtube content creators may notice subscriber view count purges due higher accessibility data-tracking tools like social blade social blade data analytics cited mainstream news media outlets money nbc huffpost outlets focused internet culture well kotaku polygon tubefilter aside using subscriber follower statistics reported social blade media outlets also cite social blade regards content creator account estimated earnings huffpost wrote social blade estimates earnings youtube channel based money generated every thousand ad views estimates n't exact instead create minimum maximum amount channel could earning cases range huge social blade support services manager jenna arnold stated range huge cpms cost per thousand views vary much anywhere 0.25 4.00 average urgo also commented 0.25– 4.00 per 1,000 views range stating data points change time time exact science generally hold true channels social blade blog also noted continuously updated articles news interest content creators helping stay top evolving trends ways better use youtube social media services
[ 518 ]
Test
6,555
8
Web_Services_Semantics:web services semantics web services semantics wsdl-s proposed extension wsdl standard wsdl-s extends standard wsdl include semantic elements improve reusability web services facilitating composition services improving discovery enabling integration legacy software web services framework wsdl-s developed ibm university georgia
[ 6986, 5500, 5631 ]
Test
6,556
3
Gemfire:gemfire gemfire released japan royal blood ロイヤルブラッド roiyaru buraddo super royal blood スーパーロイヤルブラッド sūpā roiyaru buraddo super famicom version medieval war game msx nintendo entertainment system super nes fm towns mega drive/genesis ms-dos later windows developed koei object game unify fictional island force players use infantry cavalry archers well fantasy units magicians dragons gargoyles order capture castle needed control particular territory sequel royal blood ii released japan market japanese windows game takes place fictitious isle ishmeria upon time six wizards wielding unique brand magic used powers protect island maintain peace disrupted collectively challenged fire dragon summoned forth wizard intent plunging country darkness sea-dwelling dragon peace known pastha charged six wizards task fighting back succeeded sealing fire dragon away ruby top crown became six jewels around crown base crown called gemfire symbol utmost power authority gemfire fell hands current king ishmeria eselred sought abuse object power using embark tyrannical reign instilling fear within oppressed subjects ishmeria fell despair power flourished finally young daughter princess robyn could bear watch father grievous misdeeds longer—she seized gemfire pried six wizard gems loose causing shoot upward sky circle briefly overhead scattering different parts ishmeria furious eselred learned robyn actions locked away tower futile deed already done robyn taken crucial first step toward freeing people meanwhile six wizards take residence prominent family ishmeria two powerful clans blanches led prince erin supported zendor emerald wizard wielder lightning lyles led prince ander backed pluvius sapphire wizard caster meteors four clans flax coryll chrysalis molbrew also wizards scylla empyron chylla skulryk respectively gemfire disposal beginning breaking spell gemfire clans sets unseat eselred claim throne restore order peace ishmeria outset game player option selecting scenario family chosen scenario changes relative power territories families although minor families present one two scenarios every family playable least one scenario except blanche lyle playable four lankshire played ultimately player must conquer entire map win game gameplay divided main world map screen individual battle screens map screen player allowed one action per turn in-game month per territory action player may hire move troops upgrade territory economy defenses engage diplomatic actions sabotage plunder neighboring territory attack adjacent enemy territory adjacent territories may attacked upon attacking attacked enemy focus shifts battle wherein player may field five units archers knights horsemen either wizard hired unit player moves individual companies troops map turn-based tactics fashion certain units may build fences keep enemies one army wins enemy base captured enemy units defeated enemy army runs food
[ 8015, 6380, 4759 ]
Validation
6,557
2
Preview_(macOS):preview macos preview image viewer pdf viewer macos operating system enables users view print digital images portable document format pdf files preview uses apple implementation pdf specification aqua graphical user interface quartz graphics layer imageio core image frameworks like macos originated nextstep operating system company next part every release nextstep os since 1989 preview open following file types version preview included os x 10.3 could loop animated gifs via optional play button could added toolbar os x 10.4 preview lost playback functionality animated gifs would instead display individual frames numbered sequence preview encrypt pdf documents restrict use example possible save encrypted pdf password required copy data document print however encrypted pdfs edited original author always keep unencrypted version features otherwise available professional pdf editing software provided preview possible extract single pages multi-page documents e.g pdf files sort pages drag drop single multiple pages several opened multi-page documents applications attaching opened email message preview offers basic image correction tools using core image processing technology implemented macos features like shape extraction color extraction cropping rotation tools annotating images preview uses vector shapes text image rasterized jpeg png another bitmap format pdf image documents also supplied keywords automatically indexed using macos system-wide spotlight search engine preview directly access image scanners supported macos import images scanner preview convert image formats export bmp jp2 jpeg pdf pict png sgi tga tiff using macos print engine based cups also possible print postscript file pdf-x file directly save file iphoto example scanned photos beginning mac os x 10.7 lion preview restricts format option popup menu save dialog commonly used types possible access full format list holding option key clicking format popup menu gif icns jpeg jpeg-2000 microsoft bmp microsoft icon openexr pdf photoshop png sgi tga tiff new edit button picture edited introduced version 7 edit button allows options insert shapes lines cropping among things os x 10.9.2 preview support iso-standardized pdf iso 32000 saving destroys aspects pdf files without warning user
[ 3940, 713, 4690, 734, 405, 6832, 3989, 2597, 3322, 1502, 5786, 4740, 1897, 5450, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 2679, 6565, 2329, 3050, 163, 6582, 2706, 5535, 5191, 8051, 4119, 893, 7335, 34...
Train
6,558
6
ReFS:refs resilient file system refs codenamed protogon microsoft proprietary file system introduced windows server 2012 intent becoming next generation file system ntfs refs designed overcome problems become significant years since ntfs conceived related data storage requirements changed key design advantages refs include automatic integrity checking data scrubbing removal need running chkdsk protection data degradation built-in handling hard disk drive failure redundancy integration raid functionality switch copy/allocate write data metadata updates handling long paths filenames storage virtualization pooling including almost arbitrarily sized logical volumes unrelated physical sizes used drives requirements arose two major changes storage systems usage – size storage use large massive arrays multi-terabyte drives fairly common need continual reliability result file system needs self-repairing prevent disk checking impractically slow disruptive along abstraction virtualization physical disks logical volumes refs initially added windows server 2012 aim gradual migration consumer systems future versions achieved windows 8.1 initial versions removed ntfs features disk quotas alternate data streams extended attributes re-implemented later versions refs early versions 2012–2013 refs similar slightly faster ntfs tests far slower full integrity checking enabled result attributed relative newness refs pre-release concerns also voiced one blogger storage spaces storage system designed underpin refs reportedly could fail manner prevented refs recovering automatically ability create refs volumes removed windows 10 2017 fall creators update editions except enterprise pro workstations would seem indicate microsoft longer intending refs general replacement ntfs least near future cluster size refs volume either 4 kib 64 kib ntfs features implemented refs include object ids 8.3 filename ntfs compression encrypting file system efs transactional ntfs hard links extended attributes disk quotas addition windows booted refs volume dynamic disks mirrored striped volumes replaced mirrored striped storage pools provided storage spaces however automated error-correction supported mirrored spaces data deduplication missing early versions refs. implemented v3.2 debuting windows server v1709 support alternate data streams initially implemented refs windows 8.1 64-bit server 2012 r2 file system reacquired support alternate data streams lengths 128k automatic correction corruption integrity streams used parity spaces refs initially unsuitable microsoft sql server instance allocation due absence alternate data streams march 2015 review state refs windowsnetworking.com stated ’ least time boot windows refs volume first versions refs ’ include file-level compression encryption disk quotas hard links advantages ntfs fat file systems note refs support sparse files reparse points case-sensitive file names unicode file names perhaps important preserves enforces access control lists acls ’ obvious refs current iteration replacement ntfs ... applications rely specific ntfs features might work refs ... however ... storage conventional data ’ require specific ntfs features ’ supported refs refs handle duty nicely primary use case file servers store extremely large amounts data data integrity recovery mechanisms built file system well means tools designed detect repair file corruption file systems ’ necessary incompatibility refs ’ really issue additionally although refs ’ support file level encrypting file system encryption bitlocker used protect refs volumes ’ much issue either ... refs distinct advantages current reigning windows file system ntfs also drawbacks boasts self-healing powers ability repair files without time less risk data lost ’ power failure due way writes metadata course ability create huge volumes files even give files names longer 255 characters wish ’ quite ready prime time yet refs different versions various degrees compatibility operating system versions aside development versions filesystem usually later operating system versions mount filesystems created earlier os versions backwards compatibility features may compatible feature set os version cluster size features filesystem queried command fsutil fsinfo refsinfo volumename notes issues identified suggested refs running storage spaces intended design include storage developer conference 2015 microsoft developer presented enhancements refs expected released windows server 2016 included technical preview 4 titled refs v2 highlighted refs included capabilities high speed moving reordering cloning blocks files done blocks file particularly needed virtualization stated allow fast provisioning diff merging tiering enhancements cover redo log synchronous disk writes parallelization efficient tracking uninitialized sparse data files efficient 4k i/o refs file integrity enabled also acts like log-structured file system coalescing small random writes large sequential ones efficiency operating systems competing file systems refs best known zfs btrfs sense three designed integrate data protection snapshots silent high speed background healing corruption data errors 2012 phoronix wrote analysis refs vs btrfs copy-on-write file system linux features similar supporting checksums raid-like use multiple disks error detection/correction however refs lacks copy-on-write snapshots compression found btrfs zfs 2014 review refs assessment readiness production use concluded refs least advantages two main file system competitors
[ 3599, 7879, 3937, 2547, 3263, 7161, 4672, 378, 2198, 6431, 6096, 3626, 1475, 5049, 7553, 6117, 6462, 7195, 5410, 7564, 2953, 759, 422, 6844, 2245, 6854, 5437, 435, 6857, 5442, 4375, 4377, 5090, 1149, 3340, 6500, 6505, 7602, 6164, 5457, ...
Train
6,559
4
ChronoSync:chronosync chronosync macos application periodic backups bootable drive clones folder synchronizations offers ability target device folder visible finder volume thumb drive nas disk image server another mac 2014 chronosync received top software pick about.com received 10 10 rating apple daily report
[]
Validation
6,560
4
Check_Point_Integrity:check point integrity check point integrity endpoint security software product developed check point software technologies designed protect personal computers networks connect computer worms trojan horses spyware intrusion attempts hackers software aims stop new pc threats attacks signature updates installed pc software includes administrator manages security policies apply groups users central console server check point acquired integrity software part acquisition endpoint security start-up zone labs 2004 integrity software released early 2002 derived zonealarm security technology added central policy management network access control functions integrity integrated network gateways cisco vpn 3000 series ensure pc met security requirements granted access network demand endpoint security grew 2003 sql slammer blaster computer worms reportedly caused extensive damage despite widespread use antivirus software personal computers number destructive worms followed subsequent rise spyware significant problem continued increase demand endpoint security products data privacy integrity regulations required security audits mandated governmental professional authorities along infections damage caused guest pc access also prompted use security software competitors include symantec/sygate cisco security agent mcafee entercept even point products like determina memory firewall
[ 1249, 3165, 1809, 4759, 806, 994, 3185, 4492, 7351, 4138, 385, 7536, 2296, 2746, 7597, 4783, 6107, 578, 3637, 8100, 6456, 3551, 1291, 7275, 7744, 3394, 4977, 7289, 7478, 3223, 3484, 3486, 6043, 4091, 2790, 7683, 6235, 6149, 6951, 2618, ...
Test
6,561
9
Walter_Bright:walter bright walter bright american computer programmer created programming language zortech c++ compiler empire computer game bright main developer first c++ compiler translate source code directly object code without using c intermediate zortech c++ later becoming symantec c++ digital mars c++ designing c++ compiler developed datalight c compiler also sold zorland c later zortech c. bright graduated caltech 1979 bachelor science aerospace engineering university wrote empire wargame pdp-10 mainframe completed 1977 walter bright creator programming language implemented compilers several languages considered expert many areas related compiler technology walter regularly writes scientific magazine articles compilers programming blogger dr. dobb journal hired facebook write fast c/c++ preprocessor
[ 1361, 2827, 5621, 5911, 270, 1435 ]
Test
6,562
3
Socket_FT1:socket ft1 socket ft1 bga413 cpu socket released january 2011 amd apus codenamed desna ontario zacate hondo uber name brazos available chipsets consult fusion controller hubs fch
[ 2539, 6599, 2541, 5895, 4931, 7163, 3362, 1735, 2016, 5377, 6351, 913, 7826, 4694, 2751, 6545, 6373, 1961, 5063, 6655, 6307, 3145, 4090, 866, 5436, 780, 1143, 7782 ]
Validation
6,563
3
XOP_instruction_set:xop instruction set xop extended operations instruction set announced amd may 1 2009 extension 128-bit sse core instructions x86 amd64 instruction set bulldozer processor core released october 12 2011 however amd removed support xop zen microarchitecture onward xop instruction set contains several different types vector instructions since originally intended major upgrade sse instructions integer instructions also contains floating point permutation floating point fraction extraction instructions see index list instruction types xop revised subset originally intended sse5 changed similar overlapping avx parts overlapped avx removed moved separate standards fma4 floating-point vector multiply–accumulate cvt16 half-precision floating-point conversion implemented f16c intel sse5 instructions equivalent similar instructions avx fma4 instruction sets announced intel changed use coding proposed intel integer instructions without equivalents avx classified xop extension xop instructions opcode byte 8f hexadecimal otherwise almost identical coding scheme avx 3-byte vex prefix commentators seen evidence intel allowed amd use part large vex coding space amd forced use different codes order avoid using code combination intel might possibly using development pipeline something else xop coding scheme close vex scheme technically possible without risking amd codes overlap future intel codes inference speculative since public information available negotiations two companies issue use 8f byte requires m-bits see vex coding scheme value larger equal 8 order avoid overlap existing instructions c4 byte used vex scheme restriction may prevent use m-bits purposes future xop scheme vex scheme another possible problem pp bits value 00 xop scheme value 01 vex scheme instructions legacy equivalent may complicate use pp bits purposes future similar compatibility issue difference fma3 fma4 instruction sets intel initially proposed fma4 avx/fma specification version 3 supersede 3-operand fma proposed amd sse5 amd adopted fma4 intel canceled fma4 support reverted fma3 avx/fma specification version 5 see fma history march 2015 amd explicitly revealed description patch gnu binutils package zen third-generation x86-64 architecture first iteration znver1 – zen version 1 support tbm fma4 xop lwp instructions developed specifically bulldozer family micro-architectures integer version fma instruction set four operand instructions similar fma4 operate signed integers horizontal addition instructions adds adjacent values input vector output size instructions describes wide horizontal addition performed instance horizontal byte word adds two bytes time returns result vector words byte quadword adds eight bytes together time returns result vector quadwords six additional horizontal addition subtraction instructions found ssse3 operate two input vectors two two operations set vector compare instructions take immediate extra argument immediate controls kind comparison performed eight comparison possible instruction vectors compared comparisons evaluate true set corresponding bits destination 1 false comparisons sets bits 0 result used directly vpcmov instruction vectorized conditional move vpcmov works bitwise variant blend instructions sse4 bit selector 1 selects bit first source 0 selects second source used together xop vector comparison instructions used implement vectorized ternary move second input destination conditional move cmov shift instructions differ sse2 shift unit different amount using vector register interpreted packed signed integers sign indicates direction shift rotate positive values causing left shift negative right shift intel specified different incompatible set variable vector shift instructions avx2 vpperm single instruction combines ssse3 instruction palignr pshufb adds compare altivec instruction vperm takes three registers input first two source registers third selector register byte selector selects one bytes one two input registers output selector also apply effects selected bytes setting 0 reverse bit order repeating signicating bit effects input addition inverted vpermil2pd vpermil2ps instructions two source versions vpermilpd vpermilps instructions avx means like vpperm select output fields two inputs instructions extracts fractional part floating point part would lost conversion integer
[ 2000, 1252, 3173, 4845, 2989, 4224, 6523, 5559, 6616, 1335, 1465, 5665, 5934, 742, 5669, 5670, 584, 5055, 6647, 2226, 1770, 4077, 6133, 1881, 5431, 3747, 6675, 6236, 352, 971, 6956, 3248, 2172 ]
Test
6,564
5
Directory_information_tree:directory information tree directory information tree dit data represented hierarchical tree-like structure consisting distinguished names dns directory service entries x.500 protocols lightweight directory access protocol ldap use directory information trees fundamental data structure typically x.500 ldap deployment single organization directory information tree consists two parts top level directory information tree frequently represent political geographic divisions original assumption x.500 directory servers would interconnected form single global namespace entries top level tree corresponded countries identified iso 3166 two letter country code entries subordinate country entry would correspond states provinces national organizations naming system particular country determined country national standards body telecommunications provider limitation original directory information tree structure assumption applications searching entry particular organization would navigate directory tree first browsing particular country organization based region organization based locate entry organization search within organization entry question desire support searching broadly individual person particulars person location organization known led experiments directory deployment interconnection common indexing protocol today ldap deployments particular active directory deployments interconnected single global naming space use national country codes basis naming instead deployments follow directory structure top level mirrors domain name system described rfc 2247 example entry organization domain name example.com would distinguished name dc=example dc=com entries organization directory information tree would contain distinguished name suffix elements organization represented directory e.g. people roles devices dit may modeled variety techniques determining factors include early deployments x.500 within corporations institutions entries representing employees organizations often used dit structure mirrored organizational structure organizational unit entries corresponding departments divisions organization relative distinguished names entries employees often formed common names individual employees example dn early x.500/ldap deployment might cn=joe bloggs ou=marketing ou=operations o=example corporation st=ca c=us disadvantage approach organizational structure changed employees change legal name require moving renaming entries directory adds complexity overhead also upset applications designed deal gracefully moves today many large deployments x.500 ldap use single flat namespace entries choose name entries individuals based relative distinguished name organizationally-assigned identifier username employee number today dn might resemble uid=00003 ou=people dc=example dc=com advantage structure entries need moved even employees change name transferred different departments changes effected attribute modification applications may using dn unique identifier e.g database need touched
[ 644, 2043, 7144 ]
Test
6,565
2
Core_Animation:core animation core animation graphics compositing framework used macos mac os x leopard later ios watchos tvos produce animated user interfaces core animation provides way developers produce animated user interfaces via implicit animation model well explicit model developer specifies original final states object core animation handles interpolation allows animated interfaces created relative ease specific code animation required developer core animation animate visual element provides unified way accessing core image core video quartz technologies core animation rendering accelerated graphics processor gpu animated sequences execute thread independent main run loop allowing application processing occur animation progress way application performance affected animations stopped reversed retargeted progress core animation first appeared mac os x leopard actually first emerged iphone software team shown publicly first time august 7 2006 wwdc 2006 macworld expo 2007 apple announced iphone runs specially adapted version os x uses core animation
[ 6788, 3940, 713, 7890, 4320, 2926, 4690, 734, 5752, 405, 6832, 6125, 3989, 2954, 2597, 1123, 3322, 6847, 1502, 6142, 2609, 5786, 1895, 4740, 1897, 4376, 5091, 4749, 5450, 6505, 7601, 2627, 7609, 1171, 5109, 3001, 2284, 1178, 120, 6188, ...
Test
6,566
9
ASCEND:ascend ascend open source mathematical modelling chemical process modelling system developed carnegie mellon university since late 1978 ascend acronym stands advanced system computations engineering design main uses field chemical process modelling although capabilities general ascend includes nonlinear algebraic solvers differential/algebraic equation solvers nonlinear optimization modelling multi-region 'conditional models matrix operations supported efficient sparse matrix solver called mtx ascend differs earlier modelling systems separates solving strategy model building domain experts people writing models computational engineers people writing solver code work separately developing ascend together number early modelling tools architecture helped inspire newer languages modelica recognised flexible use variables parameters always treats solvable desired software remains active open-source software project part google summer code programme 2009 2010 2011 2012 2013 python software foundation accepted 2015 programme well
[ 6527, 5300, 5965, 4759, 5571, 5659, 578, 6912, 1435 ]
Test
6,567
4
Memory_corruption:memory corruption memory corruption occurs computer program contents memory location modified due programmatic behavior exceeds intention original programmer program/language constructs termed violating memory safety likely cause memory corruption programming error corrupted memory contents used later program leads either program crash strange bizarre program behavior nearly 10 application crashes windows systems due heap corruption modern programming languages like c c++ powerful features explicit memory management pointer arithmetic features designed developing efficient applications system software however using features incorrectly may lead memory corruption errors memory corruption one intractable class programming errors two reasons memory corruption errors broadly classified four categories many memory debuggers purify valgrind insure++ parasoft c/c++test addresssanitizer available detect memory corruption errors
[ 5012, 2991, 2736, 1361, 113, 1363, 6002, 5218, 7262, 572, 573, 3635, 1854, 1019, 4525, 7474, 2420, 5771, 5190, 5606, 2153, 6778, 3753, 7319, 1435, 1805 ]
Test
6,568
4
The_Hacker_Crackdown:hacker crackdown hacker crackdown law disorder electronic frontier work nonfiction bruce sterling first published 1992 book discusses watershed events hacker subculture early 1990s notable topic covered operation sundevil events surrounding 1987–1990 war legion doom network raid steve jackson games trial knight lightning one original journalists phrack subsequent formation electronic frontier foundation book also profiles likes emmanuel goldstein publisher former assistant attorney general arizona gail thackeray fletc instructor carlton fitzpatrick mitch kapor john perry barlow 1994 sterling released book internet new afterword though published 1992 released freeware electronic book 1994 book offers unique colorful portrait nature cyberspace early 1990s nature computer crime time events sterling discusses occur cusp mass popularity internet arguably achieved critical mass late 1994 also encapsulates moment information age revolution cyberspace morphed realm telephone modems bbs internet world wide web cory doctorow voiced unabridged podcast book said inspired politically artistically socially
[ 768, 5798, 84, 3486 ]
Validation
6,569
4
Transient_execution_CPU_vulnerabilities:transient execution cpu vulnerabilities transient execution cpu vulnerabilities vulnerabilities computer system speculative execution optimization implemented microprocessor exploited leak secret data unauthorized party classic example spectre since january 2018 many different vulnerabilities identified modern computers highly parallel devices composed components different performance characteristics operation branch yet performed earlier slow operation memory read yet completed microprocessor may attempt predict result earlier operation execute later operation speculatively acting prediction correct prediction may based recent behavior system earlier slower operation completes microprocessor determines whether prediction correct incorrect correct execution proceeds uninterrupted incorrect microprocessor rolls back speculatively executed operations repeats original instruction real result slow operation terms directly visible behavior computer speculatively executed code never happened however speculative execution may affect state certain components microprocessor cache effect may discovered careful monitoring timing subsequent operations attacker arrange speculatively executed code may directly written attacker may suitable gadget found targeted system operates secret data unauthorized access different effect cache different values secret data may able discover value secret data starting 2017 multiple examples vulnerabilities identified publication starting early 2018 hardware mitigations impose close zero performance loss firmware and/or os mitigations might incur quite significant performance loss depending workload 8th generation coffee lake architecture table also applies wide range previously released intel cpus limited architectures based intel core pentium 4 intel atom starting silvermont vulnerabilities associated cpu speculative execution
[ 704, 3932, 2912, 376, 3277, 2923, 2587, 755, 3323, 5779, 6148, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 1961, 2678, 3038, 3047, 2693, 862, 7307, 6589, 5187, 4108, 1996, 7328, 1640, 3100, 208, 2021, 5922, 6628, 5571, 924, 38...
Test
6,570
2
Advanced_Comprehensive_Operating_System:advanced comprehensive operating system advanced comprehensive operating system acos family mainframe computer operating systems developed nec japanese market consists three systems based general comprehensive operating system family developed general electric honeywell bull two systems acos-2 based gcos 4 acos-4 based gcos 7 still sold although acos-4 active development acos-6 based gcos 8 obsolete high-end mainframe platform ceased active development early 2000s late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors acos-4 produced quad-core variant 40 nm called noah-6 acos-2 runs intel xeon servers
[ 1522, 7325, 7605, 280, 2818, 4759, 190, 3849, 4670, 5021, 7800, 4397, 13, 8066, 5644, 3271, 5116, 6984, 5822, 299, 3626, 7142, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 6922, 8167, 8115, 5161, 5865, 4985, 739...
Test
6,571
6
Dokan_Library:dokan library dokan library software interface windows brings ability create virtual file system achieved running file system code user space dokan kernel driver translates request windows kernel offers compatibility fuse file system using wrapper built cygwin mingw dokan free software originally released terms lgpl mit dokan library project originally created maintained hiroki asakawa 2007 2011 maintained 2011 2014 community different fork since 2014 project actively maintained adrien j. maxime c. fork dokany code signed company islog dokan particularly useful writing virtual file system without requiring windows kernel knowledge gives ability mount virtual hard drive contains whatever developer wants show absolutely virtual using memory like ram disk show remote data like ftp ssh samba databases local storage listed read written deleted
[ 6984, 8103, 2290, 2451, 7214, 4759, 5571, 5661, 2054, 7848, 5865, 1435 ]
Test
6,572
2
Multiseat_configuration:multiseat configuration multiseat multi-station multiterminal configuration single computer supports multiple independent local users time seat consists hardware devices assigned specific workplace one user sits interacts computer consists least one graphics device graphics card output e.g hdmi/vga/displayport port attached monitor/video projector output keyboard mouse input also include video cameras sound cards since 1960s computers shared users especially early days computing computers extremely expensive usual paradigm central mainframe computer connected numerous terminals advent personal computing paradigm largely replaced personal computers one computer per user multiseat setups return multiuser paradigm based around pc supports number zero-clients usually consisting terminal per user screen keyboard mouse multiseat setups great schools libraries family computers situations multiseat also cost-effective necessary buy separate motherboards microprocessors ram hard disks components user example buying one high speed cpu usually costs less buying several slower cpus 1970s commonplace connect multiple computer terminals single mainframe computer even graphical terminals early terminals connected rs-232 type serial connections either directly modems advent internet protocol based networking became possible multiple users log host using telnet – graphic environment – x window system server systems would retain physically secure root console system administration direct access host machine support multiple consoles pc running x interface implemented 2001 miguel freitas using linux operating system x11 graphical system time maintained xfree86 done using patch display server execute several instances x time one captures specific mouse keyboard events graphical content method received name multiseat multiterminal 2002 canadian company userful corporation released userful multiplier multiseat linux software solution enables 10 users simultaneously share one computer earlier worked kernel-based approach multi-station platform computer abandoned idea due problem multiple video card support solutions appeared 2003 svetoslav slavtchev aivils stoss james simmons worked evdev faketty approach modifying kernel linux letting one user independently use machine time linux console project also proposed idea use multiple independent consoles multiple independent keyboards mice project called backstreet ruby backstreet ruby kernel patch linux kernel back port linux-2.4 ruby kernel tree aim linux console developers enhance reorganize input console framebuffer subsystems linux kernel work independent allow multi-desktop operation backstreet ruby idea never finished 2005 c3sl team center scientific computing free software federal university parana brazil created solution based nested display servers xnest xephyr solution nested display server runs screen host display server e.g xorg modification nested servers let one exclusively acquire mouse keyboard 2008 c3sl group released multiseat display manager mdm ease process installation configuration multiseat box group also 2008 conceived live-cd test purposes automatic multiseat usb docking stations feature fedora 17 monitor need connected graphics output video card example make four-head four users would require four monitors four keyboards four mice two dual one quad output video card usb keyboards mice typically recommended instead ps/2 connections connected usb hub additional devices peripherals cameras flash storage drives card readers touch screens could also assigned seat alternative multiple physical video cards connections displaylink usb vt system linux kernel dates back 1993 understand concept multiple seats kmscon systemd-consoled different solutions set multiseat others constantly developed x.org foundation maintains wiki page latest news concerning solutions currently pointed solutions x.org wiki solutions using either multiple xephyr servers deprecated evdev support host xorg run several instances xorg using multiple video devices quite easy configure popular distributions ubuntu provide multiseat environments documented ubuntu multiseatx wiki page multi-seat display manager automseat tool open source tool helps automatize process installation configuration users want try multiseat encouraged try tool avoid old hard way set howtos stated foundation wiki page hand mdm suffers lack updates releases beyond initial announcement another open source tool aims help simplify creation multiseat mainly ubuntu distribution bicefalo wizard userful offers commercially supported multiseat linux solution called userful multiplier enables 10 users simultaneously share one computer works graphics cards supported x.org/xfree86 well usb multiseat devices available 64-bit 32-bit packages rpm deb formats tested major distributions including debian fedora mandriva linux sled suse ubuntu free two-user version userful multiplier software personal trial use available website windows 2000 xp vista operating systems several commercial products implement multiseat configurations two seats operating system designed specifically multiseat setups entitled windows multipoint server announced february 24 2010 uses remote desktop terminal services technologies windows server 2008 r2 provide multiseat functionality functionality incorporated windows server proper windows server 2016 new server role entitled multipoint services server role removed windows server 2019 owing microsoft ceasing development service 2018 instead relying operating system support multiseat configuration hypervisor configured run multiple virtual machines configured interface one connected seat i/o virtualization methods input devices attached virtual machines usb redirection entire gpus attached intel vt-d youtube channel linustechtips demonstrated virtualization-based 2-seat 7-seat systems unraid host operating system seat exclusive control one windows guest operating systems running host dedicated high-end graphics card guest takes full advantage via use vt-d making system capable hosting demanding video game sessions full quality simultaneously seats february 2009 brazil ministry education committed deploy 350,000 linux-based multiseat computing stations 45,000 rural urban schools across country chosen companies implement project canadian multiseat linux software company userful corporation brazilian partner thinnetworks one multiterminal successful cases happening paraná digital project creating multiterminal laboratories 2000 public schools state paraná brazil 1.5 million users benefit 40,000 terminals project finished laboratories four-head multiterminals running debian cost hardware 50 less normal price absolutely cost software project developer c3sl center scientific computing free software since 2008 electrical computer engineering students michigan state university installed multiterminal systems internet access three schools mto wa mbu tanzania purpose project study impact computer systems internet access education system afford educational resources books computer systems run ubuntu 8.04 32-bit utilize open source multiseat display manager created c3sl research eventually used present government officials third world countries effort showcase positive impact cost-effective computing systems schools project sponsored george vickie rock dow chemical company
[ 2636, 7716, 3180, 578, 7010, 3048, 6572, 3821, 768, 6307, 1682, 7765, 1246, 976, 7787 ]
Test
6,573
4
CPLINK:cplink cplink win32/cpllnk.a names microsoft windows shortcut icon vulnerability discovered june 2010 patched 2 august affected windows operating systems vulnerability exploitable windows application display shortcut icons windows explorer browses folder containing malicious shortcut exploit triggered without user interaction regardless shortcut file located june 2010 virusblokada reported detection zero-day attack malware called stuxnet exploited vulnerability install rootkit snooped siemens scada systems wincc pcs 7 according symantec first worm designed reprogram industrial systems spy
[ 3932, 6305, 6823 ]
Test
6,574
4
Packet_analyzer:packet analyzer packet analyzer also known packet sniffer computer program piece computer hardware packet capture appliance intercept log traffic passes digital network part network packet capture process intercepting logging traffic data streams flow across network sniffer captures packet needed decodes packet raw data showing values various fields packet analyzes content according appropriate rfc specifications packet analyzer used intercepting traffic wireless networks known wireless analyzer wifi analyzer packet analyzer also referred network analyzer protocol analyzer though terms also meanings wired shared medias networks ethernet token ring fddi networks depending network structure hub switch may possible capture traffic network single machine network modern networks traffic captured using network switch so-called monitoring port mirrors packets pass designated ports switch network tap even reliable solution use monitoring port since taps less likely drop packets high traffic load wireless lans traffic captured one channel time using multiple adapters several channels simultaneously wired broadcast wireless lans capture unicast traffic machines network adapter capturing traffic must promiscuous mode wireless lans even adapter promiscuous mode packets service set adapter configured usually ignored see packets adapter must monitor mode special provisions required capture multicast traffic multicast group packet analyzer already monitoring broadcast traffic traffic captured either entire contents packets recorded headers recorded recording headers reduces storage requirements avoids legal issues yet often provides sufficient information diagnose problems captured information decoded raw digital form human-readable format lets users easily review exchanged information protocol analyzers vary abilities display analyze data protocol analyzers also generate traffic thus act reference device act protocol testers testers generate protocol-correct traffic functional testing may also ability deliberately introduce errors test dut ability handle errors protocol analyzers also hardware-based either probe format increasingly common combined disk array devices record packets slice packet disk array allows historical forensic analysis packets without users recreate fault packet sniffers packet capture used fulfill warrant law enforcement agency wiretap network traffic generated individual internet service providers voip providers united states must comply communications assistance law enforcement act regulations using packet capture storage telecommunications carriers provide legally required secure separate access targeted network traffic able use device internal security purposes collecting data carrier system without warrant illegal due laws interception using end-to-end encryption communications kept confidential telecommunication carriers legal authorities
[ 1998, 5194, 1813, 3766, 5467, 3950, 5557, 7623, 1542, 2466, 4316, 7534, 5297, 726, 6437, 2566, 1554, 4208, 7637, 2572, 5577, 924, 7093, 6823, 588, 6376, 6650, 325, 7657, 7476, 6929, 4895, 1403, 7851, 6220, 3486, 4184, 7214, 7216, 7765, ...
Test
6,575
2
Network_Access_Protection:network access protection network access protection nap microsoft technology controlling network access computer based health nap system administrators organization define policies system health requirements examples system health requirements whether computer recent operating system updates installed whether computer latest version anti-virus software signature whether computer host-based firewall installed enabled computers nap client health status evaluated upon establishing network connection nap restrict deny network access computers compliance defined health requirements nap deprecated windows server 2012 r2 removed windows server 2016 network access protection client agent makes possible clients support nap evaluate software updates statement health nap clients computers report system health nap enforcement point nap enforcement point computer device evaluate nap client ’ health optionally restrict network communications nap enforcement points ieee 802.1x-capable switches vpn servers dhcp servers health registration authorities hras run windows server 2008 later nap health policy server computer running network policy server nps service windows server 2008 later stores health requirement policies provides health evaluation nap clients health requirement policies configured administrators define criteria clients must meet allowed undeterred connection criteria may include version operating system personal firewall up-to-date antivirus program nap-capable client computer contacts nap enforcement point submits current health state nap enforcement point sends nap client ’ health state nap health policy server evaluation using radius protocol nap health policy server also act radius-based authentication server nap client nap health policy server use health requirement server validate health state nap client determine current version software updates need installed nap client example health requirement server might track latest version antivirus signature file nap enforcement point hra obtains health certificates certification authority nap clients determined compliant health requirements nap client determined noncompliant health requirements optionally placed restricted network restricted network logical subset intranet contains resources allow noncompliant nap client correct system health servers contain system health components updates known remediation servers noncompliant nap client restricted network access remediation servers install necessary components updates remediation complete nap client perform new health evaluation conjunction new request network access communication nap client ships windows vista windows 7 windows 8 windows 8.1 windows 10 limited nap client also included windows xp service pack 3 mmc snap-in support authip-based ipsec enforcement managed via command-line tool called netsh ipsec enforcement ike-based microsoft partners provide nap clients operating systems mac os x linux turn network access protection windows 8 simultaneously hold x key windows key computer keyboard mine bottom row 3rd left use arrow select search touch enter key search defaults apps type services click scroll network access protection agent service click status column say running right click left click start status column say running close services window
[ 7879, 3937, 3263, 378, 2198, 6096, 6107, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 3665, 435, 5442, 4377, 5090, 3340, 5794, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 7626, 2644, 5475, 6528, 2290, 4774, 1181, 7986, 3711, 5134, ...
Test
6,576
2
Nokia_E6:nokia e6 nokia e6-00 smartphone running symbian^3 operating system supersedes nokia e72 new symbian business mobility solution nokia following announcement 12 april 2011 day nokia x7-00 shipped new symbian anna version symbian^3 originally retailed 340 euros taxes smartphone notable backlit 4-rows qwerty keyboard touch screen input methods long battery life talktime 7.5 14.8 h standby 28 31 days out-of-the-box access microsoft exchange activesync microsoft communicator mobile microsoft sharepoint high pixel density vga display 326ppi like predecessors nokia e71/e72 nokia e6-00 integrates stainless steel glass design back removable cover raised panel back camera dual led flash loud speaker contour front made stainless steel front phone except qwerty keyboard short cut buttons navikey covered corning gorilla glass casing three color options black silver white e6 would also last symbian-based device qwerty keyboard later qwerty devices would series 40 asha line nokia asha 302 2012 bears strong design similarities e6 october 2012 vertu released constellation quest blue based e6 predecessor e6-00 eseries consisting business-oriented smartphones nokia e72 shipped november 2009 e71 e72 received mostly praises press worth noting nokia released e7 landscape qwerty slider smartphone eseries based symbian^3 shipped february 2011 first hints nokia e6-00 developed came early january 2011 nokia xml pictures picasa album pictures taken device various information could retrieved xml 8 mp camera vga display qwerty keyboard device officially announced mobile world congress held barcelona 14–17 february 2011 various pictures videos nokia e6-00 leaked months february march officially announced special event named discover symbian 12 april 2011 along nokia x7 latest update symbian software expected released q2 2011 europe price €340 taxes subsidies q3 2011 north america may 2011 nokia e6 became available nokia deutschland online shop preorder price €429 nokia e6-00 powered processor found contemporary symbian devices nokia n8 e7 c7 nokia e series arm11 clocked 680 mhz broadcom bcm2727 gpu supports openvg1.1 opengl es 2.0 support nokia e6-00 62.5 mm diagonally capacitive touchscreen resolution 640 × 480 pixel vga 326 ppi according nokia capable displaying 16.7m colours pixel density highest among smartphones launched time launch nokia lumia 920 screen brightness e6-00 double brightness e72 measured candelas proximity sensor deactivates display touchscreen device brought near face call nokia e6 also understands pictbridge protocol possible directly print phone printer without using computer handle data transfer optical navi key e72 replaced navi key e6-00 also ambient light sensor adjusts display brightness activates backlit 4-row keyboard 3-axis accelerometer present switch display portrait mode device turned sideways however take pictures portrait show right way photo gallery device autonomous gps optional a-gps functionality wi-fi network positioning cell-id comes pre-loaded ovi maps application ovi maps symbian^3 provides free lifetime turn turn voice guided car pedestrian navigation map already downloaded device ovi maps require active data connection work stand-alone gps navigator services example google maps data connection required 8-megapixel 3264 x 2448 px back camera extended depth field feature autofocus dual led flash 2x digital zoom 3x video mode offers high definition 720p 16:9 aspect ratio video recording 25 frame/s 4:3 aspect ratio 0.3-megapixel front camera capable video recording 176 x 144 px 15 frame/s video calling nokia e6 loudspeaker two microphones microphone front device collects voices user another microphone back device collects environmental noise active noise cancellation makes user voice noisy environment sound clearer person end line noise cancellation available using loudspeaker headset front device qwerty keyboard call creation call termination keys home menu calendar contact email shortcut keys short long press features 5-way scrolling navi key top power/lock button right hand side lock/unlock slider also turn torch dual led flash camera button three keys 1 volume 2 volume 3 middle key activating voice commands long press voice recorder short press device locked pressing navi also bring menu allow unlock nokia e6-00 touch screen qwerty keyboard comes variety 24 language versions including arabic thai russian chinese e6-00 microphone loudspeaker located back device 3.5 mm four-contact audio jack simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard 3.5 mm audio jack rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging nokia e6-00 supports usb on-the-go 1.3 ability act usb host using nokia adapter cable usb otg ca-157 included upon purchase built-in bluetooth v3 supports wireless earpieces headphones hsp profile nokia e6-00 also capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering profiles also supported bip gap gavdp goep hsp pbap sap sdp spp device 87.5-108 mhz 76-90 mhz japan fm receiver rds support wi-fi b/g/n connectivity single band support wep wpa wpa2 aes/tkip security protocols bp-4l 1500 mah li-ion battery performance provided nokia 14.8h talk time 681h standby 9h video playback 4.7h video recording 75h music play back nokia e6-00 8 gb internal storage expanded microsdhc card 32 gb size 1 gb rom 350 mb available user install applications new users nokia e6 experienced problems notification led placed d-pad navigation key previous models e71 e72 however apparent nokia allowed sufficient space d-pad key front face light visible nokia acknowledged problem indicated whether fix possible software adjusting brightness component one solution done aniket patil aniketroxx redirect notification light red mute key used many people alternative d-pad fix solution also helped user see light without opening e6 cover revised nokia e6 hardware change resolve notification light issue started shipping 22 october 2011 many users nokia e6 reported vibration alert strong enough along nokia x7 e6-00 shipped updated symbian^3 software user experience update nicknamed anna offers amongst others preinstalled applications nokia e6-00 include joikuspot premium mobile wifi hotspot world traveler f-secure mobile security quickoffice stock os version symbian anna specially adapted e6 february 2012 nokia belle update heavily criticised failure meet special demands e6 met original stock firmware august 2012 nokia belle refresh made available due vga 640 x 480 resolution compared nhd 640 x 360 symbian^3 devices application may incompatible e6-00 designed nhd display example nokia guidelines stipulate user interface elements touch screen accept button virtual numpad etc ... least 7mm x 7mm high pixel density nokia e6-00 means elements need proportionately larger pixels compared recent symbian^3 devices nokia e6-00 two extra homescreens bringing total 5 homescreens give users opportunity customization devices smaller displays accommodating 3 widgets per homescreen nokia e6 wifi coverage full spectrum channels 1-13 crowded 2.4 ghz waveband compared channels 1-11 e63 example support newer 5 ghz wifi frequencies charging led workaround notifications
[ 1066, 372, 7521, 3615, 1453, 3952, 2922, 23, 2564, 2566, 7545, 5044, 740, 6465, 5062, 3653, 5068, 3657, 4726, 1129, 76, 2271, 6517, 463, 3694, 472, 4407, 118, 3703, 7261, 5493, 1202, 3029, 5499, 139, 3039, 1582, 8024, 520, 2338, 3055, ...
Test
6,577
2
Version_7_Unix:version 7 unix seventh edition unix also called version 7 unix version 7 v7 important early release unix operating system v7 released 1979 last bell laboratories release see widespread distribution commercialization unix corporation early 1980s v7 originally developed digital equipment corporation pdp-11 minicomputers later ported platforms unix versions bell labs designated edition user manual accompanied released 1979 seventh edition preceded sixth edition first version licensed commercial users development research unix line continued eighth edition incorporated development 4.1bsd tenth edition bell labs researchers concentrated developing plan 9 v7 first readily portable version unix era minicomputers many architectural variations also beginning market 16-bit microprocessors many ports completed within first years release first sun workstations based motorola 68010 ran v7 port unisoft first version xenix intel 8086 derived v7 onyx systems soon produced zilog z8000 computer running v7 vax port v7 called unix/32v direct ancestor popular 4bsd family unix systems group university wollongong ported v6 interdata 7/32 ported v7 machine well interdata sold port edition vii making first commercial unix offering dec distributed pdp-11 version v7 called v7m modified v7m developed dec original unix engineering group ueg contained many enhancements kernel pdp-11 line computers including significantly improved hardware error recovery many additional device drivers ueg evolved group later developed ultrix due power yet elegant simplicity many old-time unix users remember v7 pinnacle unix development dubbed last true unix improvement preceding following unices time release though greatly extended feature set came expense decrease performance compared v6 corrected largely user community number system calls version 7 around 50 later unix unix-like systems continued add many 2002 caldera international released v7 foss permissive bsd-like software license bootable images v7 still downloaded today run modern hosts using pdp-11 emulators simh x86 port developed nordier associates paul allen maintained several publicly accessible historic computer systems including pdp-11/70 running unix version 7 many new features introduced version 7 portable c compiler pcc provided along earlier pdp-11-specific c compiler ritchie first appeared research unix lineage version 7 although early versions already picked pwb/unix feature survive long second way besides pipes inter-process communication multiplexed files process could create special type file codice_1 system call processes could open file get channel denoted file descriptor could used communicate process created multiplexed file mpx files considered experimental enabled default kernel disappeared later versions offered sockets bsd cb unix ipc facilities system v instead although mpx files still present 4.1bsd
[ 361, 1522, 4751, 6789, 4478, 4670, 900, 1454, 4771, 2467, 6267, 908, 5216, 5480, 5481, 2294, 3106, 5571, 2300, 2118, 6360, 578, 923, 5048, 6017, 6367, 6646, 1294, 4344, 2589, 6470, 1493, 2803, 8117, 4626, 4447, 1975, 5964, 6489, 6583, 3...
Validation
6,578
3
Wizardry_III:_Legacy_of_Llylgamyn:wizardry iii legacy llylgamyn wizardry iii legacy llylgamyn originally known wizardry legacy llylgamyn third scenario third scenario wizardry series role-playing video games published 1983 sir-tech software inc city llylgamyn threatened violent forces nature earthquakes volcanic rumblings endanger everyone seeking dragon l'kbreth city saved legacy llylgamyn another six level dungeon crawl although dungeon volcano party journeys upwards rather downwards gameplay spells identical first two scenarios parties six characters could adventure one time characters imported either however since game set years later characters actually descendants original characters kept name class could select new alignment class permitting reset level one alignment made significant—certain areas game accessible appropriately aligned good evil parties first level accessible parties good neutral evil note evil good characters unwilling adventure together party always either good least one good character rest neutral evil least one evil character rest neutral neutral characters neutral second fourth levels could accessed parties evil characters—good neutral parties third fifth levels could accessed parties good characters—evil neutral parties sixth level could accessed party least one good one evil character—no neutral parties neutral characters could travel areas last level theoretically could get game party six characters neutral practically speaking players forced build 6 characters party could function long term without cleric good evil wizard good evil lord good healing effect prolonging gameplay wizardry iii first adventure game window manager released first games apple macintosh philip l. wing reviewed legacy llylgamyn space gamer 72 wing commented wizardry iii legacy llylgamyn best scenario series yet solid story riddles appropriate scenario game recommended original characters solid stats first two games required softline 1983 praised llylgamyn stating n't written composed ... dungeon feels like living breathing entity concluding game best wizardry yet 1984 readers named game second most-popular apple program 1983 behind lode runner computer gaming world scorpia 1991 1993 called game wizardry bells whistles added stated novelty playing two separate groups adventurers one good one evil little distinguish previous two games
[ 7288, 6380 ]
Validation
6,579
4
RFPolicy:rfpolicy rfpolicy states method contacting vendors security vulnerabilities found products originally written hacker security consultant rain forest puppy policy gives vendor five working days respond reporter bug vendor fails contact reporter five days issue recommended disclosed general community reporter help vendor reproduce bug work fix reporter delay notifying general community bug vendor provides feasible reasons requiring vendor fails respond shuts communication reporter problem five working days reporter disclose issue general community issuing alert fix vendor give reporter proper credits reporting bug
[ 2791, 6412, 2912 ]
Test
6,580
2
Metro_(design_language):metro design language microsoft design language mdl design language created microsoft design language focused typography simplified icons absence clutter increased content chrome ratio content chrome basic geometric shapes early examples mdl principles found encarta 95 msn 2.0 design language evolved windows media center zune formally introduced metro unveiling windows phone 7 since incorporated several company products including xbox 360 system software xbox one windows 8 windows phone outlook.com microsoft design language title became official microsoft representative qi lu referred modern ui design language mixx conference keynote speech according microsoft metro always codename never meant final product news websites attribute change trademark issues microsoft design language 2 mdl2 developed alongside windows 10 later fluent design language extended design language based design principles classic swiss graphic design early glimpses style could seen windows media center windows xp media center edition favored text primary form navigation interface carried later iterations media center 2006 zune refreshed interface using principles microsoft designers decided redesign interface focus clean typography less ui chrome principles new zune ui carried windows phone much drawn windows 8 zune desktop client also redesigned emphasis typography clean design different zune previous portable media center based ui flat colored live tiles introduced design language early windows phones studies microsoft design language 2 mdl2 developed alongside windows 10 version introduced new set widgets including date pickers toggles switches reduced border thicknesses user interface elements microsoft design team cites inspiration design language signs commonly found public transport systems design language places emphasis good typography large text catches eye microsoft sees design language sleek quick modern refresh icon-based interfaces windows android ios instances use fonts based segoe font family designed steve matteson agfa monotype licensed microsoft zune microsoft created custom version called zegoe ui windows phone microsoft created segoe wp font family fonts mostly differ minor details obvious differences segoe ui segoe wp apparent respective numerical characters segoe ui font windows 8 obvious differences – similar segoe wp characters notable typographic changes included 1 2 4 5 7 8 q. microsoft designed design language specifically consolidate groups common tasks speed usage achieves excluding superfluous graphics instead relying actual content function main ui resulting interfaces favor larger hubs smaller buttons often feature laterally scrolling canvases page titles usually large consequently also take advantage lateral scrolling animation plays large part microsoft recommends consistent acknowledgement transitions user interactions presses swipes form natural animation motion aims give user impression alive responsive ui added sense depth early response language generally positive review zune hd engadget said microsoft continues push towards big big typography providing sophisticated neatly designed layout almost functional attractive cnet complimented design language saying bit daring informal tight sterile icon grids rolodex menus iphone ipod touch idea 2011 ceremony industrial designers society america idsa gave windows phone 7 uses ui gold interactive award people choice award best show award isabel ancona user experience consultant idsa explained windows phone criticism particularly focused use caps text rise internet usage critics compared computer program shouting user journalist lee hutchinson described microsoft use practice macos version onenote terrible claiming cursed insane non-standard application window menus caps ’ much violate os x ’ design conventions take behind shed pour gasoline set fire arrival windows 8 operating system user interface use design language drew generally negative critical responses 25 august 2012 peter bright ars technica reviewed preview release windows 8 dedicating first part review comparison start menu designs used windows 8 windows 7 recounting pros cons peter bright concluded start menu windows 8 dubbed start screen though devoid problems clear winner however concluded windows 8 user interface frustrating various aspects user interface work well together woody leonhard even critical said user standpoint windows 8 failure – awkward mishmash pulls user two directions addition changes start menu windows 8 takes modal approach use full-screen apps steer away reliance icon-based desktop interface however microsoft shifted focus away multitasking business productivity august 2012 verge announced internal memorandum sent developers microsoft employees announcing decision discontinue use term metro discussions important european partner working replacement term technology news outlets ars technica techradar cnet engadget network world mainstream press bits blog new york times company bbc news online published partner mentioned memo could one microsoft retail partners german company metro ag name potential infringe metro trademark microsoft later stated reason de-emphasizing name related current litigation metro internal project codename despite heavily promoted brand public september 2012 microsoft design language adopted official name design style term used microsoft developer network documentation 2012 build conference refer design language related change microsoft dropped use phrase metro-style apps refer mobile apps distributed via windows store
[ 6093, 6096, 4687, 1097, 1475, 6110, 6136, 5781, 432, 4377, 5794, 444, 786, 447, 448, 458, 4759, 1536, 7247, 7619, 6903, 3028, 7660, 3048, 7685, 3076, 8054, 6256, 8076, 4492, 5563, 4500, 4880, 224, 6645, 6294, 8118, 2451, 2452, 7056, 563...
Test
6,581
7
DynamicOps:dynamicops dynamicops private software company headquartered burlington massachusetts usa backed credit suisse intel capital sierra ventures next world capital dynamicops develops cloud automation management solutions solutions designed help enterprise organizations create scalable private public desktop cloud services days existing technology systems processes acquired vmware 2012 dynamicops origins credit suisse software initially developed inside credit suisse ’ global research development group 2005 help company address operational governance challenges rolling virtualization technology 2008 deployed used software manage thousands virtual machines credit suisse ventures decided form company based technology recruited rich krueger form lead new company—dynamicops dynamicops incorporated january 31 2008 publicly launch later spring—to develop market product leslie muller led development effort credit suisse became founder cto dynamicops company raised total 27m venture funding credit suisse intel capital sierra ventures next world capital july 2012 dynamicops acquired vmware operations virtualization foundational technology dynamicops ’ cloud offerings operations virtualization abstraction layer multiple management systems make cloud infrastructure consumers allows staff apply management layers without layers needing know dynamicops multi-year licensing distribution agreement dell dynamicops software component virtual integrated system solution company technology alliances number companies including amazon web services cisco citrix hp ibm microsoft netapp novell red hat symantec vmware
[ 2961, 3764, 4295, 3756, 5064, 6586, 972 ]
Validation
6,582
2
Apple_Mail:apple mail apple mail officially known simply mail email client included apple inc. operating systems macos ios watchos apple mail grew nextmail originally developed next part nextstep operating system apple acquisition next 1997 current version apple mail utilizes smtp message sending pop3 exchange imap message retrieval s/mime end-to-end message encryption also preconfigured work popular email providers yahoo mail aol mail gmail outlook icloud formerly mobileme supports exchange ios features mobile version apple mail added exchange activesync eas support though notoriously missed functionality attaching files reply emails release ios 9 eas supported macos version apple mail app main issue sent messages incorrectly duplicated sent messages folder propagates via sync devices including ios features apple mail include ability configure software receive user email accounts one list ability file emails folders ability search emails ability automatically append signatures outgoing emails also integrates contacts list calendar maps apps apple mail originally developed next nextmail email application nextstep operating system nextmail innovative time supported rich text formatting images voice messaging mime emails also supported plain text tui allow backwards compatibility apple began adapt nextstep become mac os x operating system application went various stages developed beta version codenamed rhapsody various early pre-releases mac os x mail known mailviewer however third developer release mac os x application returned known simply mail apple mail included versions macos including mac os x panther released october 24 2003 integrated apple applications address book ichat ical features remain recent version mail include rules mailboxes junk mail filtering multiple account management mac os x tiger version 10.4 mail version 2 included proprietary single-message-per-file format filename extension .emlx permit indexing spotlight additional features new version also changed ui buttons toolbar whereas previous buttons free-standing defined shapes new buttons featured shapes within lozenge-shaped capsule according many users even apple human interface guidelines time worse usability open-source third-party application reverted icons former shapes available nevertheless apple updated guidelines include capsule-shaped buttons new ui persisted mac os x leopard version 10.5 mail version 3 included personalized stationery handled standard html format addition offered notes to-dos could synced ical well built-in rss reader also introduced imap idle support account inboxes mac os x snow leopard version 10.6 brought microsoft exchange server 2007 support ical address book applications bundled os x 10.6 mac os x lion version 10.7 mail featured redesigned ipad-like user interface full-screen capabilities updated message search interface support microsoft exchange server 2010 yahoo mail via imap also added capability group messages subject similar fashion mail ios 4 bounce function unwanted emails could bounced back sender dropped support exchange push email os x mountain lion version 10.8 mail received vip tagging safari-style inline search words within email message ability sync icloud new sharing features notes split stand-alone application rss reader to-dos discontinued os x mavericks version 10.9 mail ceased support plain-text mime multipart/alternative messages solely retained html rich-text version os x yosemite version 10.10 mail introduced markup inline annotation pdf image files mail drop automatically uploads attachments icloud sends link message instead whole file os x el capitan version 10.11 filter added message list filter various options unread flagged messages attachments conversation display also redesigned various disk space saving optimizations implemented streaming notification support exchange accounts also added support macos new dark mode added mail
[ 6788, 7517, 3940, 713, 7890, 4320, 2926, 4690, 393, 734, 735, 1475, 5752, 405, 6458, 6832, 6125, 3989, 2954, 3655, 2597, 1123, 4352, 5070, 5773, 3322, 4357, 6847, 1502, 6142, 2609, 5786, 1895, 4740, 1897, 4014, 1900, 5091, 4749, 1152, 5...
Test
6,583
2
History_of_the_Berkeley_Software_Distribution:history berkeley software distribution history berkeley software distribution begins 1970s earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project also 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy feature networking package called berknet developed eric schmidt part master thesis work could connect twenty-six computers provided email file transfer 3bsd see come vax line computers new releases 2bsd pdp-11 still issued distributed usenix example 1982 2.8.1bsd included collection fixes performance problems version 7 unix later releases contained ports changes vax-based releases bsd back pdp-11 architecture 2.9bsd 1983 included code 4.1cbsd first release full os modified v7 unix rather set applications patches recent release 2.11bsd first issued 1992 21st century maintenance updates volunteers continued patch 451 released december 22 2018 vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd success 3bsd major factor defense advanced research projects agency darpa decision fund berkeley computer systems research group csrg would develop standard unix platform future darpa research vlsi project 4bsd november 1980 offered number enhancements 3bsd notably job control previously released csh delivermail antecedent sendmail reliable signals curses programming library 1985 review bsd releases john quarterman et al wrote 4.1bsd june 1981 response criticisms bsd performance relative dominant vax operating system vms 4.1bsd kernel systematically tuned bill joy could perform well vms several benchmarks release would called 5bsd objections name changed feared confusion unix system v. 4.2bsd august 1983 would take two years implement contained several major overhauls official release came three intermediate versions 4.1a incorporated modified version bbn preliminary tcp/ip implementation 4.1b included new berkeley fast file system implemented marshall kirk mckusick 4.1c interim release last months 4.2bsd development back bell labs 4.1cbsd became basis 8th edition research unix commercially supported version available mtxinu guide design 4.2bsd duane adams darpa formed steering committee consisting bob fabry bill joy sam leffler ucb alan nemeth rob gurwitz bbn dennis ritchie bell labs keith lantz stanford rick rashid carnegie-mellon bert halstead mit dan lynch isi gerald j. popek ucla committee met april 1981 june 1983 apart fast file system several features outside contributors accepted including disk quotas job control sun microsystems provided testing motorola 68000 machines prior release ensuring portability system official 4.2bsd release came august 1983 notable first version released 1982 departure bill joy co-found sun microsystems mike karels marshall kirk mckusick took leadership roles within project point forward lighter note also marked debut bsd daemon mascot drawing john lasseter appeared cover printed manuals distributed usenix 4.3bsd released june 1986 main changes improve performance many new contributions 4.2bsd heavily tuned 4.1bsd code prior release bsd implementation tcp/ip diverged considerably bbn official implementation several months testing darpa determined 4.2bsd version superior would remain 4.3bsd see also history internet 4.3bsd determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability apart portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd incorporated proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 4.3bsd-reno came early 1990 interim release early development 4.4bsd use considered gamble hence naming gambling center reno nevada release explicitly moving towards posix compliance according away bsd philosophy posix much based system v reno quite bloated compared previous releases among new features nfs implementation university guelph support hp 9000 range computers originating university utah hpbsd port august 2006 informationweek magazine rated 4.3bsd greatest software ever written commented bsd 4.3 represents single biggest theoretical undergirder internet net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code example vi based original unix version ed rewritten nvi new vi within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support although released 1992 development 386bsd predated linux linus torvalds said 386bsd gnu kernel available time probably would created linux lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release marshall kirk mckusick summarizes lawsuit outcome june 1994 4.4bsd released two forms freely distributable 4.4bsd-lite contained source whereas 4.4bsd-encumbered available earlier releases licensees final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained addition permissive nature bsd license allowed many operating systems free proprietary incorporate bsd code example microsoft windows used bsd-derived code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 also darwin system apple macos built derivative 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also contain varying amounts bsd code bsd base large number operating systems notable among today perhaps major open source bsds freebsd netbsd openbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked 1995 netbsd number commercial operating systems also partly wholly based bsd descendants including sun sunos apple inc. macos current bsd operating systems open source available download free charge bsd license notable exception macos also generally use monolithic kernel architecture apart macos dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix parts next software became foundation macos among commercially successful bsd variants general market selection significant unix versions unix-like operating systems descend bsd includes
[ 7514, 6794, 6085, 1824, 738, 3636, 3637, 2583, 2226, 5065, 6477, 424, 5079, 6489, 6860, 443, 4747, 5450, 4030, 5101, 4759, 481, 4786, 1193, 6918, 4435, 4441, 4447, 6577, 4099, 3764, 5905, 8066, 2379, 5208, 6984, 908, 5216, 3457, 1279, 5...
Test
6,584
3
10th_Frame:10th frame 10th frame ten-pin bowling simulation game created access software 1986 follow-up leaderboard golf game eight players could take part open bowling tournament choice 3 different difficulty levels—kids ball always went straight amateur professional lane viewed behind bowler pins towards top screen 3d perspective scorecard current player displayed lane player could move left right lane starting run-up holding fire target cursor could also moved pushing moving left right pressing returned control moving onscreen player position fire button held power meter similar leaderboard employed speed shot determined long button held small zone top determined player made error exaggerating spin meter started descend right stopped hook zone determine much hook/spin applied—from straight top zone full hook bottom play completed usual ten frames bonus balls animation used similar sprite system leaderboard falling pin physics handled well players could print scorecard end match game released various home computers zx spectrum amstrad cpc commodore 64 also released atari st msx nintendo entertainment system version planned eventually cancelled c vg reviewed commodore 64 version issue 65 called game month 9/10 score zzap 64 awarded game 85 issue 22 calling another slick extremely well programmed access sport simulation sinclair gave zx spectrum conversion 7 10 stating 10th frame requires lot skill pretty good simulation
[]
Test