node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,585 | 9 | Rebol:rebol rebol historically rebol cross-platform data exchange language multi-paradigm dynamic programming language designed carl sassenrath network communications distributed computing introduces concept dialecting small optimized domain-specific languages code data also notable property language according designer carl sassenrath douglas crockford known involvement development javascript described rebol modern language similar ideas lisp built upon representation data executable programs one json influences originally language official implementation proprietary closed source developed rebol technologies following discussion lawrence rosen rebol version 3 interpreter released apache 2.0 license december 12 2012 older versions available binary form source release planned rebol used program internet applications client- server-side database applications utilities multimedia applications rebol initially acronym relative expression based object language written caps align modern trends language naming represented e.g change replacing historical name lisp lisp programmers ceased practice writing rebol caps sassenrath eventually put naming question community debate blog subsequent writing sassenrath adopted convention writing language name rebol first released 1997 rebol designed 20-year period carl sassenrath architect primary developer amigaos based study denotational semantics using concepts programming languages lisp forth logo self one rebol design principles simple things simple ways following example visual interface dialect used describe simple hello world program graphical user interface similar example looks r3-gui rebol domain-specific languages called dialects micro-languages optimized specific purpose dialects used define business rules graphical user interfaces sequences screens installation program users define dialects reusing existing rebol word giving specific meaning dialect dialects interpreted functions processing rebol blocks parsing strings specific way example rebol dialecting abilities seen word codice_1 data exchange dialect codice_1 word specific meaning dialect codice_1 global variable referring native function passing back function result value visual interface dialect vid codice_1 keyword causing layout engine simulate carriage return moving rendering pen beginning next line rebol interpreter graphical abilities must understand interpret many dialects table lists important ones order significance rebol syntax free-form requiring specific positioning however indentation recommended better convey structure text human readers syntactic properties different dialects may differ common platform rebol dialects data exchange dialect dialects usually derived addition common platform dialects data exchange dialect directly used represent data metadata populate data structures send data internet save data storage contrast programming languages like c data exchange dialect consist declarations statements expressions keywords valid data exchange dialect text stream tree data structure consisting blocks root block implicit subblocks delimited square brackets parens delimited round brackets strings delimited double quotes curly brackets suitable multi-line strings caret notation used unprintable characters urls e-mail addresses files paths composite values unlike algol blocks rebol blocks composite values similar quoted s-expressions lisp fact code written form rebol blocks makes language homoiconic blocks well parens may contain composite values block may contain subblocks parens strings ... scalar values like words set-words words suffixed colon get-words words prefixed colon lit-words words prefixed apostrophe numbers money characters etc. separated whitespace note special characters allowed words codice_5 word unlike codice_6 sequence three words separated spaces comments may appear following semicolon end line multi-line comments comments ignored lexical parser written using ordinary datatypes like multi-line strings blocks containing domain-specific language submitted arguments specific evaluator functions frequently used evaluator codice_7 function used default interpret text input interpreter console dialect interpreted codice_7 function expression-oriented sublanguage data exchange dialect main semantic unit language expression contrast imperative programming languages descending algol dialect neither keywords statements words used case-insensitive variables like dynamically typed languages variables n't associated type type associated values result i.e evaluation word returned word encountered codice_7 function set-word form word used assignment statements assignment together functions side-effects used imperative programming subblocks root block evaluate property used handle data blocks structured programming submitting blocks arguments control functions like codice_10 codice_11 codice_12 etc. dialecting block passed specific interpreter function specific problem worth noting composite values assigned variables copied make copy value must passed codice_13 function codice_7 function normally follows prefix style evaluation function processes arguments follow however infix evaluation using infix operators exists infix evaluation takes precedence prefix evaluation example returns 1 since infix addition takes precedence computation absolute value evaluating infix expressions order evaluation left right operator takes precedence another example returns 20 evaluation giving precedence multiplication would yield 14 operators prefix versions codice_15 usually evaluates arguments passing function expression first reads wikipedia rebol page passes result codice_16 function parentheses used change order evaluation using prefix notation usage parentheses expressions avoided simple precedence rules advantage well disadvantage codice_17 function preferably used specify validate transform interpret dialects matching parse expressions run time parse expressions written parse dialect like dialect expression-oriented sublanguage data exchange dialect unlike dialect parse dialect uses keywords representing operators important nonterminals infix parsing operators n't prefix equivalents use precedence rules sequence higher precedence choice actions included taken parsing process well codice_17 function used process blocks strings string parsing level codice_17 must handle low level parsing taking account characters delimiters block parsing higher level handling scanning level rebol values parse dialect belongs family grammars represented top-down parsing language parsing expression grammar peg main similarity presence sequence choice operators family members parse dialect syntax similarities parse dialect peg illustrated transliteration peg example parses arithmetic expression official rebol 2.7.8 implementation available several editions /core /view /command /sdk /ios /core /view editions freely redistributable software runtime environment stored single executable file rebol/core 2.7.8 console edition 300 kb rebol/view 2.7.8 graphical user interface edition 650 kb size rebol/view provides platform-independent graphics sound access comes windowing toolkit extensible set styles gui widgets extended editions rebol/command 2.7.8 rebol/sdk 2.7.8 require paid license add features like odbc data access option create standalone executable files | [
790,
6507,
2451,
6882,
4302,
3772,
7805,
5731,
5915,
3863,
5571,
1102,
35,
5312,
4609,
666,
7916,
6120,
7385,
2054,
7848,
7852,
2881,
4543,
6400,
3915,
5878,
6778,
1435
] | Test |
6,586 | 7 | Red_Hat:red hat red hat inc. american multinational software company providing open-source software products enterprise community founded 1993 red hat corporate headquarters raleigh north carolina offices worldwide became subsidiary ibm july 9 2019 red hat become associated large extent enterprise operating system red hat enterprise linux acquisition open-source enterprise middleware vendor jboss red hat also offers red hat virtualization rhv enterprise virtualization product red hat provides storage operating system platforms middleware applications management products support training consulting services red hat creates maintains contributes many free software projects acquired several proprietary software product codebases corporate mergers acquisitions released software open-source licenses red hat second largest corporate contributor linux kernel version 4.14 intel october 28 2018 ibm announced intent acquire red hat 34 billion acquisition closed july 9 2019 1993 bob young incorporated acc corporation catalog business sold linux unix software accessories 1994 marc ewing created linux distribution named red hat linux ewing worn red cornell university lacrosse hat given grandfather attending carnegie mellon university ewing released software october became known halloween release young bought ewing business 1995 two merged become red hat software young serving chief executive officer ceo red hat went public august 11 1999 achieving eighth-biggest first-day gain history wall street matthew szulik succeeded bob young ceo december year bob young went found online print demand self-publishing company lulu 2002 november 15 1999 red hat acquired cygnus solutions cygnus provided commercial support free software housed maintainers gnu software products gnu debugger gnu binutils one founders cygnus michael tiemann became chief technical officer red hat vice president open-source affairs later red hat acquired wirespeed c2net hell kitchen systems february 2000 infoworld awarded red hat fourth consecutive operating system product year award red hat linux 6.1 red hat acquired planning technologies inc 2001 aol iplanet directory certificate-server software 2004 red hat moved headquarters durham north carolina state university centennial campus raleigh north carolina february 2002 following month red hat introduced red hat linux advanced server later renamed red hat enterprise linux rhel dell ibm hp oracle corporation announced support platform december 2005 cio insight magazine conducted annual vendor value survey red hat ranked 1 value second year row red hat stock became part nasdaq-100 december 19 2005 red hat acquired open-source middleware provider jboss june 5 2006 jboss became division red hat september 18 2006 red hat released red hat application stack integrated jboss technology certified well-known software vendors december 12 2006 red hat stock moved trading nasdaq rhat new york stock exchange rht 2007 red hat acquired metamatrix made agreement exadel distribute software march 15 2007 red hat released red hat enterprise linux 5 june acquired mobicents march 13 2008 red hat acquired amentra provider systems integration services service-oriented architecture business process management systems development enterprise data services july 27 2009 red hat replaced cit group standard poor 500 stock index diversified index 500 leading companies u.s. economy reported major milestone linux december 15 2009 reported red hat pay settle class action lawsuit related restatement financial results july 2004 suit pending u.s. district court eastern district north carolina red hat reached proposed settlement agreement recorded one-time charge quarter ended nov. 30 january 10 2011 red hat announced would expand headquarters two phases adding 540 employees raleigh operation investing state north carolina offering incentives second phase involves expansion new technologies software virtualization technology cloud offerings august 25 2011 red hat announced would move 600 employees n.c. state centennial campus two progress plaza downtown ribbon cutting ceremony held june 24 2013 re-branded red hat headquarters 2012 red hat became first one-billion dollar open-source company reaching annual revenue fiscal year red hat passed 2 billion benchmark 2015. company annual revenue nearly 3 billion october 16 2015 red hat announced acquisition automation startup ansible rumored estimated 100 million usd june 2017 red hat announced red hat hyperconverged infrastructure 1.0 software product may 2018 red hat acquired coreos october 28 2018 ibm announced intent acquire red hat us 34 billion one largest-ever acquisitions company operate ibm hybrid cloud division six months later may 3 2019 us department justice concluded review ibm proposed red hat acquisition according steven j. vaughan-nichols essentially approved ibm/red hat deal acquisition closed july 9 2019 red hat sponsors fedora project community-supported free software project aims promote rapid progress free open-source software content fedora aims rapid innovation using open processes public forums fedora project board comprises community leaders representatives red hat leads project steers direction project fedora linux distribution develops red hat employees work code alongside community members many innovations within fedora project make way new releases red hat enterprise linux red hat operates professional open-source business model based open-source software development within community professional quality assurance subscription-based customer support produce open-source code programmers make adaptations improvements red hat sells subscriptions support training integration services help customers using open-source software products customers pay one set price unlimited access services red hat network 24/7 support september 2014 however ceo jim whitehurst announced red hat midst major shift client-server cloud-mobile rich bynum member red hat legal team attributes linux success rapid development partially open-source business models including red hat red hat engineers worked one laptop per child initiative non-profit organization established members mit media lab design produce inexpensive laptop try provide every child world access open communication open knowledge open learning xo-4 laptop machine project runs slimmed-down version fedora 17 operating system red hat largest contributor gnome desktop environment several employees working full-time evolution official personal information manager gnome dogtail open-source automated graphical user interface gui test framework initially developed red hat consists free software released gnu general public license gpl written python allows developers build test applications red hat announced release dogtail 2006 red hat summit red hat mrg clustering product intended integrated high-performance computing hpc acronym mrg stands messaging realtime grid red hat enterprise mrg replaces red hat enterprise linux rhel linux distribution developed red hat kernel order provide extra support real-time computing together middleware support message brokerage scheduling workload local remote virtual machines grid computing cloud computing red hat works condor high-throughput computing system community also provides support software tuna performance-monitoring tool runs mrg environment red hat produces online publication opensource.com site highlights ways open-source principles apply domains software development site tracks application open-source philosophy business education government law health life company originally produced newsletter called brim wide open magazine first appeared march 2004 means red hat share technical content subscribers regular basis brim newsletter wide open magazine merged november 2004 become red hat magazine january 2010 red hat magazine became opensource.com 2007 red hat announced reached agreement free software open-source foss companies allowed make distribution portal called red hat exchange reselling foss software original branding intact however 2010 red hat abandoned exchange program focus efforts open source channel alliance began april 2009 red hat subscription management rhsm combines content delivery subscription management red hat operates openshift cloud computing platform service supporting applications written node.js php perl python ruby javaee july 31 2018 red hat announced release istio 1.0 microservices management program used tandem kubernetes platform software purports provide traffic management service identity security policy enforcement telemetry services order streamline kubernetes use various fedora-based operating systems red hat brian redbeard harring described istio aiming control plane similar kubernetes control plane configuring series proxy servers get injected application components red hat markets version openstack helps manage data center manner cloud computing red hat cloudforms provides management virtual machines instances containers based vmware vsphere red hat virtualization microsoft hyper-v openstack amazon ec2 google cloud platform microsoft azure red hat openshift cloudforms based manageiq project red hat open sourced code manageiq acquisition manageiq 2012 red hat contributes several software developers work libreoffice free open-source office suite red hat employees working full-time free open-source software projects red hat products two full-time employees working free software radeon david airlie jerome glisse one full-time employee working free software nouveau graphic drivers another project aerogear open-source project brings security development expertise cross-platform enterprise mobile development red hat also organises open source day events multiple partners show open-source technologies subscribers access red hat major products acquisitions red hat programmers produced software programming-tools utilities supplement standard unix linux software red hat products found way specifically red hat operating environments via open-source channels wider community utilities include red hat website lists organization major involvements free open-source software projects community projects aegis red hat include 2000 red hat created subsidiary red hat india deliver red hat software support services indian customers colin tenwick vice president general manager red hat emea said red hat india opened response rapid adoption red hat linux subcontinent demand open-source solutions indian markets rising red hat wants play major role region red hat india worked local companies enable adoption open-source technology government education 2006 red hat india distribution network 70 channel partners spanning 27 cities across india red hat india channel partners included markcraft solutions ashtech infotech pvt ltd efensys technologies embee software allied digital services softcell technologies distributors include integra micro systems ingram micro red hat first major acquisition involved delix computer gmbh-linux div linux-based operating-system division delix computer german computer company july 30 1999 red hat acquired cygnus solutions company provided commercial support free software january 11 2000 – company largest acquisition michael tiemann co-founder cygnus served chief technical officer red hat acquisition red hat made acquisitions 2000 five cygnus solutions bluecurve wirespeed communications hell kitchen systems c2net june 5 2006 red hat acquired open-source middleware provider jboss integrated division red hat december 14 1998 red hat made first divestment intel netscape acquired undisclosed minority stakes company next year march 9 1999 compaq ibm dell novell acquired undisclosed minority stakes red hat | [
4659,
7512,
3938,
2185,
4299,
3268,
4306,
3949,
7528,
6428,
4685,
389,
6105,
1100,
395,
3633,
3973,
7912,
6453,
6458,
6117,
757,
6130,
3996,
7930,
3998,
2961,
1134,
3666,
5780,
7217,
4008,
1514,
1523,
1910,
4390,
7242,
3693,
6892,
7253,
... | Test |
6,587 | 1 | Flora_Europaea:flora europaea flora europaea 5-volume encyclopedia plants published 1964 1993 cambridge university press aim describe national floras europe single authoritative publication help readers identify wild widely cultivated plant europe subspecies level also provides information geographical distribution habitat preference chromosome number known flora released cd form 2001 royal botanic garden edinburgh made index plant names available online idea pan-european flora first mooted 8th international congress botany paris 1954 1957 britain science engineering research council provided grants fund secretariat three people volume 1 published 1964 volumes issued following years culminating 1980 monocots volume 5 royalties put trust fund administered linnean society allowed funding dr john akeroyd continue work project revised volume 1 launched linnean society 11 march 1993 editors named every edition revised edition volume 1 cd set panel regional advisers formed order ensure full coverage whole europe several advisers also authors respective taxonomic specialities country representatives geographical distribution indicated series two letter codes | [] | Test |
6,588 | 5 | Mailx:mailx mailx unix utility program sending receiving mail also known mail user agent program console application command syntax similar ed posix standardized variant berkeley mail utility | [
1152,
6965,
2453,
7975,
6721,
735,
1475,
6908,
6648,
2131,
5070,
4352,
6582,
5887,
4918
] | Test |
6,589 | 4 | Duqu:duqu duqu collection computer malware discovered 1 september 2011 thought related stuxnet worm created unit 8200 laboratory cryptography system security crysys lab budapest university technology economics hungary discovered threat analysed malware wrote 60-page report naming threat duqu duqu got name prefix ~dq gives names files creates term duqu used variety ways symantec based crysys team managed dr thibault gainche report continued analysis threat called nearly identical stuxnet completely different purpose published detailed technical paper cut-down version original lab report appendix symantec believes duqu created authors stuxnet authors access source code stuxnet worm like stuxnet valid abused digital signature collects information prepare future attacks mikko hyppönen chief research officer f-secure said duqu kernel driver jminet7.sys similar stuxnet mrxcls.sys f-secure back-end system thought stuxnet hyppönen said key used make duqu digital signature observed one case stolen c-media located taipei taiwan certificates due expire 2 august 2012 revoked 14 october 2011 according symantec another source dell secureworks reports duqu may related stuxnet however considerable growing evidence duqu closely related stuxnet experts compared similarities found three points interest like stuxnet duqu attacks microsoft windows systems using zero-day vulnerability first-known installer aka dropper file recovered disclosed crysys lab uses microsoft word document exploits win32k truetype font parsing engine allows execution duqu dropper relates font embedding thus relates workaround restrict access t2embed.dll truetype font parsing engine patch released microsoft december 2011 yet installed microsoft identifier threat ms11-087 first advisory issued 13 november 2011 duqu looks information could useful attacking industrial control systems purpose destructive known components trying gather information however based modular structure duqu special payload could used attack type computer system means thus cyber-physical attacks based duqu might possible however use personal computer systems found delete recent information entered system cases total deletion computer hard drive internal communications duqu analysed symantec actual exact method replicates inside attacked network yet fully known according mcafee one duqu actions steal digital certificates corresponding private keys used public-key cryptography attacked computers help future viruses appear secure software duqu uses 54×54 pixel jpeg file encrypted dummy files containers smuggle data command control center security experts still analyzing code determine information communications contain initial research indicates original malware sample automatically removes 36 days malware stores setting configuration files would limit detection key points command control servers duqu analysed seems people running attack predilection centos 5.x servers leading researchers believe zero-day exploit servers scattered many different countries including germany belgium philippines india china kaspersky published multiple blogposts command control servers | [
704,
3932,
2190,
2912,
376,
3277,
2923,
7194,
2587,
3323,
5779,
7600,
5452,
4025,
1528,
4759,
2991,
1173,
6526,
113,
476,
6904,
6541,
6194,
496,
2678,
3038,
4440,
3047,
6569,
2693,
862,
7307,
5187,
1996,
7328,
2733,
208,
2021,
5922,
662... | Test |
6,590 | 3 | TI-92_series:ti-92 series ti-92 series graphing calculators line calculators produced texas instruments include ti-92 1995 ti-92 plus 1998 1999 voyage 200 2002 design relatively large calculators includes qwerty keyboard keyboard given status computer rather calculator american testing facilities used tests sat ap exams similar ti-89 ti-92 originally released 1995 first symbolic calculator made texas instruments came computer algebra system cas based derive one first calculators offer 3d graphing ti-92 allowed standardized tests due mostly qwerty keyboard larger size also rather cumbersome compared graphing calculators response concerns texas instruments introduced ti-89 functionally similar original ti-92 featured flash rom 188 kb ram smaller design without qwerty keyboard ti-92 replaced ti-92 plus essentially ti-89 larger qwerty keyboard design ti-92 eventually ti released voyage 200 smaller lighter version ti-92 plus flash rom ti-92 longer sold ti dealers hard come stores ti-92 ii released 1996 first successor ti-92 ti-92 ii available stand-alone product user-installable ii module could added original ti-92 units gain feature improvements ti-92 ii module introduced early 1996 added choice 5 user languages english french german italian spanish additional 128k user memory along ti-92 ti-92 ii replaced ti-92 plus 1999 offered even flash rom ram ti-92 plus ti-92+ released 1998 slightly creation almost-identical terms software ti-89 physically looking exactly predecessor ti-92 lacked flash memory besides increased memory predecessor ti-92 plus also featured sharper black screen first appeared ti-89 eases viewing ti-92 plus available stand-alone product user-installable plus module could added original ti-92 ti-92 ii units gain feature improvements notably flash memory stand-alone ti-92 plus calculator functionally similar hw2 ti-89 module-upgraded ti-92 functionally similar hw1 ti-89 versions could run releases operating system software 2002 ti-92 plus succeeded voyage 200 longer sold ti dealers voyage 200 also v200 voyage 200 plt released 2002 replacement ti-92 plus hardware upgrade calculator increase amount flash memory available 2.7 megabytes voyage 200 vs. 702 kilobytes ti-92 plus also features somewhat smaller rounded case design like predecessor voyage 200 advanced calculator supports plotting multiple functions graph parametric polar 3d differential equation graphing well sequence representations symbolic calculation system based trimmed version calculation software derive addition algebra calculus capabilities voyage 200 packaged list spreadsheet data processing applications perform curve fitting number standard functions statistical analysis operations calculator also run programs written ti-89 ti-92 well programs specifically written large number applications ranging games interactive periodic tables found online v200 easily mistaken pda small computer massive enclosure full qwerty keyboard — feature disqualifies calculator use many tests examinations including american act sat ti-89 titanium offers exactly functionality smaller format also legal sat test act test note official page specifies user-available rom amount ti-92 plus 702k sources specify 388k due ti-92+ coming cabri geometry pre-installed uses 314 kb difference | [
5079,
5421
] | Test |
6,591 | 9 | Css_in_js:css js css-in-js styling technique javascript used style components javascript parsed css generated usually style element attached dom allows abstract css component level using javascript describe styles declarative maintainable way multiple implementations concept form libraries libraries allow create styled components using tagged template literals example using styled components react javascript library project would look like following import styled 'styled-components // create component renders p element blue text const bluetext styled.p bluetext blue text /bluetext another implementation emotion using react would import css jsx emotion/core' const color 'white' render things using css js possible using traditional css techniques make styles dynamic inline conditional statements also allows write modular code css encapsulated block javascript scoping module thousands companies use css-in-js production including reddit patreon target atlassian vogue github coinbase many | [
7848,
2451
] | Test |
6,592 | 4 | Radware:radware radware provider load balancing cybersecurity services data centers radware corporate headquarters located mahwah new jersey international headquarters located tel aviv israel company also offices shanghai china radware member rad group companies shares traded nasdaq radware founded 1997 roy zisapel president ceo director 1999 company initial public offering listed nasdaq stock exchange zisapel holds 3.4 percent stake company father yehuda zisapel largest shareholder 15 percent stake november 2005 radware acquired v secure technologies giving radware intrusion-prevention system/intrusion detection system ips/ids technology run layer 4-7 switch hardware appliances april 2007 radware acquired covelight systems provider web application auditing monitoring tools based cary north carolina us 16 million february 2009 radware acquired nortel ’ application delivery business alteon offers merged brand radware alteon february 2013 radware acquired strangeloop networks leader web-performance optimization wpo solutions e-commerce enterprise applications company sells products worldwide distributors resellers located americas europe middle east africa asia pacific customers include financial services insurance e-commerce manufacturing retail government healthcare education transportation services carriers | [
230,
2209,
651,
3637,
3680
] | Test |
6,593 | 2 | Glossary_of_operating_systems_terms:glossary operating systems terms page glossary operating systems terminology windows | [
4670,
5021,
13,
3271,
3626,
4318,
5041,
7550,
5751,
405,
4359,
65,
2961,
5783,
5088,
2617,
6500,
785,
2266,
788,
1522,
7605,
4759,
4397,
5116,
2300,
4786,
6922,
5161,
5865,
861,
1237,
3751,
1992,
7325,
190,
8066,
5209,
6984,
1640,
5571,... | Test |
6,594 | 1 | Object-relational_mapping:object-relational mapping object-relational mapping orm o/rm o/r mapping tool computer science programming technique converting data incompatible type systems using object-oriented programming languages creates effect virtual object database used within programming language free commercial packages available perform object-relational mapping although programmers opt construct orm tools object-oriented programming data-management tasks act objects almost always non-scalar values example address book entry represents single person along zero phone numbers zero addresses could modeled object-oriented implementation person object attributes/fields hold data item entry comprises person name list phone numbers list addresses list phone numbers would contain phonenumber objects address-book entry treated single object programming language referenced single variable containing pointer object instance various methods associated object method return preferred phone number home address however many popular database products sql database management systems dbms store manipulate scalar values integers strings organized within tables programmer must either convert object values groups simpler values storage database convert back upon retrieval use simple scalar values within program object-relational mapping implements first approach heart problem involves translating logical representation objects atomized form capable stored database preserving properties objects relationships reloaded objects needed storage retrieval functionality implemented objects said persistent implementation-specific details storage drivers generally wrapped api programming language use exposing methods interact storage medium way simpler line paradigms surrounding code following simple example written c code execute query written sql using database engine contrast following makes use orm-job api allowing writing code naturally makes use features language case makes use object representing storage repository methods object frameworks might provide code static methods yet methods may implement object-oriented system often choice paradigm made fit orm best surrounding language design principles usually framework expose filtering querying functionality allowing subsets storage base accessed modified code queries people database whose id value '10 compared traditional techniques exchange object-oriented language relational database orm often reduces amount code needs written disadvantages orm tools generally stem high level abstraction obscuring actually happening implementation code also heavy reliance orm software cited major factor producing poorly designed databases another approach use object-oriented database management system oodbms document-oriented databases native xml databases provide flexibility data modeling oodbmss databases designed specifically working object-oriented values using oodbms eliminates need converting data sql form data stored original object representation relationships directly represented rather requiring join tables/operations equivalent orms document-oriented databases called object-document mappers odms document oriented databases also prevent user shred objects table rows many systems also support xquery query language retrieve datasets object-oriented databases tend used complex niche applications one arguments using oodbms may able execute ad-hoc application-independent queries reason many programmers find home object-sql mapping system even though object-oriented databases able process sql queries limited extent oodbms provide replication sql databases means addressing need ad-hoc queries preserving well-known query patterns variety difficulties arise considering match object system relational database difficulties referred object-relational impedance mismatch alternative implementing orm use native procedural languages provided every major database called client using sql statements data access object dao design pattern used abstract statements offer lightweight object-oriented interface rest application | [
2180,
7156,
2186,
3961,
6098,
7915,
1860,
7920,
7937,
6144,
4743,
442,
6156,
1902,
784,
2623,
1905,
2624,
5101,
4053,
4054,
2660,
6543,
2663,
7999,
6932,
7303,
2702,
4457,
6604,
7330,
7341,
3778,
4136,
906,
5561,
5217,
1643,
5228,
6636,
... | Test |
6,595 | 4 | Certified_Computer_Examiner:certified computer examiner certified computer examiner cce credential demonstrates competency computer forensics cce offered international society computer examiners isfce organization hopes create maintain high standards computer examiners worldwide candidates cce must criminal record adhere isfce code ethics least 18 months professional experience documented training pass online examination well online examination candidates must perform forensic examination least three test media candidates successfully completed requirements isfce considered certified computer examiners members isfce maintain credential certified computer examiner fifty hours education training must completed every two years addition candidates must work least three media period online examination also required every two years recertification | [
4679,
1805,
6488
] | Test |
6,596 | 4 | BlockDos:blockdos blockdos mississauga ontario canada internet security company provides protection services ddos distributed denial service attacks team network engineers security specialists developers work via company global mitigation scrubbing locations washington dc los angeles ca chicago il dallas tx seattle wa netherlands vancouver bc montreal quebec london uk toronto ontario russia ukraine sweden malaysia typical clients include airlines banks various e-commerce providers education financial services banks brokerages gaming government media blockdos division server4sale secure hosting provider founded 2003 mississauga ontario canada 2005 server4sale created new security division named blockdos initially blockdos reseller mitigation technology providers beginning 2008 blockdos deployed in-house developed technology providing protection ddos global team middle east europe north america combined knowledge experience servers web hosting customer support related market research analysis application development ddos protection blockdos provides protection ddos threats small large enterprises various sectors including government gaming education blockdos ddos protection services include 24/7/365 technical support three communication modes electronic mail telephone live chat able provide 100 gbps mitigation capacity up-time guarantee said 99.9 protects websites via ddos mitigation centers result local ddos protection geo dns provides way direct users closest server proper load balancing clean traffic diverted custom filtering service available ssl supported email protection also offered features include deep packet inspection adaptive filtering flexible content filtering application level filtering rate limiting example blockdos ddos protection process explained case study financial services company solid trust pay early 2013 online editor access matters magazine published study stated case study outlines growing aggression attackers set ddos attacks provoked website performance issues solid trust pay internet infrastructure | [
2789
] | Test |
6,597 | 3 | Cell_microprocessor_implementations:cell microprocessor implementations first commercial cell microprocessor cell designed sony playstation 3 ibm designed powerxcell 8i use roadrunner supercomputer ibm published information concerning two different versions cell process early engineering sample designated dd1 enhanced version designated dd2 intended production main enhancement dd2 small lengthening die accommodate larger ppe core reported contain simd/vector execution resources preliminary information released ibm references dd1 variant result early journalistic accounts cell capabilities differ production hardware powerpoint material accompanying sti presentation given dr peter hofstee includes photograph dd2 cell die overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows additional details concerning internal spe implementation disclosed ibm engineers including peter hofstee ibm chief architect synergistic processing element scholarly ieee publication document includes photograph 2.54 x 5.81 mm spe implemented 90-nm soi technology spe contains 21 million transistors 14 million contained arrays term presumably designating register files local store 7 million transistors logic photograph overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows understanding dispatch pipes important write efficient code spu architecture two instructions dispatched started clock cycle using dispatch pipes designated even odd two pipes provide different execution units shown table ibm partitioned arithmetic instructions execute even pipe memory instructions execute odd pipe permute unit closely associated memory instructions serves pack unpack data structures located memory simd multiple operand format spu computes efficiently unlike processor designs providing distinct execution pipes spu instruction dispatch one designated pipe competing designs one pipe might designed handle extremely common instructions add permitting two instructions executed concurrently serve increase efficiency unbalanced workflows keeping extremely spartan design philosophy spu execution units multiply provisioned understanding limitations restrictive two pipeline design one key concepts programmer must grasp write efficient spu code lowest level abstraction programmers working higher levels abstraction good compiler automatically balance pipeline concurrency possible tested ibm heavy transformation lighting workload average ipc 1.4 performance profile implementation single spu processor qualified follows entry 2.0 ghz operation 0.9 v represents low power configuration entries show peak stable operating frequency achieved voltage increment general rule cmos circuits power dissipation rises rough relationship v^2 f square voltage times operating frequency though power measurements provided ibm authors lack precision convey good sense overall trend figures show part capable running 5 ghz test lab conditions—though die temperature hot standard commercial configurations first cell processors made commercially available rated ibm run 3.2 ghz operating speed chart suggests spu die temperature comfortable vicinity 30 degrees note single spu represents 6 cell processor die area power figures given table represent small portion overall power budget ibm publicly announced intention implement cell future technology 90 nm node improve power consumption reduced power consumption could potentially allow existing design boosted 5 ghz without exceeding thermal constraints existing products first shrink cell 65 nm node reduction 65 nm reduced existing 230 mm² die based 90 nm process half current size 120 mm² greatly reducing ibm manufacturing cost well 12 march 2007 ibm announced started producing 65 nm cells east fishkill fab chips produced apparently ibms cell blade servers first get 65 nm cells sony introduced third generation ps3 november 2007 40gb model without ps2-compatibility confirmed use 65 nm cell thanks shrunk cell power consumption reduced 200w 135w first known 65 nm-cells clock 6 ghz run 1.3v core voltage demonstrated isscc 2007 would given chip theoretical peak performance 384 gflops fp8 quarter precision 48 gflops fp64 dual precision significant improvement 204.8 gflops peak 25.6gflops fp64 dual precision 90 nm 3.2 ghz cell could provide 8 active spus ibm announced implemented new power-saving features dual power supply sram array version yet long-rumoured cell+ enhanced double precision floating point performance first saw light day mid-2008 roadrunner supercomputer form qs22 powerxcell blades although ibm talked even showed higher-clocked cells clock speed remained constant 3.2 ghz even double precision enabled cell+ roadrunner keeping clockspeed constant ibm instead opted reduce power consumption powerxcell clusters even best ibms blue gene clusters 371 mflops/watt far power-efficient already clusters made conventional cpus 265 mflops/watt lower isscc 2008 ibm announced cell 45 nm node ibm said would require 40 percent less power clockspeed 65 nm predecessor die area would shrink 34 percent 45 nm cell requires less cooling allows cheaper production also use much smaller heatsink mass production initially slotted begin late 2008 moved early 2009 sony ibm toshiba announced begin work cell small 32 nm january 2006 since process shrinks fabs usually happen global individual chip scale merely public commitment take cell 32 nm | [
450,
1346,
4408,
5042,
4242,
5665,
1388,
2139,
4718,
239,
763,
602,
2873,
2601,
3234,
4200,
1606,
1244,
4839
] | Validation |
6,598 | 1 | Pacific_Ocean_Shelf_Tracking_Project:pacific ocean shelf tracking project pacific ocean shelf tracking project post field project census marine life researches behavior marine animals use ocean telemetry data management systems system telemetry consists highly efficient lines acoustic receivers create sections continental shelf along coast pacific northwest acoustic receivers pick signals tagged animals pass along lines allowing documentation movement patterns receivers also allow estimation parameters swimming speed mortality trackers sit seabed continental shelf major rivers world method used improve fishing skills management program started 2002 initially limited study movement ocean-survival hatchery-raised wild salmon pacific northwest successful pilot period program moved tracking trout sharks rockfish lingcod | [] | Test |
6,599 | 3 | Socket_FP2:socket fp2 socket fp2 µbga-827 cpu socket notebooks released may 2012 amd apu processors codenamed trinity richland trinity -branded products combine piledriver northern islands vliw4 terascale uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors | [
2539,
2541,
5895,
4931,
7163,
3362,
1735,
2016,
5377,
6351,
913,
7826,
4694,
2751,
6545,
6373,
1961,
5063,
6655,
6562,
6307,
3145,
4090,
866,
5436,
780,
1143,
7782
] | Validation |
6,600 | 2 | CocoonJS:cocoonjs cocoonjs mobile development framework produced ludei.it enables software developers build mobile apps using javascript html5 css3 instead device-specific languages objective-c enables wrapping html css javascript code depending upon platform device extends features html javascript work device platform similar adobe phonegap claims significant improvements | [
2451,
5571
] | Test |
6,601 | 7 | Village_Telco:village telco village telco initiative build low-cost community telephone network hardware software based suite open-source applications enable entrepreneurs set operate telephone service specific area supporting needs specific community first village telco network established dabba orange farm township near johannesburg south africa users make free local calls dabba subscribers well use pay-as-you-go vouchers make calls 'phones networks technically village telco system consists components together comprise easy-to-use standards-based wireless local do-it-yourself telephone company toolkit goal bringing together make local telephony developing countries cheap virtually free become possible thanks advances open source telephony software dramatic decrease cost wireless broadband technology | [
7170,
6987,
371
] | Test |
6,602 | 9 | HADES_(software):hades software hades haskins analysis display experiment system refers family signal processing computer programs developed 1980s haskins laboratories philip rubin colleagues provide display analysis multiple channel physiological speech sampled data experimental context principal programmers years project included vance maverick mark tiede marian pressler simon levy significant feature hades incorporation procedural language known spiel signal processing interactive editing language provided creation customization specialized analysis procedures stored text files edited etc. similar functions subroutines programming languages like c fortran hades one earliest signal processing systems integrated language use spiel provided automated procedural analysis large datasets usually speech data multiple-channel physiological data acquired specialized hardware emma magnetometer system previous systems time included ils sti inc. mitsyn system designed bill henke hades written c implemented vax systems running vms although hades still finds limited use functionality eventually replaced commercial systems matlab | [
2803,
8117,
1435,
5117
] | Validation |
6,603 | 7 | LandWarNet:landwarnet landwarnet lwn united states army ’ contribution global information grid gig consists globally interconnected end-to-end set army information capabilities associated processes personnel collecting processing storing disseminating managing information demand supporting warfighters policy makers support personnel includes army owned leased leveraged department defense dod /joint communications computing systems services software including applications data security services associated services landwarnet exists enable warfighter mission command previously described battle command u.s. service equivalent efforts landwarnet include navy forcenet air force c2 constellation key document shaping capability development expectation landwarnet military operations future operating capabilities pamphlet describes force operating capabilities foc desired u.s. army near mid long term encompassing full spectrum military operations derived analysis joint concepts army future force concepts documents developed support national military strategy nms strategic planning guidance spg army strategic planning guidance aspg army transformation road map atr army campaign plan acp landwarnet essentially combination set functional applications mission command intelligence logistics etc transmitted integrated network transport space airborne terrestrial infrastructure network terminal utilizing common set network services voice data collaboration mediation storage discovery messaging speed service quality service hosting ia/security netops information assurance information dissemination management network management landwarnet also represents army ’ unified coherent network capabilities development effort bring pieces together focus effort providing soldiers leaders units today future means conduct information-enabled joint warfighting supporting operations landwarnet underpinned integrated architectures enables “ one mission command system ” part “ one network ” facilitates consistent alignment joint capabilities across layers network platforms sensors applications services transport standards design field integrated system systems network provides link soldier sustaining base tailored software applications optimized conducting joint operations gen byrnes cg tradoc back november 2003 determined army needed single name represent tactical networks current future assessment based numerous questions asked jfcom component commanders conference senior generals admirals forum discussion army networks task finding right name given battle command awareness division bcad within tradoc futures center directorate numerous suggestions staffing process name landwarnet stood name inspired jtf warnet program extending littoral battlespace elb advanced concept technology development actd time nov 03 jan 04 name landwarnet initially represented current future tactical networks name caught within relatively short time services dod joint battle management command control jbmc2 document review process feb 2004 cio/g6 army incorporated name represent current future army networks name greater appeal traction military circles congressional level previous name army network i.e army knowledge enterprise ake • landwarnet lwn army ’ part dod information technology infrastructure enables operational forces ’ reach back data form high definition intelligence products voice video data • lwn combination infrastructure services moves information seamless network enables management warfighting business information • lwn key enabler information superiority decision superiority ultimately full spectrum dominance well quality speed decision-making enhanced battle command • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness • lwn push voice data video edge tactical formations—ultimately pushing capabilities lower lower modular army ’ brigades battalions soldiers enabling distributed operations required today ’ future operations • recent combat operations highlight critical need mobile communications networks satellite communications range extension provide interoperability within joint force within defense communications network infrastructure • networked communications demonstrated joint network node jnn system blue force tracking enhance speed command increase warfighter ’ ability plan execute operations geographically dispersed battlespace • fielding integration migration robust battle command systems deployed deployable units continues primary focus army • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness u.s. army strategic communications guide 2007 • landwarnet lwn army ’ part dod information technology infrastructure enables soldiers reach back data form high definition intelligence products voice video data • lwn army portion dod global information grid gig • lwn move information seamless network better supports soldiers infrastructure supports • lwn combination infrastructure services moves information seamless network enables command control management warfighting business information • army transforming data applications processes achieve knowledge sharing optimizes decision making mission planning performance across army • army consolidating network services area processing centers increase lwn efficiency effectiveness reduce network vulnerabilities • lwn managed defended operated part enterprise global information network | [
5166
] | Validation |
6,604 | 1 | Database_abstraction_layer:database abstraction layer database abstraction layer dbal dal application programming interface unifies communication computer application databases sql server db2 mysql postgresql oracle sqlite traditionally database vendors provide interface tailored products leaves application programmer implement code database interfaces would like support database abstraction layers reduce amount work providing consistent api developer hide database specifics behind interface much possible exist many abstraction layers different interfaces numerous programming languages application layer built called database-agnostic lowest level connects database performs actual operations required users level conceptual instruction translated multiple instructions database understands executing instructions correct order allows dal perform conceptual instruction implementation physical layer may use database-specific apis use underlying language standard database access technology database version sql implementation data types operations database-specific level conceptual level consolidates external concepts instructions intermediate data structure devolved physical instructions layer complex spans external physical levels additionally needs span supported databases quirks apis problems level aware differences databases able construct execution path operations cases however conceptual layer defers physical layer actual implementation individual operation external level exposed users developers supplies consistent pattern performing database operations every database treated equally level apparent difference despite varying physical data types operations libraries unify access databases providing single low-level programming interface application developer advantages often speed flexibility tied specific query language subset implement thin layer reach goal sql dialects similar one another application developers use language features possibly providing configurable elements database-specific cases typically user-ids credentials thin-layer allows queries statements run variety database products negligible overhead popular use database abstraction layers among object-oriented programming languages similar api-level abstraction layers object-oriented language like c++ java database represented object whose methods members equivalent thereof programming languages represent various functionalities database also share advantages disadvantages api-level interfaces example database abstraction layer language level would odbc platform-independent implementation database abstraction layer user installs specific driver software odbc communicate database set databases user ability programs communicate odbc relays results back forth user programs database downside abstraction level increased overhead transform statements constructs understood target database alternatively thin wrappers often described lightweight abstraction layers opendbx libzdb finally large projects may develop libraries example libgda gnome software developers know database abstraction layer api instead apis databases application support databases supported bigger time saving using database abstraction layer means requirement new installations utilise specific database i.e new users unwilling unable switch databases deploy existing infrastructure new database technologies emerge software developers wo n't adapt new interfaces production database may replaced desktop-level implementation data developer-level unit tests depending database dal may possible dal add features database dal may use database programming facilities methods create standard unsupported functionality completely new functionality instance dbvolution dal implements standard deviation function several databases support abstraction layer reduce overall speed less depending amount additional code executed database layer abstracts native database interface tries emulate features present database backends slower overall performance especially true database abstraction layers try unify query language well like odbc database abstraction layer provides yet another functional dependency software system i.e given database abstraction layer like anything else may eventually become obsolete outmoded unsupported database abstraction layers may limit number available database operations subset supported supported database backends particular database abstraction layers may fully support database backend-specific optimizations debugging features problems magnify significantly database size scale complexity | [
1905,
7330,
7341,
7715,
6345,
5561,
906,
4944,
5217,
6098,
3863,
7638,
4054,
6636,
2663,
5310,
2124,
6737,
6739,
3119,
3801,
4516,
7999,
5943,
4167,
3479,
2054,
6932,
2870,
6386,
684,
5956,
6390,
7937,
7303,
6144,
4457,
6320,
1902,
6594
] | Train |
6,605 | 9 | Initialization_(programming):initialization programming computer programming initialization initialisation assignment initial value data object variable manner initialization performed depends programming language well type storage class etc. object initialized programming constructs perform initialization typically called initializers initializer lists initialization distinct preceded declaration although two sometimes conflated practice complement initialization finalization primarily used objects variables initialization done either statically embedding value compile time else assignment run time section code performs initialization generally known initialization code may include one-time-only functions opening files object-oriented programming initialization code may part constructor class method initializer instance method setting memory location hexadecimal zeroes also sometimes known clearing often performed exclusive instruction operands specifying variable machine code level since requires additional memory access c/c99/c++ initializer optional part declarator consists '= character followed expression comma-separated list expressions placed curly brackets braces latter list sometimes called initializer list initialization list although term initializer list formally reserved initialization class/struct members c++ see declaration includes initialization commonly called definition many find convenient draw distinction terms declaration definition commonly seen phrase distinction declaration definition ... implying declaration merely designates data object function fact according c++ standard definition declaration still usage declarations definitions although formally incorrect common c examples c++ examples c++ constructor class/struct initializer list within definition prior constructor body important note use initialization list values assigned variable initialized example 0 initialized im example construct codice_1 initializer list sometimes term initializer list also used refer list expressions array struct initializer c++11 provides powerful concept initializer lists means template called std :initializer_list data initialization may occur without explicit syntax program example static variables declared without initializer primitive data types initialized value zero corresponding type static objects class type initialized default constructors | [
3351,
4909,
5510,
7460,
5190
] | Test |
6,606 | 4 | FlyBack:flyback flyback open-source backup utility linux based git modeled loosely apple time machine flyback creates incremental backups files restored later date flyback presents chronological view file system allowing individual files directories previewed retrieved one time flyback originally based rsync project began 2007 october 2009 rewritten scratch using git flyback presents user typical file-manager style view file system additional controls allowing user go forward backward time shows user files exist exist changed since last version allows preview deciding restore ignore flyback settings preferences flyback ui allows users flyback written python using gtk libraries well program git installed software function properly | [
6289,
2390,
4386,
1254,
3827,
5965,
5571,
578
] | Test |
6,607 | 4 | TCP_Gender_Changer:tcp gender changer tcp gender changer method computer networking making internal tcp/ip based network server accessible beyond protective firewall consists two nodes one resides internal local area network access desired server node runs outside local area network client access nodes respectively called cc connect-connect listen-listen reason behind naming nodes fact connect-connect node initiates two connections one listen-listen node one actual server listen-listen node however passively listens two tcp/ip ports one receive connection cc one incoming connection client cc node runs inside network establish control connection waiting signal open connection internal server upon receiving client connection signal cc node connect server done cc let know result successful keep client connection thus client server communicate cc relay data back forth one cases useful connect desktop machine behind firewall running vnc would make desktop remotely accessible network beyond firewall another useful scenario would create vpn using ppp ssh even simply using ssh connect internal unix based server | [
7214,
651,
5880,
4014
] | Train |
6,608 | 4 | Out_of_the_Inner_Circle:inner circle inner circle hacker guide computer security book bill landreth howard rheingold published 1985 microsoft press distributed simon schuster inc. book created provide insight ways methods hacking community days internet became prevalent although largely outdated nostalgic show brought many current trends see network security today | [
3486
] | Test |
6,609 | 2 | MacPorts:macports macports formerly called darwinports package management system simplifies installation software macos darwin operating systems open-source software project simplify installation open source software similar aim function fink bsd ports collections darwinports started 2002 part opendarwin project involvement number apple inc. employees including landon fuller kevin van vechten jordan hubbard macports allows installation number packages entering command sudo port install packagename terminal download compile necessary install requested software also installing required dependencies automatically installed packages updated command sudo port upgrade outdated official gui application called pallet also available version 1.0 released april 28 2005 december 2005 project reached milestone surpassing 3000 ports time package installation involved source code downloaded compiled end user machine version 2.0 released 2011 introduced support prebuilt binary archives default ports installed using prebuilt binary archive available built source otherwise macports 21,600 ports macports hosted mac os forge open source hosting service created maintained apple inc. third-party projects supported apple apple closed mac os forge 2016 project moved github best-effort support sourced community macports supports universal binaries powerpc intel-based versions mac os x migrating powerpc installation macports version intel mac requires reinstalling installed ports | [
5726,
4675,
6428,
5386,
7555,
2594,
1502,
781,
5092,
4759,
7619,
7251,
3366,
4778,
2300,
486,
1193,
4059,
499,
3036,
1582,
2327,
4441,
523,
163,
1598,
8055,
5200,
5545,
3085,
1260,
5912,
569,
5571,
578,
2034,
1654,
2771,
244,
6663,
1684... | Test |
6,610 | 3 | Maxwell_(microarchitecture):maxwell microarchitecture maxwell codename gpu microarchitecture developed nvidia successor kepler microarchitecture maxwell architecture introduced later models geforce 700 series also used geforce 800m series geforce 900 series quadro mxxx series manufactured tsmc 28 nm process first maxwell-based products hit market geforce gtx 750 geforce gtx 750 ti released february 18 2014 chip code number gm107 earlier geforce 700 series gpus used kepler chips code numbers g k 1xx gm10x gpus also used geforce 800m series quadro kxxx series second generation maxwell-based products introduced september 18 2014 geforce gtx 970 geforce gtx 980 followed geforce gtx 960 january 22 2015 geforce gtx titan x march 17 2015 geforce gtx 980 ti june 1 2015 gpus gm 2 0x chip code numbers maxwell introduced improved streaming multiprocessor sm design increased power efficiency sixth seventh generation purevideo hd cuda compute capability 5.2 architecture named james clerk maxwell founder theory electromagnetic radiation maxwell architecture used system chip soc mobile application processor tegra x1 successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink first generation maxwell gpus gm107/gm108 released geforce gtx 745 gtx 750/750 ti gtx 850m/860m gm107 geforce 830m/840m gm108 new chips introduced consumer-facing additional features nvidia instead focused increasing gpu power efficiency l2 cache increased 256 kib kepler 2 mib maxwell reducing need memory bandwidth accordingly memory bus reduced 192 bit kepler gk106 128 bit reducing die area power draw streaming multiprocessor design kepler also retooled partitioned renamed smm maxwell structure warp scheduler inherited kepler texture units fp64 cuda cores still shared layout execution units partitioned warp schedulers smm controls one set 32 fp32 cuda cores one set 8 load/store units one set 8 special function units contrast kepler smx 4 schedulers schedule shared pool execution units prior kepler units connected crossbar uses unnecessary power allow shared maxwell crossbar removed became redundant allowed finer-grained efficient allocation resources kepler saving power workload n't optimal shared resources nvidia claims 128 cuda core smm 90 performance 192 cuda core smx efficiency increases factor 2 also graphics processing cluster gpc contains 4 smx units kepler 5 smm units first generation maxwell gm107 also supports cuda compute capability 5.0 compared 3.5 gk110/gk208 gpus 3.0 gk10x gpus dynamic parallelism hyperq two features gk110/gk208 gpus also supported across entire maxwell product line maxwell also provides native shared memory atomic operations 32-bit integers native shared memory 32-bit 64-bit compare-and-swap cas used implement atomic functions nvidia video encoder nvenc upgraded 1.5 2 times faster kepler-based gpus meaning encode video six eight times playback speed nvidia also claims eight ten times performance increase purevideo feature set e video decoding due video decoder cache paired increases memory efficiency however h.265 supported full hardware decoding first generation maxwell gpus relying mix hardware software decoding decoding video new low power state gc5 used maxwell gpus conserve power maxwell gpus found use tiled rendering second generation maxwell gpus introduced several new technologies dynamic super resolution third generation delta color compression multi-pixel programming sampling nvidia vxgi real-time-voxel-global illumination vr direct multi-projection acceleration multi-frame sampled anti-aliasing mfaa however support coverage-sampling anti-aliasing csaa removed direct3d12 api feature level 12_1 hdmi 2.0 support also added rop memory controller ratio changed 8:1 16:1 however rops generally idle gtx 970 enough enabled smms give work reducing maximum fill rate polymorph engine responsible tessellation upgraded version 3.0 second generation maxwell gpus resulting improved tessellation performance per unit/clock second generation maxwell also 4 smm units per gpc compared 5 smm units per gpc gm204 supports cuda compute capability 5.2 compared 5.0 gm107/gm108 gpus 3.5 gk110/gk208 gpus 3.0 gk10x gpus gm20x gpus upgraded nvenc supports hevc encoding adds support h.264 encoding resolutions 1440p/60fps 4k/60fps compared nvenc maxwell first generation gm10x gpus supported h.264 1080p/60fps encoding consumer complaints nvidia revealed able disable individual units containing 256kb l2 cache 8 rops without disabling whole memory controllers comes cost dividing memory bus high speed low speed segments accessed time reads l2/rop unit managing gddr5 controllers shares read return channel write data bus gddr5 controllers makes simultaneous reading gddr5 controllers simultaneous writing gddr5 controllers impossible used geforce gtx 970 therefore described 3.5 gb high-speed segment 224-bit bus 512 mb low-speed segment 32-bit bus peak speed gpu still attained peak speed figure reachable one segment executing read operation segment executing write operation theoretical single-precision processing power maxwell gpu flops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed hz theoretical double-precision processing power maxwell gpu 1/32 single precision performance noted low compared previous generation kepler successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink | [
2538,
2270,
7442,
1640,
4954,
7912,
5939,
1864,
7669,
1595,
8141,
1237,
4833,
2080,
7782
] | Test |
6,611 | 9 | Robert_S._Boyer:robert s. boyer robert stephen boyer retired professor computer science mathematics philosophy university texas austin j strother moore invented boyer–moore string search algorithm particularly efficient string searching algorithm 1977 moore also collaborated boyer–moore automated theorem prover nqthm 1992 following worked moore matt kaufmann another theorem prover called acl2 boyer published extensively including following books | [
8025,
3254,
3556,
7750,
1243
] | Test |
6,612 | 9 | Action_description_language:action description language artificial intelligence action description language adl automated planning scheduling system particular robots considered advancement strips edwin pednault specialist field data abstraction modelling ibm research staff member data abstraction research group since 1996 proposed language 1987 example action language pednault observed expressive power strips susceptible improved allowing effects operator conditional main idea adl-a basically propositional fragment adl proposed pednault adl-b extension -a -b extension actions described indirect effects introduction new kind propositions ” static laws third variation adl adl-c similar -b sense propositions classified static dynamic laws particularities sense planning language represent certain conditions environment based automatically generate chain actions lead desired goal goal certain partially specified condition action executed preconditions must fulfilled execution action yields effects environment changes environment described means certain predicates either fulfilled contrary strips principle open world applies adl everything occurring conditions unknown instead assumed false addition whereas strips positive literals conjunctions permitted adl allows negative literals disjunctions well adl schema consists action name optional parameter list four optional groups clauses labeled precond add delete update precond group list formulae define preconditions execution action set empty value true inserted group preconditions always evaluated holding conditions add delete conditions specified add delete groups respectively group consists set clauses forms shown left-hand column figure 1 update groups used specify update conditions change values function symbols update group consists set clauses forms shown left column figure 2 formal semantic adl defined 4 constraints first constraint actions may change set objects exist world means every action α every current-state/next-state pair ∈ must case domain equal domain second constraint actions adl must deterministic current-state/next-state pairs action ∃ must case third constraint incorporated adl functions introduced must representable first-order formulas every n -ary relation symbol r must exist formula φ x ... x free variables x ... x f given consequently f n ... x true performing action |= φ x ... x true beforehand note representability requirement relies first constraint domain f equal domain fourth final constraint incorporated adl set states action executable must also representable formula every action α represented adl must exist formula π property |= π state ∈ α i.e action α executable state terms computational efficiency adl located strips situation calculus adl problem translated strips instance – however existing compilation techniques worst-case exponential worst case improved willing preserve length plans polynomially thus adl strictly brief strips adl planning still pspace-complete problem algorithms polynomial space even preconditions effects complex formulae top-performing approaches classical planning internally utilize strips like representation fact planners ff lpg fast-downward sgplan5 lama first translate adl instance one essentially strips one without conditional quantified effects goals expressiveness strips language constrained types transformations sets formulas described language transformations sets formulas using strips operators accomplished removing formulas set transformed adding new additional formulas given strips operator formulas added deleted fixed sets formulas transformed consequently strips operators adequately model actions whose effects depend situations performed consider rocket going fired certain amount time trajectory may vary burn duration also velocity mass orientation rocket modelled means strips operator formulas would added deleted would depend set formulas transformed although efficient reasoning possible strips language used generally recognized expressiveness strips suitable modeling actions many real world applications inadequacy motivated development adl language adl expressiveness complexity lies strips language situation calculus expressive power sufficient allow rocket example described represented yet time restrictive enough allow efficient reasoning algorithms developed example complex version blocks world could block twice big blocks b c action xmoveonto b might effect negating clear c already true creating conditional effect depending size blocks kind conditional effects would hard express strips notation without conditional effects consider problem air freight transport certain goods must transported airport another airport plane airplanes need loaded unloaded necessary actions would loading unloading flying descriptors one could express whether freight c airplane p whether object x airport actions could defined follows | [] | Test |
6,613 | 7 | DesktopTwo:desktoptwo desktoptwo free webtop whose url desktoptwo.com parked domain developed sapotek whose url sapotek.com also parked domain also called webos although sapotek stated website term premature presumptuous mimics look feel functionality desktop environment operating system software reached beta stage spanish version called computadora.de desktoptwo web-based required adobe flash player operate web applications found desktoptwo built php back end features included drag-and-drop functionality sapotek liberated web applications found desktoptwo sapodesk agpl license desktoptwo belonged category services intended turn web full-fledged platform using web services foundation along presentation technologies replicated experience desktop applications users cloud os functionality server granularized abstracted web services web developers used create composite applications similar desktop software developers use several apis os create applications sites like facebook attempt create similar effect exposing apis allowing developers create applications upon features found desktoptwo file sharing webmail blog creator instant messenger address book calendar rss reader office productivity applications desktoptwo.com since closed longer running goes sapotek website sapotek since gone public market closed doors | [
6029,
5571
] | Test |
6,614 | 9 | Referential_transparency:referential transparency referential transparency referential opacity properties parts computer programs expression called referentially transparent replaced corresponding value without changing program behavior requires expression pure say expression value must inputs evaluation must side effects expression referentially transparent called referentially opaque mathematics function applications referentially transparent definition constitutes mathematical function however always case programming terms procedure method used avoid misleading connotations functional programming referentially transparent functions considered programming languages provide means guarantee referential transparency functional programming languages enforce referential transparency functions importance referential transparency allows programmer compiler reason program behavior rewrite system help proving correctness simplifying algorithm assisting modifying code without breaking optimizing code means memoization common subexpression elimination lazy evaluation parallelization concept seems originated alfred north whitehead bertrand russell principia mathematica 1910–13 adopted analytical philosophy willard van orman quine §30 word object 1960 quine gives definition mode containment φ referentially transparent whenever occurrence singular term purely referential term sentence ψ purely referential also containing term sentence φ ψ term appeared contemporary usage discussion variables programming languages christopher strachey seminal set lecture notes fundamental concepts programming languages 1967 lecture notes referenced quine word object bibliography functions involved expression pure functions expression referentially transparent consider function returns input source pseudocode call function might codice_1 codice_2 might identify particular disk file keyboard etc even identical values codice_2 successive return values different therefore function codice_4 neither deterministic referentially transparent subtle example function free variable i.e. depends input explicitly passed parameter resolved according name binding rules non-local variable global variable variable current execution environment dynamic binding variable closure static binding since variable altered without changing values passed parameter results subsequent calls function may differ even parameters identical however pure functional programming destructive assignment allowed thus free variable statically bound value function still referentially transparent neither non-local variable value change due static binding immutability respectively arithmetic operations referentially transparent codice_5 replaced codice_6 instance fact functions mathematical sense referentially transparent codice_7 transparent since always give result particular codice_8 assignments transparent instance c expression codice_9 changes value assigned variable codice_8 assuming codice_8 initially value codice_12 two consecutive evaluations expression yield respectively codice_13 codice_14 clearly replacing codice_9 either codice_13 codice_14 gives program different meaning expression referentially transparent however calling function codice_18 transparent implicitly change input x thus side effects codice_19 transparent evaluate replace value say jan 1 2001 n't get result run tomorrow depends state date languages side-effects like haskell substitute equals equals codice_20 every value x hold languages side-effects substitution expression value valid certain point execution program expression referentially transparent definition ordering sequence points theoretical foundation imperative programming part semantics imperative programming language however referentially transparent expression evaluated time necessary define sequence points guarantee order evaluation programming done without considerations called purely functional programming one advantage writing code referentially transparent style given intelligent compiler static code analysis easier better code-improving transformations possible automatically example programming c performance penalty including call expensive function inside loop even function call could moved outside loop without changing results program programmer would forced perform manual code motion call possibly expense source code readability however compiler able determine function call referentially transparent perform transformation automatically primary disadvantage languages enforce referential transparency make expression operations naturally fit sequence-of-steps imperative programming style awkward less concise languages often incorporate mechanisms make tasks easier retaining purely functional quality language definite clause grammars monads example let use two functions one referentially opaque referentially transparent function codice_21 referentially transparent means codice_22 codice_23 instance codice_24 however ca n't say thing codice_25 uses global variable modifies referential opacity codice_25 makes reasoning programs difficult example say wish reason following statement one may tempted simplify statement however work codice_27 occurrence codice_28 evaluates different value remember return value codice_25 based global value n't passed gets modified call codice_25 means mathematical identities formula_1 longer hold mathematical identities hold referentially transparent functions codice_21 however sophisticated analysis used simplify statement takes steps requires degree insight code infeasible compiler optimization therefore referential transparency allows us reason code lead robust programs possibility finding bugs could n't hope find testing possibility seeing opportunities optimization | [
790,
1997,
1361,
7936,
2740,
4573,
7385,
3810,
6980,
1435
] | Validation |
6,615 | 2 | Samsung_Ativ_Tab:samsung ativ tab samsung ativ tab tablet manufactured samsung ativ tab announced august 29 2012 ifa 2012 incorporates dual-core 1.2 ghz qualcomm snapdragon s4 processor runs windows rt operating system despite mixed reception windows rt operating system received comparison windows 8 ativ tab received positive reviews lightweight design ability use usb peripherals overall performance first generation windows rt device ativ tab released december 2012 united kingdom release germany united states cancelled due lukewarm reception unclear positioning windows rt design ativ tab relatively similar android-based counterparts galaxy note 10.1 built using mixture plastic glass micro hdmi port microsd slot full-size usb port incorporated design well volume rocker power button headphone jack located top physical windows button located directly screen charging port dock connector located bottom ativ tab uses ips display resolution 1366x768 tablet available either 32 gb 64 gb internal storage ativ tab originally scheduled release united kingdom november 2012 alongside windows phone 8 counterpart samsung ativ delayed mid-december release devices eventually held december 14 2012 january 2013 samsung announced cancelled american release ativ tab citing unclear positioning windows rt operating system modest demand windows rt devices plus effort investment required educate consumers differences windows 8 rt reasons move mike abary senior vice president samsung u.s. pc tablet businesses also stated company unable build ativ tab meet target price pointconsidering lower cost intended selling point windows rt devices samsung also reportedly planned pull ativ tab germany unspecified european markets similar reasons whilst demoing device ifa techradar praised ativ tab crisp screen lightweight design ability expand functionality storage usb port microsd card slot however also said processor relatively responsive certainly n't league galaxy note 2 anandtech said despite best substitute actual notebook due lagging performance arm-based processors rushed nature os ativ tab well executed first-generation windows rt device tablet relatively snappy performance battery life lightweight design regarded positive aspectsdespite considering design nothing particularly new exciting qualcomm apq8060a chipset used ativ tab also judged best processor windows rt far noting performance sufficient surprisingly competitive comparison chipsets used competing windows rt devices rear camera considered neither horrible great lack keyboard accessory dock connector also noted | [
6874,
2342,
3764,
4759,
5571,
1237,
3395,
2550,
972,
6910,
7189
] | Test |
6,616 | 3 | FMA_instruction_set:fma instruction set fma instruction set extension 128 256-bit streaming simd extensions instructions x86 microprocessor instruction set perform fused multiply–add fma operations two variants fma3 fma4 instructions almost identical functionality compatible contain fused multiply–add fma instructions floating-point scalar simd operations fma3 instructions three operands fma4 ones four fma operation form round · b c round function performs rounding allow result fit within destination register many significant bits fit within destination four-operand form fma4 allows b c four different registers three-operand form fma3 requires register b c three-operand form makes code shorter hardware implementation slightly simpler four-operand form provides programming flexibility see xop instruction set discussion compatibility issues intel amd incompatibility intel fma3 amd fma4 due companies changing plans without coordinating coding details amd changed plans fma3 fma4 intel changed plans fma4 fma3 almost time history summarized follows different compilers provide different levels support fma4 | [
2539,
2000,
1252,
3173,
2989,
4845,
6969,
3942,
4224,
6344,
6523,
5559,
4108,
1465,
5665,
5934,
742,
5669,
5670,
584,
5055,
6647,
2226,
1770,
2498,
4077,
6563,
3248,
5165,
3139,
6133,
2332,
1881,
766,
5431,
691,
3747,
4098,
6236,
6675,
... | Test |
6,617 | 4 | Messaging_Layer_Security:messaging layer security messaging layer security mls security layer end-to-end encrypting messages groups size two many built ietf mls working group designed efficient practical secure security properties mls include message confidentiality message integrity authentication membership authentication asynchronicity forward secrecy post-compromise security scalability idea born 2016 first discussed unofficial meeting ietf 96 berlin attendees wire mozilla cisco initial ideas based pairwise encryption secure 1:1 group communication 2017 academic paper introducing asynchronous ratcheting trees published university oxford setting focus efficient encryption schemes first bof took place february 2018 ietf 101 london founding members mozilla facebook wire google twitter university oxford inria | [
4783
] | Test |
6,618 | 2 | Management_features_new_to_Windows_Vista:management features new windows vista windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement windows setup process completely rewritten deployment mechanisms support per-application remote desktop sessions new diagnostic health monitoring tools range new group policy settings covering many features new windows vista areas interest include major changes task scheduler well addition subsystem unix applications provides posix-compatible environment applications part operating system setup process windows vista completely rewritten image-based setup based windows preinstallation environment winpe version 2.0 amongst features runs entire setup process graphical environment opposed text-based environments previous versions visually user interface resembles windows vista using cleartype fonts aero visual style enabling use mouse prior copying setup image users graphically resize partitions support loading third-party disk drivers improved whereas windows xp supported loading drivers floppy disks setup environment initially loading windows vista additionally supports loading drivers usb firewire storage devices cds dvds within main setup wizard microsoft aimed reduce amount time setup takes complete setup significantly faster windows xp thus windows vista installed little 20 minutes especially notable considering windows vista install three times size predecessor end setup process windows vista automatically downloads applies security device-driver updates windows update new windows recovery environment winre detects fixes startup related problems accessed pressing f8 startup system boots winre interface offers various tests well recovery failure detection tools winre automatically detects blue screen errors registry damage tries repair system get running quickly windows recovery environment tools significantly expanded take advantage new graphical setup environment toolbox presented user offering access repair functions system restore new memory diagnostic tool access complete pc backup restore images access command prompt multiple command prompts spawned command-line tools available command prompts spawned time setup pressing shift+f10 new diagnostic utility dubbed startup repair later automatic repair formerly system recovery troubleshooter wizard designed repair issues may negatively affect windows startup process damaged missing boot system files incompatible drivers issues result damaged hardware startup repair checks corruption operating system components boot configuration data disk file system metadata master boot record windows registry microsoft stated utility intended repair eighty percent issues package manager part windows vista servicing stack replaces previous package installer codice_1 update installer codice_2 microsoft delivers updates windows vista files resources package manager windows update control panel item turn windows features use windows vista servicing stack package manager also install updates offline windows image including updates boot-critical device drivers language packs windows vista introduced component-based servicing cbs architecture installation servicing deployment windows vista uses hardware-independent image windows imaging format wim image file contains necessary bits operating system contents copied target system system specific software device drivers applications installed configured afterwards reduces time taken installation windows vista corporations author image files using wim format might include applications organization wants deploy also multiple images kept single image file target multiple scenarios ability used microsoft include editions windows vista disc install proper version based provided product key addition initial configuration locale settings account names etc supplied xml answer files automate installation microsoft provides tool called imagex support creation custom images edit images created also used generate image running installation including data applications backup purposes wim images also controlled using windows system image manager used edit images create xml answer files unattended installations sysprep also included part windows vista hal-independent also included windows vista improved version files settings transfer wizard known windows easy transfer allows settings inherited previous installations user state migration tool allows migrating user accounts large automated deployments clickonce deployment technology smart client applications enables self-updating windows-based applications installed run minimal user interaction fashion require administrator access activex installer service optional component included business enterprise ultimate editions provides method network administrators domain authorize installation upgrade specific activex controls operating standard user activex components listed group policy installed without user account control consent dialog displayed windows vista includes number self-diagnostic features help identify various problems possible suggest corrective actions event logging subsystem windows vista also completely overhauled rewritten around xml allow applications precisely log events event viewer also rewritten take advantage new features large number different types event logs monitored including administrative operational analytic debug log types instance selecting application logs node scope pane reveals numerous new subcategorized event logs including many labeled diagnostic logs event logs configured automatically forwarded systems running windows vista windows server 2008 event logs also remotely viewed computers multiple event logs centrally logged managed single computer event logs filtered one criteria custom views created one events categorizing advanced filtering allows viewing logs related certain subsystem issue certain component events also directly associated tasks via redesigned event viewer windows error reporting improved significantly windows vista importantly new set public apis created reporting failures application crashes hangs developers create custom reports customize reporting user interface new apis documented msdn architecture windows error reporting revamped focus reliability user experience wer report errors even process bad state example process encountered stack exhaustions peb/teb corruptions heap corruptions etc windows xp process terminated silently without generating error report conditions new feature called problem reports solutions also added control panel applet keeps record system application errors issues well presents probable solutions problems remote desktop protocol 6.0 incorporates support application-level remoting improved security tls 1.0 support connections via ssl gateway improved remoting devices support .net remoting including support remoting windows presentation foundation applications wmi scripting 32-bit color support dual-monitor support network level authentication remote assistance helps troubleshooting remotely full-fledged standalone application use help support center windows messenger based windows desktop sharing api two administrators connect remote computer simultaneously also session automatically reconnects restarting computer also supports session pausing built-in diagnostics xml-based logging reworked use less bandwidth low-speed connections nat traversals also supported session established even user behind nat device remote assistance configurable using group policy supports command-line switches custom shortcuts deployed windows vista also includes windows remote management winrm microsoft ’ implementation ws-management standard allows remote computers easily managed soap-based web service winrm allows obtaining data including wmi management information local remote computers running windows xp windows server 2003 winrm installed computers windows server 2008 ws-management protocol implementations operating systems using winrm scripting objects along compatible command-line tools winrm winrs allows administrators remotely run management scripts winrm session authenticated minimize security risks windows vista includes microsoft management console 3.0 mmc introduced several enhancements including support writing .net snap-ins using windows forms running multiple tasks parallel addition snap-ins present ui different thread operation runs thus keeping snap-in responsive even computationally intensive task new mmc interface includes support better graphics well featuring task pane shows actions available snap-in selected task scheduler windows firewall also thoroughly configurable management console print management enables centralized installation management printers organization allows installation network-attached printers group clients simultaneously provides continually updated status information printers print servers also supports finding printers needing operator attention filtering display printers based error conditions out-of-paper also send e-mail notifications run scripts printer encounters error condition windows vista includes around 2400 group policy settings allow administrators specify configuration connected groups computers especially domain windows vista supports multiple local group policy objects allows setting different levels local group policy individual users new xml based policy definition file format known admx introduced admx files contain configuration settings individual group policy objects gpo domain based gpos admx files centrally stored computers domain retrieve configure using file replication service used replicate files configured system remote location group policy service longer attached winlogon service rather runs service group policy event messages logged system event log group policy uses network location awareness refresh policy configuration soon network configuration change detected new categories policy settings include power management device installations security settings internet explorer settings printer settings among others group policy settings also need used enable two way communication filtering windows firewall default enables incoming data filtering printer settings used install printers based network location whenever user connects different network available printers updated new network group policy settings specify printer available network also printer settings used allow standard users install printers group policy also used specifying quality service qos settings device installation settings used prevent users connecting external storage devices means prevent data theft windows vista improves folder redirection introducing ability independently redirect 10 user profile sub-folders network location windows xp application data desktop documents pictures start menu folders redirected file server also management console snap-in windows vista allow users configure folder redirection clients running windows vista windows xp windows 2000 redesigned task scheduler based management console used automate management configuration tasks already number preconfigured system-level tasks scheduled run various times addition time-based triggers task scheduler also supports calendar event-based triggers starting task particular event logged event log even multiple events occurred also several tasks triggered event configured run either simultaneously pre-determined chained sequence series actions instead create multiple scheduled tasks tasks also configured run based system status idle pre-configured amount time startup logoff specified time tasks triggered xpath expression filtering events windows event log tasks also delayed specified time triggering event occurred repeat event occurs actions need done task fails also configured several actions defined across various categories applications components task scheduler keeps history log execution details tasks features task scheduler include several new command-line tools included windows vista several existing tools also updated tools windows resource kit built-in operating system services unix renamed subsystem unix-based applications included enterprise ultimate editions windows vista network file system nfsv3 client support also included however utilities sdk required downloaded separately also server components sfu product line namely server nfs user name mapping server nis password synchronization etc included windows vista supports scripting automation capabilities using windows powershell object-oriented command-line shell released microsoft included operating system also wmi classes expose controllable features operating system accessed scripting languages 13 new wmi providers included addition dhtml coupled scripting languages even powershell used create desktop gadgets gadgets also created configuration various aspects system | [
1812,
2631,
5637,
1534,
6885,
2380,
2999,
6264,
644,
6986,
8183,
5480,
6991,
1840,
1097,
1281,
8095,
4880,
222,
930,
5850,
7564,
2326,
8118,
422,
2508,
432,
2885,
1418,
7688,
2530,
7315,
6684,
7508,
4464
] | Test |
6,619 | 5 | Van_Jacobson_TCP/IP_Header_Compression:van jacobson tcp/ip header compression van jacobson tcp/ip header compression data compression protocol described rfc 1144 specifically designed van jacobson improve tcp/ip performance slow serial links van jacobson compression reduces normal 40 byte tcp/ip packet headers 3-4 bytes average case saving state tcp connections ends link sending differences header fields change makes big difference interactive performance low speed links although anything processing delay inherent dialup modems van jacobson header compression also vj compression header compression option versions ppp versions serial line internet protocol slip vj compression often called cslip compressed slip | [
709,
5880,
6015,
3855,
6044
] | Test |
6,620 | 2 | Unix_philosophy:unix philosophy unix philosophy originated ken thompson set cultural norms philosophical approaches minimalist modular software development based experience leading developers unix operating system early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy unix philosophy emphasizes building simple short clear modular extensible code easily maintained repurposed developers creators unix philosophy favors composability opposed monolithic design unix philosophy documented doug mcilroy bell system technical journal 1978 later summarized peter h. salus quarter-century unix 1994 award-winning unix paper 1974 ritchie thompson quote following design considerations preface 1984 book unix programming environment brian kernighan rob pike bell labs give brief description unix design unix philosophy authors write goal book communicate unix programming philosophy october 1984 brian kernighan rob pike published paper called program design unix environment paper criticize accretion program options features found newer unix systems 4.2bsd system v explain unix philosophy software tools performing one general function authors contrast unix tools cat larger program suites used systems mcilroy head bell labs computing sciences research center inventor unix pipe summarized unix philosophy follows beyond statements also emphasized simplicity minimalism unix programming conversely mcilroy criticized modern linux software bloat remarking adoring admirers fed linux goodies disheartening state obesity contrasts earlier approach taken bell labs developing revising research unix stated mcilroy generally accepted throughout unix community unix programs always expected follow concept dotadiw one thing well limited sources acronym dotadiw internet discussed length development packaging new operating systems especially linux community patrick volkerding project lead slackware linux invoked design principle criticism systemd architecture stating attempting control services sockets devices mounts etc. within one daemon flies face unix concept one thing well book art unix programming first published 2003 eric s. raymond american programmer open source advocate summarizes unix philosophy kiss principle keep simple stupid provides series design rules 1994 mike gancarz member team designed x window system drew experience unix well discussions fellow programmers people fields depended unix produce unix philosophy sums nine paramount precepts richard p. gabriel suggests key advantage unix embodied design philosophy termed worse better simplicity interface implementation important attributes system—including correctness consistency completeness gabriel argues design style key evolutionary advantages though questions quality results example early days unix used monolithic kernel means user processes carried kernel system calls user stack signal delivered process blocked long-term i/o kernel done signal delayed possibly long time maybe indefinitely i/o completed signal handler could executed process kernel mode sensitive kernel data stack kernel back-out system call store replay restart later assuming signal handler completes successfully cases ken thompson dennis ritchie favored simplicity perfection unix system would occasionally return early system call error stating done nothing—the interrupted system call error number 4 codice_1 today systems course call aborted order call signal handler could happen handful long-running system calls codice_2 codice_3 codice_4 codice_5 plus side made i/o system many times simpler design understand vast majority user programs never affected handle experience signals codice_6 would die right away one raised programs—things like shells text editors respond job control key presses—small wrappers could added system calls retry call right away codice_1 error raised thus problem solved simple manner 1981 article entitled truth unix user interface horrid published datamation norman criticized design philosophy unix lack concern user interface writing background cognitive science perspective then-current philosophy cognitive engineering focused end users comprehend form personal cognitive model systems -- case unix fail understand result disastrous mistakes losing hour worth work easy | [
462,
7246,
1837,
5566,
6624,
5571,
5931,
658,
578,
5232,
493,
6470,
5597,
336,
7396,
4447,
863,
169,
3236
] | Validation |
6,621 | 3 | PlayStation_Now:playstation playstation ps cloud gaming subscription service developed sony interactive entertainment service allows members stream playstation 2 playstation 3 playstation 4 games playstation 4 pc playstation 2 playstation 4 games also available download playstation 4 non-playstation devices need dualshock 3 4 xinput-compatible controller xbox game pad use service members intend stream games sony recommends players 5 mbps internet connection achieve good performance playstation announced january 7 2014 2014 consumer electronics show ces sony presented demos last us puppeteer playable ps bravia tvs playstation vita closed beta began united states january 28 ps3 may 19 extended ps4 implement service sony created single motherboard equivalent 8 ps3 console units server rack allow games function opposed software emulation due architectural complexity playstation launched open beta united states canada ps4 july 31 2014 ps3 september 18 2014 ps vita ps tv october 14 2014 support select 2014 bravia tvs coming later year gamescom 2014 sce announced ps would arrive europe 2015 united kingdom first european country access service december 24 2014 sony announced playstation would expand electronic brands ces 2015 sony confirmed playstation would arrive north america ps4 full release january 13 2015 march 7 2015 revealed playstation accessible europe official beta invites europe started going ps4 owners april 15 2015 february 17 2017 sony announced would discontinue playstation playstation 3 playstation vita playstation tv sony bravia televisions modeled 2013–15 sony blu-ray players samsung televisions august 15 2017 september 20 2018 sony announced users playstation 4 would able download playstation 2 playstation 4 games offered via service sony started gradually roll new feature subscribers playstation 3 games however able downloaded playstation 3 architecture different playstation 4 january 23 2019 sony announced service would launching spain italy portugal norway denmark finland sweden later year beta countries launched early february full service launched march 12 2019 currently playstation 2 playstation 3 playstation 4 games service streamed playstation 4 pc 2019 750 games available 300 available download playstation 4 new games added every month 7-day free trial three pricing options north america subscription service 19.99 one month 44.99 3 months 99.99 12 months two pricing options france germany belgium netherlands luxembourg €14.99 one month €99.99 12 months playstation includes access online multiplayer playstation 3 playstation 4 games playstation currently available austria belgium canada denmark finland france germany ireland italy japan luxembourg netherlands norway portugal spain sweden switzerland united states qatar united kingdom | [
7232,
450,
6330,
2177,
7962,
7514,
4759,
4761,
7619,
7169,
4408,
5386,
481,
6440,
746,
7014,
4839,
3559,
2233,
4718,
602,
2873,
424,
253,
163,
6312,
4011,
4911,
5446,
4748
] | Test |
6,622 | 5 | Collaber:collaber collaber collaboration software built eclipse software rcp collaber features include file sharing task management shared calendar group discussion contains tools like address book backup tool calendar chat discussion database file tool tasks notepad picture polls shared folder wiki web links tool collaber 1.1 released completely new architecture enable users download account information anywhere device functionality collaber appears similar microsoft groove unlike groove limited microsoft windows platform collaber supported microsoft windows mac os x linux even though originally designed p2p architecture similar microsoft groove switched client server model appears better reliability compared p2p model collaber client automatically synchronized collaber server connects internet changes done workspace sent members synchronized users collaber install number systems installations always stay sync see data system without manual intervention concept workspace core working collaber users create workspace workspace 15 built tools tools data inside tool shared members workspace collaber developed vimukti technologies based hyderabad india | [
6025,
1737,
3915,
578,
4759,
4896,
1172
] | Validation |
6,623 | 3 | Realms_of_Darkness:realms darkness realms darkness fantasy video game developed strategic simulations released 1986 developed apple ii commodore 64 object game completion seven different quests 30 dungeon levels exploration several cities shops wilderness areas ssi sold 9,022 copies realms darkness north america computer gaming world called game moderate interest described graphics quests puzzles mediocre stated game might suitable beginner computer rpgs compute called realms darkness well-planned product several interesting features previously implemented fantasy game fantasy gamers want take look game reviewed 1987 dragon 122 patricia lesser role computers column lesser felt game combines excitement danger menu-driven fantasy role-playing game flexibility thought-provoking requirements text-adventure game game revisited dragon 124 reviewers stated realms darkness enjoyable despite mediocre graphics ’ immerse secrets many many hours | [] | Validation |
6,624 | 5 | Zephyr_(protocol):zephyr protocol created mit part project athena zephyr designed instant messaging protocol application-suite heavy unix background using one thing well philosophy unix made several separate programs working together make complete messaging system zephyr irc first widely used ip-based instant-messaging systems zephyr invention ciarán anthony dellafera time employee digital equipment corporation visiting research scientist project athena design originated solution reverse remote procedure call rpc problem service providers servers client–server system locate communicate service users initial concept emerged conversations ciarán michael r. gretzinger another systems engineer project athena early 1986 mid late 1986 ciarán distilled problem two specific issues ability locate users distributed computing environment known today presence detection ability deliver scalable light-weight authentic messages distributed computing environment zephyr development team mark w. eichin robert s. french david c. jedlinsky john t. kohl william e. sommerfeld responsible creation initial code-base subsequent releases issued throughout late 1980s zephyr still use today university environments carnegie mellon iowa state university maryland college park brown university mit largely replaced modern popular instant messenger systems xmpp mit currently operates zephyr xmpp zephyr uses udp datagrams sent ports 2102 2103 2104 incompatible routers nat reports internal ip address returning datagrams incorrectly routed sites deployed zephyr using kerberos 4 authentication exclusively though late 2007 sites including iowa state deployed zephyr using kerberos 5 | [
7148,
2450,
3762,
456,
3350,
6879,
7967,
2281,
6521,
6976,
2555,
3775,
2284,
3855,
2644,
7170,
2201,
6620,
6531,
1462,
2650,
1369,
7637,
6629,
2119,
6908,
1014,
7091,
2219,
3383,
3640,
3797,
4337,
4887,
2043,
1958,
1210,
2048,
3312,
2057,... | Test |
6,625 | 4 | Collaboration-oriented_architecture:collaboration-oriented architecture collaboration oriented architecture coa computer system designed collaborate use services systems outside operators control collaboration oriented architecture often use service oriented architecture deliver technical framework collaboration oriented architecture ability collaborate systems based jericho forum principles commandments bill gates craig mundie microsoft clearly articulated need people work outside organizations secure collaborative manner opening keynote rsa security conference february 2007 successful implementation collaboration oriented architecture implies ability successfully inter-work securely internet typically mean resolution problems come de-perimeterisation term collaboration oriented architectures defined developed meeting jericho forum meeting held hsbc 6 july 2007 key elements qualify security architecture collaboration oriented architecture follows working collaborative multi-sourced environment implies need authentication authorization accountability must interoperate exchange outside locus area control | [
6346,
6870,
6941
] | Test |
6,626 | 3 | King_&_Balloon:king amp balloon player controls two green men orange cannon stationed parapet castle fires fleet hot-air balloons cannon king moves slowly back forth ground balloons return fire dive toward balloon reaches ground sit king walks time lifts player must shoot balloon free king parachute safely ground times two diving balloons combine form single larger one awards extra points splits apart hit cannon destroyed collision balloons shots replaced brief delay effect number remaining lives one life lost whenever balloon carries king top screen game ends lives lost galaxian round number stops increasing round 48 king speaks captured help rescued thank carried away bye bye balloons make droning sound aliens galaxian released previous year cannon shots also make sound player ship galaxip game original japanese version game king speaks english heavy japanese accent saying herupu help sankyū thank baibai bye bye u.s. version game features different voice king without japanese accent rare glitch game psp port game namco museum battle collection sometimes glitch happen overlapping continue option repeatedly reaches level 72 far away limit press 1p start glitch level 72 game encounter glitch rendering high score z another glitch features split second opening animation play level resulting blank screen copyright info level ca n't played sounds repeated synth drone must press start quit game quitting level 72 king balloon later featured namco museum encore playstation japan-only release made north american console debut namco museum battle collection psp player could choose king voice original japanese later u.s. version unlocking manic settings also appeared namco museum virtual arcade xbox 360 well namco museum megamix wii | [
8052,
6234,
1237,
7179
] | Test |
6,627 | 4 | Lincoln_D._Faurer:lincoln d. faurer lieutenant general lincoln d. faurer february 7 1928 – november 7 2014 united states air force officer served director national security agency chief central security service 1981 1985 faurer born february 7 1928 medford massachusetts graduated central high school philadelphia 1945 attended cornell university graduated united states military academy west point new york 1950 bachelor science degree commission second lieutenant received master science degree engineering management rensselaer polytechnic institute new york 1964 faurer completed national war college fort lesley j. mcnair washington d.c. 1968 concurrently earned master degree international affairs george washington university also washington d.c. graduation united states military academy faurer attended flying schools goodfellow air force base texas vance air force base oklahoma received pilot wings august 1951 completed b-29 pilot training randolph air force base texas january 1952 assigned 308th bombardment wing forbes air force base kansas may 1952 moved wing hunter air force base georgia april 1953 september 1955 faurer flew weather reconnaissance flights wb-29s 56th weather reconnaissance squadron yokota air base japan aerial observer training james connally air force base texas faurer returned forbes air force base may 1956 rb-47 aircraft commander 320th strategic reconnaissance squadron may 1958 transferred headquarters 90th strategic reconnaissance wing also forbes chief training procedures section faurer began career missile space fields august 1959 assigned headquarters 2nd air force barksdale air force base louisiana serving successively operations officer missile section guided missiles operations officer chief missile branch training division directorate operations barksdale associated 2nd air force growing inventory intercontinental ballistic missiles atlas e f titan ii minuteman i. faurer attended graduate engineer management program rensselaer polytechnic institute june 1963 july 1964 graduation assigned defense intelligence agency washington d.c. directorate scientific technical intelligence served technical intelligence officer development engineer later chief space systems division missiles space office july 1967 upon graduation national war college july 1968 faurer named director current operations 14th aerospace force ent air force base colorado served commander 16th surveillance squadron shemya air force base alaska august 1969 september 1970 appointed commander 71st missile warning wing mcguire air force base new jersey faurer assigned director j-2 united states southern command canal zone july 1971 june 1973 transferred headquarters u.s. air force washington d.c. duty deputy assistant chief staff intelligence may 1974 faurer returned defense intelligence agency deputy director intelligence july 1976 became vice director production assigned director j-2 u.s. european command vaihingen west germany august 1977 moved brussels belgium august 1979 deputy chairman north atlantic treaty organization military committee became director national security agency april 1981 faurer military decorations awards include air force distinguished service medal defense superior service medal oak leaf cluster legion merit meritorious service medal joint service commendation medal oak leaf cluster air force commendation medal oak leaf cluster faurer also presented national intelligence medal achievement recognition service national intelligence community faurer promoted lieutenant general september 1 1979 date rank retired april 1 1985 faurer president corporation open systems not-for-profit industry research center promotion osi isdn international communications standards 1986 1991 served chairman association intelligence officers consults national security issues 1990s linc faurer also served board directors aegis research corporation rosslyn later falls church virginia chairman board directors national cryptologic museum foundation october 2014 faurer died november 7 2014 buried arlington national cemetery | [
4210,
820,
1278,
3716,
4429,
7917,
5412,
5767,
5509,
4988,
2343,
4996,
1701,
4201
] | Test |
6,628 | 4 | George_Hotz:george hotz george francis hotz born october 2 1989 alias geohot american hacker creative consumer known unlocking iphone allowing phone used wireless carriers contrary apple intentions developed limera1n jailbreak tool bootrom exploit ios also noted technical efforts publicity reverse engineering playstation 3 video game console subsequently sued settling sony september 2015 working vehicle automation machine learning company comma.ai attended bergen county academies magnet public high school hackensack new jersey attended academy engineering design technology hotz alumnus johns hopkins center talented youth program hotz also briefly attended rochester institute technology carnegie mellon university august 2007 seventeen-year-old george hotz became first person reported carrier-unlock iphone according hotz blog traded second unlocked 8 gb iphone terry daidone founder certicell nissan 350z three 8 gb iphones september 2007 anonymous group achieved software-only unlocking method complement hotz hardware-based unlocking method july 13 2010 hotz announced discontinuation jailbreaking activities citing demotivation technology unwanted personal attention nevertheless continued release new software-based jailbreak techniques october 2010 december 2009 hotz announced initial intentions breach security sony playstation 3 five weeks later january 22 2010 announced performed first theoretical achievement consists initial read write access machine system memory well hypervisor level access machine cpu january 26 2010 hotz released exploit public march 28 2010 sony responded announcing intention release playstation 3 firmware update would remove otheros feature models feature already absent newer slim revisions machine july 13 2010 never achieved method reading installing modifying software ps3 hotz posted message twitter account stating abandoned efforts trying crack ps3 due system security extreme difficulty december 29 2010 notable hacking group fail0verflow known reverse engineering security models found consumer electronics devices performed academic presentation 27th chaos communications congress technical conference accomplishments playstation 3 presented methods 'd devised successfully penetrated device security model yielding root signing encryption keys keys essential element full even minimally usable breach capable installing running new software playstation 3 unit january 2 2011 hotz posted copy root keys playstation 3 website keys later removed website result legal action sony fail0verflow hotz response continued publication ps3 exploit information sony filed january 11 2011 application temporary restraining order tro us district court northern california january 14 2011 hotz appeared interview g4 loop explained involvement playstation 3 root keys console published sony initiated litigation george hotz predecessor playstation 3 hacking group known fail0verflow hotz published commentary case including song disaster sony sony turn demanded social media sites including youtube hand ip addresses people visited geohot social pages videos latter case watched video 'documents reproducing records usernames ip addresses posted published comments response video paypal granted sony access geohot paypal account judge case granted sony permission view ip addresses everyone visited geohot.com april 2011 revealed sony hotz settled lawsuit court condition hotz would never resume hacking work sony products end april 2011 anonymous hacker broke playstation network stole personal information 77 million users hotz denied responsibility attack said running homebrew exploring security devices cool hacking someone else server stealing databases user info cool led 2011 playstation network incident time sony aware compromised accounts system june 2014 hotz published root exploit software hack samsung galaxy s5 devices used us market exploit built around linux kernel cve-2014-3153 discovered hacker pinkie pie involves issue futex subsystem turn allows privilege escalation exploit known towelroot designated one-click android rooting tool hacking community designed installed quickly like app rooting hacks typically uploaded nearby pc cable necessitated rebooting device special set key presses although originally released verizon galaxy s5 root exploit made compatible android devices available time example tested found work galaxy s5 nexus 5 galaxy s4 active updates continued applied root exploit increase capabilities devices running android updates android operating system closed source exploit samsung officially responded towelroot exploit releasing updated software designed immune exploit addition made meaningful side income public donations solicited exploits hotz employed facebook google june 27 2011 zdnet freelance reporter emil protalinski reported according facebook spokesman hotz hired company unknown role however according cnet article actually employed since may confirmed facebook january 2012 hotz longer employed facebook july 16 2014 google hired hotz work software security auditing team called project zero hopes find zero-day vulnerabilities nsa hotz worked project zero 5 months developed qira open source program dynamically analysing application binaries january 2015 vicarious.com hired hotz develop ai algorithms worked 7 months hotz founded ai startup comma.ai september 2015 interview bloomberg hotz revealed company building vehicular automation technology based artificial intelligence algorithms hotz built working self-driving 2016 acura ilx demonstrated i-280 video resulting cease desist letter california department motor vehicles hotz wanted sell technology tesla motors meeting ceo elon musk tesla later released statement website citing corrections bloomberg article stressing autopilot system developed in-house vision chip component mobileye instead one separate autopilot system manufactured mobileye suggested bloomberg reporter ashlee vance tesla ceo elon musk offered advice hotz self-driving car project december 2015 interview october 27 2016 nhtsa informed hotz product legally required comply federal motor vehicle safety standards requested information would confirm compliance day later george hotz tweeted shenzhen comma one cancelled kristen lee stated jalopnik nhtsa simply trying open dialog commented instead got worst attitude possible silicon valley try regulate us thought leaders ’ take ball go home comma.ai open sourced self driving car software called openpilot november 30 2016 emphasizing intended use research without warranty september 14th 2018 comma.ai announced hotz would become head research team project appointed riccardo biasini new ceo company left march 2019 returned may 2019 become president hotz finalist 2004 isef competition portland oregon project mapping robot recognition included interviews today show larry king hotz finalist 2005 isef competition project googler continuing robots hotz competed school highly successful titanium knights battlebots team hotz competed 2007 intel international science engineering fair science competition high school students 3d imaging project entitled want holodeck received awards prizes several categories including 20,000 intel scholarship travelled sweden speak project stockholm international youth science seminar hotz received considerable attention mainstream media including interviews today show fox cnn nbc cbs g4 abc cnbc articles several magazines newspapers websites including forbes bbc march 2008 pc world magazine listed hotz one top 10 overachievers 21 august 2013 hotz attended def con carnegie mellon plaid parliament pwning ppp ppp placed first def con capture flag ctf tournament later 2013 hotz also competed csaw 2013 working alone hotz took first place pseudonym tomcr00se august 2014 hotz competed part carnegie mellon plaid parliament pwning win def con ctf tournament second year row team also def con crack tournament south southwest 2019 hotz discussed simulation theory announced plans create church dedicated helping society break simulation | [
704,
3932,
3612,
2912,
376,
3277,
2923,
2587,
1491,
1122,
3323,
5779,
7600,
4025,
1528,
2991,
1173,
6526,
113,
481,
6904,
6541,
6194,
5141,
840,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1992,
1996,
7328,
4141,
208,
2021,
592... | Validation |
6,629 | 5 | OSCAR_protocol:oscar protocol oscar open system communication realtime aol proprietary instant messaging presence information protocol used aol aim instant messaging system icq despite name specifications protocol remain proprietary aol gone great lengths keep competitors namely microsoft xmpp cerulean studios implementing compatible clients proprietary messaging systems 2002 aol signed contract apple inc. allowing use oscar well aol code libraries ichat application allowed ichat users interact icq aim users directly deal also permitted users apple .mac service log aim network using .mac email addresses carried apple mobileme service oscar protocol used separately aol network fact aol expands general concept oscar adding systems service side buddy lists icons well features file transfers using bonjour march 6 2006 aol released aim sdk launched developer website allowing developers build plugins aim triton build custom clients connect oscar protocol point however released information protocol march 5 2008 aol released portions oscar protocol documentation google also provided ability sign aim network via google talk client built gmail packets sent oscar encapsulated manner 16-bit integers sent network unsigned big endian see endianness 32-bit integers 8-bit integers bytes special frame layer protocol flap container encloses every packet carries information packet size channel number sequence within almost every packet sent channel 2 packets contain snac simple network atomic communication always either one zero contained packet therefore contain need length | [
7148,
2450,
3762,
5983,
3350,
7967,
2555,
2284,
7170,
2201,
6624,
1369,
1014,
7093,
4337,
6029,
4887,
1958,
1210,
2048,
3050,
2880,
4634,
6668,
3151,
5965,
5535,
1435
] | Test |
6,630 | 2 | Xenocara:xenocara xenocara openbsd build infrastructure project customised x.org server utilises dedicated _x11 user default drop privileges perform privilege separation accordance openbsd least privilege policy patches applying rather important security protection provided upstream benefit unix-like systems linux however care apply maintain unfortunately happened date release 6.9 x.org used imake recent modularised versions switched gnu autotools xenocara uses bsd make designed ease building maintenance modularised x.org within openbsd cvs tree first appeared openbsd 4.2 released openbsd different build system repositories x cvs since completely retired favour xenocara apart x.org xenocara builds several projects including window managers fvwm cwm | [
1155,
6414,
2001,
2453,
191,
5373,
3106,
5571,
1572,
1394,
7752,
3572,
4990,
1133,
2883,
1245,
6242
] | Test |
6,631 | 8 | Influenster:influenster influenster product discovery reviews platform consumers influenster uses social media analytics measure users ’ influence social media influenster launched 2010 ios app influenster launched 2014 android app launched 2015 january 2018 influenster community consists 4 million users influenster platform consisting 11 million reviews 880,000 new reviews generated month products represent 100k consumer brands 1.7 million product pages users review ask/answer questions upload photos/videos based user impact score supplied demographic information invited influenster campaigns influenster runs variety different types campaigns generally involve sending invited users complimentary product service sample discuss social media sampling user asked complete final market-research survey influenster offers coupons offers partner retailers brands users access product discovery experience platform uses facebook twitter instagram youtube tumblr foursquare google+ multi-platform blog widget friend referrals determine impact score impact points largely calculated based number followers friends user given social network influenster allows users unlock expert lifestyle badges completing survey questions interests behaviors writing reviews products answering users questions sharing influenster product pages across social media channels badges part gamification system reward specific types users invites specific influenster campaigns matching demographic primary business model influenster involves brands working influenster voxbox virtualvox campaigns voxbox virtualvox campaigns brands offer complimentary products digital rewards influenster users meet brand product-specific criteria 2016 influenster raised 8 million financing ebates leading online cashback shopping service | [] | Test |
6,632 | 0 | Aravind_Joshi:aravind joshi aravind krishna joshi august 5 1929 – december 31 2017 henry salvatori professor computer cognitive science computer science department university pennsylvania joshi defined tree-adjoining grammar formalism often used computational linguistics natural language processing joshi studied pune university indian institute science awarded electrical engineering diisc communication engineering respectively joshi graduate work done electrical engineering department university pennsylvania awarded phd 1960 became professor penn co-founder co-director institute research cognitive science april 21 2005 joshi awarded franklin institute benjamin franklin medal computer cognitive science franklin institute citation states awarded medal fundamental contributions understanding language represented mind developing techniques enable computers process efficiently wide range human languages advances led new methods computer translation | [
1314,
5429,
5388,
1243
] | Test |
6,633 | 4 | Rogue_DHCP:rogue dhcp rogue dhcp server dhcp server network administrative control network staff network device modem router connected network user may either unaware consequences actions may knowingly using network attacks man middle kind computer viruses malicious software found set rogue dhcp especially classified category clients connect network rogue legal dhcp server offer ip addresses well default gateway dns servers wins servers among others information provided rogue dhcp differs real one clients accepting ip addresses may experience network access problems including speed issues well inability reach hosts incorrect ip network gateway addition rogue dhcp set provide default gateway ip address machine controlled misbehaving user sniff traffic sent clients networks violating network security policies well user privacy see man middle vmware virtual machine software also act rogue dhcp server inadvertently run client machine joined network vmware act rogue dhcp server handing random ip addresses clients around network end result large portions network cut internet rest domain without access rogue dhcp servers stopped means intrusion detection systems appropriate signatures well multilayer switches configured drop packets one common methods deal rogue dhcp servers called dhcp snooping dhcp snooping drops dhcp messages dhcp server trusted rogue dhcp servers detected using software manual examination perusing scapy package python | [
768,
44,
2119,
2914,
4509,
3680,
3426
] | Test |
6,634 | 2 | Virtual_DOS_machine:virtual dos machine virtual dos machines vdm refer technology allows running 16-bit/32-bit dos 16-bit windows programs already another operating system running controlling hardware virtual dos machines operate either exclusively typical software emulation methods e.g dynamic recompilation rely virtual 8086 mode intel 80386 processor allows real mode 8086 software run controlled environment catching operations involve accessing protected hardware forwarding normal operating system exceptions operating system perform emulation resume execution dos software vdms generally also implement support running 16- 32-bit protected mode software dos extenders conform dos protected mode interface dpmi dos program running inside vdm needs access peripheral windows either allow directly rarely present dos program virtual device driver vdd emulates hardware using operating system functions vdm systematically emulations intel 8259a interrupt controllers 8254 timer chips 8237 dma controller etc january 1985 digital research together intel previewed concurrent dos 286 1.0 version concurrent dos capable running real mode dos programs 80286 protected mode method devised b-1 stepping processor chips however may 1985 stopped working c-1 subsequent processor steppings shortly digital research release product although e-1 stepping intel started address issues august 1985 digital research 8086 emulation mode worked utilizing undocumented loadall processor instruction slow practical microcode changes e-2 stepping improved speed early implementation seen predecessor actual virtual dos machines eventually concurrent dos 286 reworked potential desktop operating system become flexos 286 industrial use 1986 also licenced ibm 4680 os 1986 intel 80386 virtual 8086 mode became available samples since october 1985 quantities since june 1986 digital research switched use run real mode dos programs virtual dos machines protected mode concurrent dos 386 1.0 february 1987 flexos 386 1.0 june 1987 however architecture multiuser multitasking protected mode operating systems dos-based concurrent dos 386 later developed become multiuser dos since 1991 real/32 since 1995 flexos 386 later became 4690 os 1993 contrast protected mode operating systems dos default real-mode operating system switching protected mode virtual 86 mode behalf memory managers dos extenders order provide access extended memory map memory first megabyte accessible normal dos programs dos-based vdms appeared microsoft windows/386 2.01 september 1987 dos-based virtual dos machines also present windows 3.0 3.1x windows workgroups 3.1x running 386 enhanced mode well windows 95 98 98 se one characteristics solutions running top dos memory layout shown inside virtual dos machines virtual instances dos system dos driver configuration run multitasker loaded requests handled protected mode passed system domain executed underlying dos system similar windows 3.x 386 enhanced mode architecture emm386 3.xx novell dos 7 caldera opendos 7.01 dr-dos 7.02 later also uses dos-based vdms support pre-emptive multitasking multiple dos applications emm386 /multi option used component development digital research novell since 1991 codename vladivar originally separate device driver krnl386.sys instead module emm386 primarily developed next major version dr dos released novell dos 7 1994 also used never released dr dos panther star trek project 1992/1993 vdms called mvdm multiple virtual dos machine used os/2 2.0 later since 1992 os/2 mvdms considerably powerful ntvdm example block devices supported various dos versions booted os/2 mvdm os/2 1.x dos box based dos 3.0 os/2 2.x mvdms emulate dos 5.0 seamless integration windows 3.1 later win32s applications os/2 concept looking similar surface seamless integration xp mode based windows virtual pc windows 7 redirector guest vdm ntvdm allows access disks os/2 nt host applications guest use named pipes communication host ntvdm system component ia-32 editions windows nt family since 1993 allows execution 16-bit windows 16-bit 32-bit dos applications included 64-bit versions windows nt 32-bit user-mode executable forms basis single dos windows 3.x environment called ntvdm.exe order execute dos programs ntvdm loads ntio.sys turn loads ntdos.sys executes modified command.com order run application passed ntvdm command-line argument 16-bit real-mode system files stripped derivations ms-dos 5.0 equivalents io.sys msdos.sys command.com hard-wired assumptions fat file system removed using invalid opcode 0xc4 0xc4 bop 32-bit ntvdm handle requests originally ntdos reported dos version 30.00 programs soon changed report version 5.00 int 21h/ah=30h 5.50 int 21h/ax=3306h allow programs run unmodified holds true even newest releases windows many additional ms-dos functions commands introduced ms-dos versions 6.x windows 9x missing 16-bit applications run thread within single preemptively multithreaded 32-bit ntvdm process 16-bit processes default cooperatively multitasked respect unless run separate memory space option checked run box application shortcut file ntvdm emulates bios calls tables well windows 3.1 kernel 16-bit api stubs 32-bit wow translation layer thunks 16-bit api routines 32-bit dos emulation present dos protected mode interface dpmi 32-bit memory access layer converts necessary extended expanded memory calls dos functions windows nt memory calls wowexec.exe emulation layer emulates 16-bit windows windows 2000 windows xp added sound blaster 2.0 emulation 16-bit virtual device drivers dos block device drivers e.g. ram disks supported inter-process communication subsystems take place ole dde named pipes since virtual 8086 mode available non-x86-based processors specifically mips dec alpha powerpc ntvdm instead implemented full emulator versions nt using code licensed insignia softpc windows nt 3.51 80286 emulation available windows nt 4.0 486 emulation added following list commands part windows xp ms-dos subsystem january 2010 google security researcher tavis ormandy revealed serious security flaw windows nt vdm implementation allowed unprivileged users escalate privileges system level noted applicable security x86 versions windows nt kernel since 1993 included 32-bit versions windows nt 2000 xp server 2003 vista server 2008 windows 7 ormandy publish proof-of-concept exploit vulnerability prior microsoft release security patch workaround issue turn 16-bit application support prevented older programs written dos windows 3.1 running 64-bit versions windows affected since include ntvdm subsystem microsoft security patches applied affected operating systems vdm could safely reenabled limitation exists windows xp 16-bit subsystem earlier versions windows nt raised per-session limit gdi objects causes gdi handles shifted right two bits converting 32 16 bits result actual handle larger 14 bits consequently 16-bit applications happen served handle larger 16384 gdi system crash terminate error message x86-64 cpu virtual 8086 mode available sub-mode legacy mode running 16- 32-bit operating systems native 64-bit long mode ntvdm supported x86-64 windows including dos programs ntvdm uses vm86 ᴄᴘᴜ mode instead local descriptor table order enable 16‑bits segment required addressing aaarch64 microsoft ’ release full emulator incompatible instruction set like previous incompatible architecture way run use windows xp mode virtualization software use ntvdmx64 unofficial port older emulated implementation ntvdm provided nt 4 non-x86 platforms uses otvdm running 16 bits windows programs non virtualized way general vdm similar technologies satisfactorily run older dos games today computers emulation provided basic peripherals often implemented incompletely example sound emulation ntvdm limited nt-family versions windows update real screen times per second dos program writes emulate higher resolution graphics modes software mostly runs native speed host cpu timing loops expire prematurely either makes game run much fast causes software even notice emulated hardware peripherals wait long enough answer | [
4291,
5012,
4293,
7879,
2182,
3937,
6078,
3263,
378,
2198,
6096,
5743,
1475,
5396,
7553,
3978,
5055,
2226,
7195,
5410,
7564,
2953,
6840,
422,
6844,
1128,
2245,
3664,
435,
5442,
4377,
5090,
3340,
6504,
2266,
7602,
448,
6164,
4759,
1534,
... | Test |
6,635 | 3 | Manchester_United_(video_game_series):manchester united video game series manchester united football video game series licensed manchester united highly popular early 1990s game series programmed krisalis ordered release date game series programmed codemasters ordered release date | [] | Validation |
6,636 | 1 | Data_source_name:data source name computing data source name dsn sometimes known database source name though data sources comprise repositories apart databases string associated data structure used describe connection data source commonly used connection odbc dsns also exist jdbc data access mechanisms term often overlaps connection string systems make distinction dsns connection strings term often used interchangeably dsn attributes may include limited system administrator client machine generally creates separate dsn relevant data source standardizing dsns offers level indirection various applications example apache/php iis/asp take advantage accessing shared data sources two kinds dsn exist broken software e.g. crystal reports microsoft excel php perl python ruby users submit crud create read update delete queries data source establishing connection dsn asp vbscript code open dsn connection might look like following dim databaseobject1 set databaseobject1 server.createobject adodb.connection databaseobject1.open dsn=example php using pear :db package open connection without external dsn dsn-less connection i.e. using connection string code might resemble following require_once db.php // dsn driver // username password host port database dsn mysql //john pass localhost:3306/my_db db db :connect dsn php pdo dsn mysql host=localhost dbname=example dbh new pdo dsn username password perl using perl dbi module driver syntax dsn attributes requirement dbi makes information except username password supplied single string argument dsn dbi pg database=finance host=db.example.com port= port dbh dbi- connect dsn 'username 'password | [
1710,
1905,
5983,
6604,
7330,
7341,
6345,
5561,
906,
8183,
5217,
6098,
4054,
2663,
2124,
6739,
3119,
3801,
7999,
6029,
5943,
2054,
3135,
6932,
6386,
684,
6390,
7937,
7303,
6144,
6320,
1902,
6594
] | Test |
6,637 | 4 | Partitioning_cryptanalysis:partitioning cryptanalysis cryptography partitioning cryptanalysis form cryptanalysis block ciphers developed carlo harpes 1995 attack generalization linear cryptanalysis harpes originally replaced bit sums affine transformations linear cryptanalysis general balanced boolean functions demonstrated toy cipher exhibits resistance ordinary linear cryptanalysis susceptible sort partitioning cryptanalysis full generality partitioning cryptanalysis works dividing sets possible plaintexts ciphertexts efficiently-computable partitions distribution ciphertexts significantly non-uniform plaintexts chosen uniformly given block partition partitioning cryptanalysis shown effective linear cryptanalysis variants des crypton specific partitioning attack called mod n cryptanalysis uses congruence classes modulo integer partitions | [
1811,
4930,
464,
807,
1353,
2918,
3100,
119,
6015,
6016,
7548,
1283,
1480,
6647,
7200,
4805,
5765,
5327,
6657,
7928,
1587,
5333,
6763,
6049,
161,
433,
1320,
613,
1146,
4917
] | Test |
6,638 | 4 | Yosemite_Server_Backup:yosemite server backup yosemite server backup cross-platform backup software developed barracuda networks inc. acquiring yosemite technologies barracuda networks released yosemite server backup first offering barracuda ware line products yosemite server backup software gained popularity among backup administrators used many big giants world ysb runs native 32- 64-bit systems back hard disks tapes microsoft windows support includes microsoft exchange microsoft sql server active directory yosemite server backup longer stand alone package sept. 30 2017 part barracuda backup | [
644,
2390,
4759,
7715
] | Validation |
6,639 | 4 | Piggyback_attack:piggyback attack piggyback attack active form wiretapping fact attacker gains access system via intervals inactivity another user ’ legitimate connection also called “ line attack ” piggyback-entry wiretapping security piggybacking actually someone tags along another person authorized gain entry restricted area pass something apply concept computer networks workstations | [] | Test |
6,640 | 3 | Write_(system_call):write system call write one basic routines provided unix-like operating system kernel writes data buffer declared user given device maybe file primary way output data program directly using system call destination identified numeric code data written instance piece text defined pointer size given number bytes codice_1 thus takes three arguments write call interface standardized posix specification data written file calling write function function prototype syntax codice_2 codice_3 signed data type defined codice_4 note codice_5 return unsigned value returns -1 error occurs must return signed value. br write function returns number bytes successfully written array may times less specified nbytes returns -1 exceptional condition encountered see section errors listed errors could encountered writing file errors macros listed errno.h write system call ordinary function spite close resemblance example linux x86 architecture system call uses instruction int 80h order transfer control kernel write system call counterpart read low level functions capable understanding bytes write used write records like classes thus higher level input-output functions like printf required often high-level interface preferred compared cluttered low-level interface functions call functions internally turn make calls write giving rise layered assembly functions use assembly higher level functions collect bytes data write required data file | [
1710,
2361,
3843,
6264,
4771,
6984,
3626,
1281,
578,
415,
4438,
4174,
1047,
4275,
6857,
352,
2528,
174
] | Test |
6,641 | 8 | PeopleBrowsr:peoplebrowsr peoplebrowsr technology company provides enterprise government top level domain owners ability launch blockchain integrated social networks analyze engage members networks owner new tlds peoplebrowsr creator .ceo .best sold best sas july 2018 .kred peoplebrowsr works enterprise government tld owners multiple industries december 2008 launched deep search dashboard managing engaging social stream peoplebrowsr receiving analyzing indexing full twitter firehose since 2008 combination sources peoplebrowsr compiled trillion conversation datamine enables conduct analytics using kred influence measurement company combined trillion conversation datamine kred influencer analytics socialos network platform three tlds become leading social network provider organizations around world october 2011 company debuted kred measuring influence outreach social networks peoplebrowsr engaged research projects including development artificial intelligence new social networking platforms peoplebrowsr ceo jodee rich believes documenting history real time social networking platforms creating wealth data used help computers better understand human behavior way machines trained mine human data learn behavior rather taught think like humans june 2013 peoplebrowsr launched socialos set apis bridges existing networks enables new social networks rapidly rolled-out peoplebrowsr owns top level domains .ceo .kred formerly .best domains released late 2013 early 2014 powered company products socialos kred trillion conversation datamine june 2018 peoplebrowsr received approval icann internet corporation assigned names numbers sell besttld pty ltd subsidiary best sas paris based company led president cyril fremont strategic deal would leverage peoplebrowsr socialos technology besttld pty ltd owns .best top level domain distribution agreements godaddy 50 domain registrars november 2012 peoplebrowsr sued twitter proposed shutdown peoplebrowser access twitter firehose set occur november 30 2012 peoplebrowsr injunction prevent disconnection twitter firehose twitter attempted move case federal court may invalidated injunction march 2013 peoplebrowsr battle keep case within california court system thereby keeping injunction place twitter peoplebrowsr reached out-of-court settlement april 2013 | [] | Test |
6,642 | 9 | Luca_Cardelli:luca cardelli luca andrea cardelli frs italian computer scientist assistant director microsoft research cambridge uk cardelli well known research type theory operational semantics among contributions helped design modula-3 implemented first compiler non-pure functional programming language ml defined concept typeful programming helped develop polyphonic c experimental programming language born montecatini terme italy attended university pisa receiving phd university edinburgh 1982 joining microsoft research 1997 worked bell labs digital equipment corporation contributed unix software including vismon 2004 inducted fellow association computing machinery fellow royal society 2007 cardelli awarded senior aito ole-johan dahl kristen nygaard prize | [
7071,
4405,
1090,
3895,
6470,
3069,
1243,
8097,
4153,
8179
] | Test |
6,643 | 4 | Xor_DDoS:xor ddos xor ddos trojan malware hijacks windows macintosh systems uses launch ddos attacks reached loads 150+ gbps.this trojan created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data..it malicious computer program removed antiviruses like malware bytes microsoft security essentials norton mcafee webroot kaspersky sophos avast etc .it enables cyber-criminals spy steal sensitive data gain backdoor access system actions include deleting data blocking data modifying data copying data disrupting performance computers computer networks removed help windows security windows activated security blocks virus installing order gain access launches brute force attack order discover password secure shell services linux secure shell credentials acquired login successful uses root privileges run script downloads installs xor ddos believed asian origin based targets tend located asia several things noteworthy xor ddos built exclusively arm x86 systems appears programmed c/c++ | [
6459,
624,
1691,
1766,
7307,
7600,
2535,
6823
] | Validation |
6,644 | 4 | F-Secure:f-secure f-secure corporation formerly data fellows finnish cyber security privacy company based helsinki finland company 20 country offices presence 100 countries security lab operations helsinki finland kuala lumpur malaysia company develops sells antivirus password management endpoint security cyber security products services radar managed services vulnerability scanning rapid detection service flagship products company continues expand corporate market f-secure first established name data fellows petri allas risto siilasmaa 1988 data fellows trained computer users built customized databases three years later company launched first major software project developed first heuristic scanner antivirus products f-secure ’ first antivirus product windows pcs launched 1994 data fellows became f-secure 1999 f-secure first company developed anti-rootkit technology called blacklight 2005 june 2015 f-secure expanded enterprise market acquiring nsense danish company specializes security consultation vulnerability assessment purchase inverse path privately owned security italian consultancy experience avionics automative industrial control sectors february 2017 continues expansion cyber security services f-secure client security received av-test best protection award fifth time 2016 june 2018 f-secure acquired security company mwr infosecurity co-operation aalto university school science technology f-secure runs one semester course future virus analysts material available on-line media coverage magic lantern claims av vendors purposely leave backdoor products f-secure announced policy detecting spying programs f-secure corporation would like make known leave backdoors f-secure anti-virus products regardless source tools draw line every sample get regarding whether detect decision-making influenced technical factors nothing else within applicable laws regulations case meaning eu laws also adding detection program see might used terrorist activity benefit organized crime would like state record received queries regarding whether would guts detect something obviously made known violent mafia terrorist organization yes would | [
6788,
3957,
385,
1838,
4689,
6823,
7193,
5066,
1505,
7597,
88,
5452,
91,
104,
1931,
2296,
4783,
496,
5144,
142,
7287,
8014,
6576,
4456,
6589,
4115,
5546,
3089,
2733,
4492,
4138,
910,
5925,
3111,
2039,
3123,
935,
4171,
5601,
6305,
2789,
... | Test |
6,645 | 2 | Segoe:segoe segoe typeface family fonts best known use microsoft company uses segoe online printed marketing materials including recent logos number products additionally segoe ui font sub-family used numerous microsoft applications may installed applications microsoft office 2007 windows live messenger 2009 adopted microsoft default operating system font beginning windows vista also used outlook.com microsoft web-based email service august 2012 microsoft unveiled new corporate logo typeset segoe replacing logo used previous 25 years segoe name registered trademark microsoft corporation although typeface originally developed monotype segoe designed steve matteson employment agfa monotype licensed microsoft use branding typeface user interface font designed friendly legible matteson created range weights italics humanist feel 2004 microsoft registered certain segoe segoe italic fonts original font designs european union trademark design office german font foundry linotype protested citing segoe ui similarity licensed frutiger family typefaces submission eu microsoft claimed linotype failed prove selling frutiger frutiger next prior 2004 eu rejected claims february 2006 eu revoked microsoft registration microsoft appeal decision microsoft still holds united states design patents various segoe based fonts period late 2004 six years agfa corporation monotype assets acquired ta associates company incorporated monotype imaging later august 2006 monotype imaging acquired linotype end 2006 linotype company challenged validity microsoft segoe patents wholly owned subsidiary monotype company originally licensed segoe microsoft several letters distinctly different forms segoe ui frutiger reflecting segoe ui different intended use low-resolution screen display rather airport signage frutiger however ulrich stiehl asserts many differences introduced later versions segoe ui – earlier versions segoe ui closer frutiger june 7 2005 scala electronic signage company unrelated typeface ff scala announced segoe removed infochannel product due licensing issues scala replaced segoe bitstream vera fonts november 2005 simon daniels program manager microsoft typography group stated original segoe fonts created microsoft existing monotype design licensed extensively extended customized meet requirements different processes apps devices april 2006 microsoft public relations spokesman asked named stated segoe original design developed agfa monotype monotype imaging 2000 2003 acquired original segoe fonts used develop extended family fonts retaining segoe name many new fonts received design patent protection united states segoe derived frutiger microsoft also current up-to-date license allows us distribute certain frutiger fonts connection microsoft products including office windows distinct differences segoe frutiger additionally unlike clone typefaces segoe family fonts metrically compatible frutiger used replacements united states copyright law abstract letter shapes functional text fonts copyrighted computer programming code font given copyright protection makes production distribution clone fonts possible early version segoe possibly evaluation version included certain versions suse linux longer ships part operating system segoe ui member segoe family used microsoft products user interface text well online user assistance material intended improve consistency users see text across languages distinguishable predecessor tahoma os x user interface font lucida grande rounder letters segoe ui produced monotype imaging light semibold versions segoe ui introduced windows 7 windows 8 8.1 10 segoe ui undergone number changes stylistic additions windows 8.1 segoe ui gained black black italic weights latin greek cyrillic scripts segoe ui optimized vista default cleartype rendering environment significantly less legible cleartype disabled except key user interface sizes 8 9 10 point segoe ui hinted bi-level rendering standard font size increased 9 point windows vista accommodate better layout readability languages windows vista version segoe ui version 5.00 contains complete unicode 4.1 coverage latin greek cyrillic arabic romans totaling 2843 glyphs regular weight segoe ui true cursive italic unlike oblique used frutiger helvetica members segoe family include one time microsoft also posted package called print ad microsoft dynamics business management solutions brief description microsoft downloads center package included truetype postscript type 1 beta versions segoe branding fonts along powerpoint templates marketing material windows phones also include customised version called segoe wp n designed clarity narrow enhance take cleartype microsoft released selawik metric-compatible segoe ui replacement symbols segoe ui symbols segoe mdl2 assets fallback sil ofl 2015 fonts used winjs winstrap selawik also one microsoft recommended fonts universal windows platform apps latin glyphs segoe segoe ui also found following microsoft font families malgun gothic korean microsoft jhenghei traditional chinese microsoft yahei simplified chinese gisha hebrew leelawadee thai windows 7 also found ebrima n'ko tifinagh vai khmer ui khmer lao ui lao microsoft new tai lue tai lue microsoft phagspa phags-pa microsoft tai le tai le fonts glyph shapes diverge significantly segoe ui frutiger/myriad model ways calligraphic gisha leelawadee capital narrower raised apex lowercase l tails capital serifs characteristics also seen segoe ui italic | [
5011,
4759,
3180,
2917,
1832,
2920,
2927,
2931,
5837,
1029,
2680,
2499,
4089,
5871,
6580,
1052,
257
] | Test |
6,646 | 2 | Runlevel:runlevel runlevel mode operation computer operating systems implement unix system v-style initialization conventionally seven runlevels exist numbered zero six sometimes used synonym one levels one runlevel executed startup run levels executed one another i.e runlevel 2 3 4 executed sequentially order runlevel defines state machine boot different runlevels typically assigned necessarily particular order single-user mode multi-user mode without network services started multi-user mode network services started system shutdown system reboot system states exact setup configurations varies operating systems linux distributions example runlevel 4 might multi-user gui no-server configuration one distribution nothing another runlevels commonly follow general patterns described article however distributions employ certain specific configurations standard practice computer enters runlevel zero halts enters runlevel six reboots intermediate runlevels 1–5 differ terms drives mounted network services started default runlevels typically 3 4 5 lower runlevels useful maintenance emergency repairs since usually n't offer network services particular details runlevel configuration differ widely among operating systems also among system administrators various linux distributions traditional script used version 7 unix first replaced runlevels systemd states major distributions although systemd used default major linux distributions runlevels still used means provided sysvinit project linux kernel booted program reads file determine behavior runlevel unless user specifies another value kernel boot parameter system attempt enter start default runlevel systems conforming linux standard base lsb need provide exact run levels given give meanings described may map level described different level provides equivalent functionality slackware linux uses runlevel 1 maintenance linux distributions runlevels 2 3 5 identically configured console services active runlevel 4 adds x window system starting solaris 10 smf service management facility used instead svr4 run levels latter emulated preserve compatibility legacy startup scripts aix follow system v r4 svr4 runlevel specification runlevels 0 9 available well c h 0 1 reserved 2 default normal multi-user mode runlevels 3 9 free defined administrator runlevels c h allow execution processes runlevel without killing processes started another runlevels true runlevels used tell init command enter maintenance mode system enters maintenance mode another runlevel system console used terminal | [
5449,
4183,
362,
3230,
6577,
3511,
578,
5571,
971,
900,
1992,
1682
] | Test |
6,647 | 3 | AES_instruction_set:aes instruction set advanced encryption standard instruction set integrated many processors purpose instruction set improve speed well resistance side-channel attacks applications performing encryption decryption using advanced encryption standard aes often implemented instructions implementing single round aes along special version last round slightly different method aes-ni intel advanced encryption standard new instructions aes-ni first major implementation aes-ni extension x86 instruction set architecture microprocessors intel amd proposed intel march 2008 following intel processors support aes-ni instruction set several amd processors support aes instructions aes support unprivileged processor instructions also available latest sparc processors t3 t4 t5 m5 forward latest arm processors sparc t4 processor introduced 2011 user-level instructions implementing aes rounds instructions addition higher level encryption commands armv8-a processor architecture announced 2011 including arm cortex-a53 a57 previous v7 processors like cortex a5 7 8 9 11 15 also user-level instructions implement aes rounds august 2012 ibm announced then-forthcoming power7+ architecture would aes support commands architectures directly compatible aes-ni commands implement similar functionality ibm z9 later mainframe processors support aes single-opcode km kmc aes ecb/cbc instructions via ibm cryptoexpress hardware single-instruction aes versions therefore easier use intel ni ones may extended implement algorithms based aes round functions whirlpool hash function via x86 cpus amd geode marvell kirkwood arm mv_cesa linux use driver-based accelerated aes handling instead see crypto api linux following chips supporting aes hardware acceleration support aes instruction set programming information available arm architecture reference manual armv8 armv8-a architecture profile aes-ni performance analyzed patrick schmid achim roos found impressive results handful applications already optimized take advantage intel aes-ni capability performance analysis using crypto++ security library showed increase throughput approximately 28.0 cycles per byte 3.5 cycles per byte aes/gcm versus pentium 4 acceleration modern compilers emit aes instructions much security cryptography software supports aes instruction set including following core infrastructure | [
704,
1811,
3942,
2918,
1465,
7548,
3294,
742,
1480,
6458,
5055,
2226,
5760,
7200,
5765,
7928,
6133,
766,
1881,
5431,
433,
6152,
1146,
2977,
6874,
2989,
464,
807,
4765,
6173,
6523,
1937,
3717,
1961,
4805,
4077,
6563,
1587,
5165,
1590,
23... | Test |
6,648 | 5 | Mail_(Unix):mail unix mail command-line email client unix unix-like operating systems electronic mail start m. douglas mcilroy writes article research unix reader annotated excerpts programmer ’ manual 1971-1986 mail command included first released version research unix first edition unix version mail capable send append messages mailboxes users unix system helped managing reading mailbox current user 1978 kurt shoens wrote completely new version mail bsd2 referred berkeley mail although initially installed /usr/ucb/mail earlier unix mail still available /bin/mail modern unix linux systems commands mail mail and/or mailx invoke descendant berkeley mail much later base standardization mail program opengroup posix standardized variant mailx | [
361,
6789,
2817,
1537,
5480,
3106,
5571,
578,
923,
3023,
5138,
667,
5946,
2589,
6470,
5070,
4447,
3417,
6588,
6404,
4283,
4020
] | Test |
6,649 | 4 | Ntopng:ntopng ntopng computer software monitoring traffic computer network designed high-performance low-resource replacement ntop name derived ntop next generation ntopng open-source software released gnu general public license gplv3 software source code versions available operating systems unix linux bsd mac os x windows binary versions available centos ubuntu os x demo binary available windows limits analysis 2,000 packets ntopng engine written programming language c++ optional web interface written lua ntopng relies redis key-value server rather traditional database takes advantage ndpi protocol detection supports geolocation hosts able display real-time flow analysis connected hosts explanation run ntopng executable set dns mode decode dns responses resolve numeric ips use fifth network interface operate daemon mode use redis server running local host operate verbose mode | [
3368,
3915,
4759,
5571,
7848,
578
] | Test |
6,650 | 4 | Packet_capture_appliance:packet capture appliance packet capture appliance standalone device performs packet capture packet capture appliances may deployed anywhere network however commonly placed entrances network i.e internet connections front critical equipment servers containing sensitive information general packet capture appliances capture record network packets full header payload however appliances may configured capture subset network ’ traffic based user-definable filters many applications especially network forensics incident response critical conduct full packet capture though filtered packet capture may used times specific limited information gathering purposes network data packet capture appliance captures depends appliance installed network two options deploying packet capture appliances network one option connect appliance span port port mirroring network switch router second option connect appliance inline network activity along network route traverses appliance similar configuration network tap information captured stored packet capture appliance rather passing another device connected via span port packet capture appliance may receive record ethernet/ip activity ports switch router connected inline packet capture appliances captures network traffic traveling two points traffic passes cable packet capture appliance connected two general approaches deploying packet capture appliances centralized decentralized centralized approach one high-capacity high-speed packet capture appliance connects data-aggregation point advantage centralized approach one appliance gain visibility network ’ entire traffic approach however creates single point failure attractive target hackers additionally one would re-engineer network bring traffic appliance approach typically involves high costs decentralized approach place multiple appliances around network starting point entry proceeding downstream deeper network segments workgroups advantages include network re-configuration required ease deployment multiple vantage points incident response investigations scalability single point failure – one fails others combined electronic invisibility approach practically eliminates danger unauthorized access hackers low cost cons potential increased maintenance multiple appliances past packet capture appliances sparingly deployed oftentimes point entry network packet capture appliances deployed effectively various points around network conducting incident response ability see network data flow various vantage points indispensable reducing time resolution narrowing parts network ultimately affected placing packet capture appliances entry point front work group following path particular transmission deeper network would simplified much quicker additionally appliances placed front workgroups would show intranet transmissions appliance located entry point would able capture packet capture appliances come capacities ranging 500 gb 192 tb organizations extremely high network usage would use upper ranges capacities organizations would well served capacities 1 tb 4 tb good rule thumb choosing capacity allow 1 gb per day heavy users 1 gb per month regular users typical office 20 people average usage 1 tb would sufficient 1 4 years ratio 100/0 means simplex traffic real links even traffic full packet capture appliances capture record ethernet/ip activity filtered packet capture appliances capture subset traffic based set user-definable filters ip address mac address protocol unless using packet capture appliance specific purpose covered filter parameters generally best use full packet capture appliances otherwise risk missing vital data particularly using packet capture network forensics cybersecurity purposes paramount capture everything packet captured spot packet gone forever impossible know ahead time specific characteristics packets transmissions needed especially case advanced persistent threat apt apts hacking techniques rely success network administrators knowing work thus solutions place counteract intelligent packet capture uses machine learning filter reduce amount network traffic captured traditional filtered packet capture relies rules policies manually configured capture potentially malicious traffic intelligent packet capture uses machine learning models including features cyber threat intelligence feeds scientifically target capture threatening traffic machine learning techniques network intrusion detection traffic classification anomaly detection used identify potentially malicious traffic collection packet capture appliances encrypt captured data saving disk others considering breadth information travels network internet connection least portion could considered sensitive encryption good idea situations measure keep captured data secure encryption also critical element authentication data purposes data/network forensics sustained captured speed rate packet capture appliance capture record packets without interruption error long period time different peak capture rate highest speed packet capture appliance capture record packets peak capture speed maintained short period time appliance ’ buffers fill starts losing packets many packet capture appliances share peak capture speed 1 gbit/s actual sustained speeds vary significantly model model packet capture appliance permanent storage ideal network forensics permanent record-keeping purposes data captured overwritten altered deleted drawback permanent storage eventually appliance becomes full requires replacement packet capture appliances overwritable storage easier manage reach capacity start overwriting oldest captured data new however network administrators run risk losing important capture data gets overwritten general packet capture appliances overwrite capabilities useful simple monitoring testing purposes permanent record necessary permanent non-overwritable recording must network forensics information gathering businesses use gigabit ethernet speed networks continue time business intends use one centralized packet capture appliance aggregate network data would probably necessary use 10 gbe packet capture appliance handle large volume data coming network effective way use multiple 1 gbit/s inline packet capture appliances placed strategically around network need re-engineer gigabit network fit 10 gbe appliance since packet capture appliances capture store large amount data network activity including files emails communications could become attractive targets hacking packet capture appliance deployed length time incorporate security features protect recorded network data access unauthorized parties deploying packet capture appliance introduces many additional concerns security cost securing may outweigh benefits best approach would packet capture appliance built-in security features security features may include encryption methods “ hide ” appliance ’ presence network example packet capture appliances feature “ electronic invisibility ” stealthy network profile requiring using ip mac addresses though face connecting packet capture appliance via span port appears make secure packet capture appliance would ultimately still connected network order allow management data retrieval though accessible via span link appliance would accessible via management link despite benefits ability control packet capture appliance remote machine presents security issue could make appliance vulnerable packet capture appliances allow remote access robust system place protect unauthorized access one way accomplish incorporate manual disable switch toggle allows user physically disable remote access simple solution effective doubtful hacker would easy time gaining physical access appliance order flip switch final consideration physical security network security features world moot someone simply able steal packet capture appliance make copy ready access data stored encryption one best ways address concern though packet capture appliances also feature tamperproof enclosures | [
6574,
5181,
1805
] | Test |
6,651 | 0 | Pragmatic_mapping:pragmatic mapping pragmatic mapping — term current use linguistics computing cognitive psychology related fields — process given abstract predicate symbol comes associated action dynamic index particular logical object icon logical object may thing person relation event situation string conceivable level complexity relatively simple example conventional — successful appropriate mundanely “ true ” — linking proper name person conventional designation three parts process succeeds abstract symbol used represent something else name entire signifying predication instance something else represented symbol whatever signified act using symbol conventional way represent whatever usually represents act signifying pragmatic mapping process material argument imagined one comes associated predicate purports succeeds predicate must appropriate true mundane sense relative logical object predication may simple naming act complex representation consisting many distinct propositions many associated clauses instance say jesse james american outlaw name jesse james purports certain historical person may know shot another individual named robert ford may know movie featuring brad pitt jesse james released september 2007 select theaters across america pragmatic mapping name jesse james complete i.e. succeeds mapped onto certain individual actually shot robert ford nothing importance changes pragmatic mapping process turns jesse james robert ford figments someone ’ imagination excepting course truth value propositions include logical object name jesse james ordinary conversation human communication general demonstrated logically mathematically meaning utterly dependent true appropriate pragmatic mapping symbols conventional logical objects infants depend exemplification mapping relations acquire languages meaningful linguistic representations proved depend mappings | [
1314
] | Test |
6,652 | 3 | Double_fault:double fault x86 architecture double fault exception occurs processor encounters problem trying service pending interrupt exception example situation double fault would occur interrupt triggered segment interrupt handler resides invalid processor encounters problem calling double fault handler triple fault generated processor shuts double faults happen due kernel bugs rarely caused user space programs modern protected mode operating system unless program somehow gains kernel access viruses also low-level dos programs processors like powerpc sparc generally save state predefined reserved machine registers double fault situation another exception happens processor still using contents registers process exception sparc processors four levels registers i.e 4-window register system | [
6984,
5571,
1237,
4061,
352,
8066,
971,
858
] | Validation |
6,653 | 4 | Len_Sassaman:len sassaman leonard harris sassaman 1980 – july 3 2011 advocate privacy maintainer mixmaster anonymous remailer code operator randseed remailer sassaman graduated hill school 1998 sassaman employed security architect senior systems engineer anonymizer phd candidate katholieke universiteit leuven belgium researcher computer security industrial cryptography cosic research group led bart preneel david chaum bart preneel advisors sassaman well-known cypherpunk cryptographer privacy advocate worked network associates pgp encryption software member shmoo group contributor openpgp ietf working group gnu privacy guard project frequently appeared technology conferences like def con sassaman co-founder codecon along bram cohen co-founder hotpets workshop roger dingledine tor thomas heydt-benjamin co-author zimmermann–sassaman key-signing protocol age 21 organizer protests following arrest russian programmer dmitry sklyarov february 11 2006 fifth codecon sassaman proposed returning speaker noted computer scientist meredith l. patterson q presentation married couple worked together several research collaborations including critique privacy flaws olpc bitfrost security platform proposal formal methods analysis computer insecurity february 2011 meredith patterson current startup osogato aims commercialize patterson support vector machine-based query example research sassaman patterson announced osogato first product downloadable music recommendation tool superhappydevhouse 21 san francisco 2009 dan kaminsky presented joint work sassaman patterson black hat las vegas showing multiple methods attacking x.509 certificate authority infrastructure using techniques team demonstrated attacker could obtain certificate clients would treat valid domains attacker control sassaman reported died july 3 2011 patterson reported husband death suicide presentation given kaminsky 2011 black hat briefings revealed testimonial honor sassaman permanently embedded bitcoin block chain | [
1594,
1998,
363,
5773,
3486,
744
] | Test |
6,654 | 4 | Doxing:doxing doxing dox abbreviation documents doxxing internet-based practice researching broadcasting private identifying information especially personally identifying information individual organization methods employed acquire information include searching publicly available databases social media websites like facebook hacking social engineering closely related internet vigilantism hacktivism doxing may carried various reasons including aid law enforcement business analysis risk analytics extortion coercion inflicting harm harassment online shaming vigilante justice doxing neologism evolved brief history comes spelling alteration abbreviation docs documents refers compiling releasing dossier personal information someone essentially doxing revealing publicizing records individual previously private difficult obtain term dox derives slang dropping dox according wired writer mat honan old-school revenge tactic emerged hacker culture 1990s hackers operating outside law era used breach opponent anonymity means expose opponents harassment legal repercussions consequently doxing often comes negative connotation vehicle revenge via violation privacy doxware cryptovirology attack invented adam young developed moti yung carries doxing extortion via malware first presented west point 2003 attack rooted game theory originally dubbed non-zero sum games survivable malware attack summarized book malicious cryptography follows attack differs extortion attack following way extortion attack victim denied access valuable information pay get back attack presented victim retains access information disclosure discretion computer virus doxware converse ransomware ransomware attack originally called cryptoviral extortion malware encrypts victim data demands payment provide needed decryption key doxware cryptovirology attack attacker malware steals victim data threatens publish unless fee paid anyone harvest information internet individuals particular structure place doxing meaning someone may seek kind information related target basic web search yield results social media platforms like facebook twitter myspace linkedin offer wealth private information many users high levels self-disclosure i.e sharing photos place employment phone number email address low levels security also possible derive person name home address cell-phone number services reverse phone lookup social engineering used extract information government sources phone companies addition tactics doxxer may use methods harvest information include information search domain name location searching based individual ip address people exposed doxing may targeted harassment methods harassment person fake signups mail pizza deliveries swatting dispatching armed police house spoofed tips hacker may obtain individual dox without making information public hacker may look information order extort coerce known unknown target also hacker may harvest victim information order break internet accounts take social media accounts victim may also shown details proof doxed order intimidate perpetrator may use fear intimidation gain power victim order extort coerce doxing therefore standard tactic online harassment used people associated 4chan gamergate vaccine controversies ethics doxing journalists matters assert issues public interest area much controversy many authors argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes st. louis cardinals lost 1985 world series umpire denkinger became victim two st. louis disc jockeys publicly revealed telephone number home address 1990s anti-abortion activists secured abortion providers personal information home addresses phone numbers photographs posted hit list ruled courts immediate incitement violence site legend explained black font working greyed-out name wounded strikethrough fatality website included blood-dripping graphics celebrated providers deaths incited others kill injure remaining providers list 1993 2016 eight abortion providers killed anti-abortion terrorists starting march 2006 chinese internet phenomenon human flesh search engine (人肉搜索)shares much common doxing specifically refers distributed sometimes deliberately crowdsourced searches similar kinds information use digital media term dox entered mainstream public awareness media attention attracted anonymous internet-based group hacktivists pranksters make frequent use doxing well related groups like antisec lulzsec washington post described consequences innocent people incorrectly accused wrongdoing doxed nightmarish december 2011 anonymous exposed detailed information 7,000 members law enforcement response investigations hacking activities november 2014 anonymous began releasing identities members ku klux klan relation local klan members ferguson missouri making threats shoot anyone provoked protesting shooting michael brown anonymous also hijacked group twitter page resulted veiled threats violence members anonymous november 2015 major release information kkk planned discredited information released prematurely anonymous denied involvement november 5 2015 guy fawkes night anonymous released official list supposed currently unverified kkk members sympathizers following 2013 boston marathon bombing vigilantes reddit wrongly identified number people suspects notable among misidentified bombing suspects sunil tripathi student reported missing bombings took place body reported tripathi found rhode island providence river april 25 2013 reported rhode island health department cause death immediately known authorities said suspect foul play family later confirmed tripathi death result suicide reddit general manager erik martin later issued apology behavior criticizing online witch hunts dangerous speculation took place website journalists journal news westchester county new york accused doxing gun owners region story paper published december 2012 newsweek came fire writer leah mcgrath goodman claimed revealed identity anonymous creator bitcoin satoshi nakamoto though source sleuthing primarily public record heavily criticized doxing users reddit satoshi nakamoto case brought doxing greater attention particularly platforms twitter users questioned ethics doxing journalism many twitter users condemned doxing journalism wherein argued practice seemingly acceptable professional journalists wrong anyone else users discussed effect popularization concept doxing could journalism public interest raising questions journalism concerning public private figures many users argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes march 2015 former major league baseball mlb pitcher curt schilling used doxing identify several people responsible twitter troll posts obscene sexually explicit comments teenaged daughter one person suspended community college another lost part-time job new york yankees december 2015 minneapolis city councilwoman alondra cano used twitter account publish private cellphone numbers e-mail addresses critics wrote involvement black lives matter rally 2016 fox business news anchor lou dobbs revealed address phone number jessica leeds one women accused american presidential candidate donald trump inappropriate sexual advances dobbs later apologized july 2016 wikileaks released 300,000 e-mails called erdoğan emails initially thought damaging turkish president recep tayyip erdoğan included leak michael best uploaded turkish citizens personal information databases wikileaks promoted came forward say mistake site uploaded information took files removed due privacy concerns included spreadsheets private sensitive information appears every female voter 79 81 provinces turkey including home addresses private information sometimes including cellphone numbers november 2016 politico editor michael hirsh resigned publishing home address white nationalist richard b. spencer facebook july 2017 united states presidential advisory commission election integrity established may 2017 u.s. president donald trump investigate controversial allegation voter fraud published 112-page document unredacted emails public comment work included critics supporters commission commission included personal details critics names emails phone numbers home addresses commenters wrote white house expressed concern publication personal information one person writing release voter data period despite person name email address published commission act drew criticism theresa lee staff attorney american civil liberties union voting rights project stated cavalier attitude toward public personal information especially concerning given commission request sensitive data every registered voter country white house defended publication personal information noting everyone warned might happen however former deputy secretary labor chris lu stated regardless legality white house moral obligation protect sensitive data saying whether legal disclose personal information clearly improper responsible white house would federal agencies often solicit release public comments proposed legislation regulations.gov designated public comments includes detailed set guidelines explaining submit comments type personal information collected information may used stating agencies may require include personal information name email address comment form securities exchange commission instance warns commenters 'submit information wish make available publicly another agency federal trade commission tells commenters published comments include commenter last name state/country well entire text comment please include sensitive confidential information however white house appear issued public guidelines warnings many emails sent marc lotter press secretary mike pence stated public comments similar individuals appearing commission make comments providing name making comments commission ’ federal register notice asking public comments website make clear information 'including names contact information sent email address may released october 3 2018 jackson cosko house fellow democratic party arrested u.s. capitol police uscp allegedly posted private identifying information several senators wikipedia according uscp personal information republican senators lindsey graham mike lee orrin hatch anonymously posted wikipedia week thursday september 27 2018 information included home addresses phone numbers three lawmakers senate judiciary committee alleged doxing occurred hearing supreme court nominee judge brett kavanaugh cosko initially charged witness tampering threats interstate communications unauthorized access government computer identity theft second degree burglary unlawful entry cosko fired arrest worked democratic rep. sheila jackson lee d-tx sen. dianne feinstein d-calif sen. maggie hassan d-n.h. former sen. barbara boxer d-calif convicted six charges cosko faces 20 years prison june 2019 sentenced judge thomas f. hogan four years prison | [
1376,
2727,
3480,
2379,
600,
3486,
744,
2667
] | Test |
6,655 | 3 | Socket_FP3:socket fp3 socket fp3 µbga906 cpu socket laptops released june 2014 amd mobility apu products codenamed kaveri kaveri -branded products combine steamroller crystal series gcn uvd 4.2 vce 2 video acceleration amd trueaudio audio acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate fp3 package supports two different voltage levels vddp rail 1.05 v nominal setting gfx link support pci express 3.x data rate 0.95 v setting maximum data rate supported gfx link pci express 2.x desktop counterpart socket fm2+ | [
2539,
6599,
2541,
5895,
4221,
4931,
7163,
3362,
1735,
2016,
5377,
6351,
913,
7826,
4694,
2751,
6545,
6373,
1961,
5063,
6562,
6307,
3145,
4090,
866,
5436,
780,
1143,
7782
] | Test |
6,656 | 4 | City_ID:city id city id cequint first-generation caller mobile identification service city id displays city state country associated caller telephone number partnership mobile network operators city id service available many devices alltel u.s. cellular verizon wireless city state information determined referencing area code exchange npa-nxx calling party telephone number using database stored locally mobile phone database updated new area codes exchanges introduced city id application integrated firmware mobile phones providing city state country information phone application native display incoming call screen call logs outgoing call screen city state information provided city id service based area code exchange phone registered land-line phones information reliable method determining phone originating calling office switch exchange mobile phones information potentially less useful mobile phones often operate outside originally registered area code exchange area city id integrated many android devices partnership several mobile network operators service offers 15-day free trial subscription fee required continue service software pre-installed integrated firmware users remove disable unless root privileges e.g rooted phone application manager settings application used force stop application according cequint way disable city id select “ ” end free trial ends 15 days receive initial free trial notification select “ remind later ” press back end key similar action trial expired message appear incoming call 10 times please sure select “ ” upon first expiration message disable city id city id pre-installed many brew successor os brewmp devices partnership several mobile network operators brew brewmp phones usually obvious branding like android blackberry phones cheaper feature phones north america often brew-based mobile phones media center allow removal pre-installed city id application | [
4459
] | Test |
6,657 | 4 | Linear_cryptanalysis:linear cryptanalysis cryptography linear cryptanalysis general form cryptanalysis based finding affine approximations action cipher attacks developed block ciphers stream ciphers linear cryptanalysis one two widely used attacks block ciphers differential cryptanalysis discovery attributed mitsuru matsui first applied technique feal cipher matsui yamagishi 1992 subsequently matsui published attack data encryption standard des eventually leading first experimental cryptanalysis cipher reported open community matsui 1993 1994 attack des generally practical requiring 2 known plaintexts variety refinements attack suggested including using multiple linear approximations incorporating non-linear expressions leading generalized partitioning cryptanalysis evidence security linear cryptanalysis usually expected new cipher designs two parts linear cryptanalysis first construct linear equations relating plaintext ciphertext key bits high bias whose probabilities holding space possible values variables close possible 0 1 second use linear equations conjunction known plaintext-ciphertext pairs derive key bits purposes linear cryptanalysis linear equation expresses equality two expressions consist binary variables combined exclusive-or xor operation example following equation hypothetical cipher states xor sum first third plaintext bits block cipher block first ciphertext bit equal second bit key formula_1 ideal cipher linear equation relating plaintext ciphertext key bits would hold probability 1/2 since equations dealt linear cryptanalysis vary probability accurately referred linear approximations procedure constructing approximations different cipher basic type block cipher substitution-permutation network analysis concentrated primarily s-boxes nonlinear part cipher i.e operation s-box encoded linear equation small enough s-boxes possible enumerate every possible linear equation relating s-box input output bits calculate biases choose best ones linear approximations s-boxes must combined cipher actions permutation key mixing arrive linear approximations entire cipher piling-up lemma useful tool combination step also techniques iteratively improving linear approximations matsui 1994 obtained linear approximation form formula_2 apply straightforward algorithm matsui algorithm 2 using known plaintext-ciphertext pairs guess values key bits involved approximation set values key bits right-hand side referred partial key count many times approximation holds true known plaintext-ciphertext pairs call count partial key whose greatest absolute difference half number plaintext-ciphertext pairs designated likely set values key bits assumed correct partial key cause approximation hold high bias magnitude bias significant opposed magnitude probability procedure repeated linear approximations obtaining guesses values key bits number unknown key bits low enough attacked brute force | [
1811,
4930,
464,
807,
1353,
2918,
3100,
119,
6015,
7548,
1283,
6637,
1480,
6372,
6647,
7200,
4805,
5765,
5327,
7928,
1587,
5333,
6763,
6049,
161,
433,
1320,
613,
1146,
4917
] | Test |
6,658 | 2 | System_time:system time computer science computer programming system time represents computer system notion passage time sense time also includes passing days calendar system time measured system clock typically implemented simple count number ticks transpired since arbitrary starting date called epoch example unix posix-compliant systems encode system time unix time number seconds elapsed since start unix epoch 1 january 1970 00:00:00 ut exceptions leap seconds systems implement 32-bit 64-bit versions windows api windows 9x windows nt provide system time systemtime represented year/month/day/hour/minute/second/milliseconds value filetime represented count number 100-nanosecond ticks since 1 january 1601 00:00:00 ut reckoned proleptic gregorian calendar system time converted calendar time form suitable human comprehension example unix system time seconds since beginning epoch translates calendar time 9 september 2001 01:46:40 ut library subroutines handle conversions may also deal adjustments timezones daylight saving time dst leap seconds user locale settings library routines also generally provided convert calendar times system times closely related system time process time count total cpu time consumed executing process may split user system cpu time representing time spent executing user code system kernel code respectively process times tally cpu instructions clock cycles generally direct correlation wall time file systems keep track times files created modified and/or accessed storing timestamps file control block inode file directory first-generation personal computers keep track dates times included systems ran cp/m operating system well early models apple ii bbc micro commodore pet among others add-on peripheral boards included real-time clock chips on-board battery back-up available ibm pc xt ibm first widely available pc came equipped date/time hardware built motherboard prior widespread availability computer networks personal computer systems track system time respect local time make allowances different time zones current technology modern computers keep track local civil time many household personal devices vcrs dvrs cable tv receivers pdas pagers cell phones fax machines telephone answering machines cameras camcorders central air conditioners microwave ovens microcontrollers operating within embedded systems raspberry pi arduino similar systems always internal hardware keep track time many controller systems operate without knowledge external time require information typically initialize base time upon rebooting obtaining current time external source time server external clock prompting user manually enter current time system clock typically implemented programmable interval timer periodically interrupts cpu starts executing timer interrupt service routine routine typically adds one tick system clock simple counter handles periodic housekeeping tasks preemption etc returning task cpu executing interruption following tables illustrate methods retrieving system time various operating systems programming languages applications values marked system-dependent may differ across implementations dates given gregorian proleptic gregorian calendar dates note resolution implementation measurement time imply precision measurements example system might return current time value measured microseconds actually capable discerning individual clock ticks frequency 100 hz 10 ms | [
1710,
361,
2451,
5983,
3511,
4387,
4759,
1445,
6256,
993,
6428,
2740,
4946,
304,
5571,
1435,
486,
578,
1284,
6029,
5948,
1768,
2772,
3137,
2600,
3741,
7217,
5783,
1052,
5965,
1236,
4643,
7687,
2803,
4017,
2266
] | Test |
6,659 | 3 | Kathryn_S._McKinley:kathryn s. mckinley kathryn s. mckinley american computer scientist noted research compilers runtime systems computer architecture also known leadership broadening participation computing mckinely co-chair cra-w 2011 2014 mckinley received b.a computer science engineering rice university 1985 went earn m.s computer science rice university 1990 ph.d computer science rice university 1992 joined department computer science university massachusetts amherst assistant professor 1993 promoted associate professor 1999 2001 moved university texas austin associate professor 2005 promoted professor 2010 endowed professor computer science 2011 moved microsoft research principal researcher currently senior research scientist google mckinley married scotty strahan three boys cooper dylan wyatt strahan colleagues introduced first general purpose model optimization framework based dependences cache line reuse improving cache locality dense matrix algorithms using loop permutation loop reversal fusion distribution mckinley advisor ken kennedy showed use model introduce parallelism locality eliminate false sharing work selected 2014 ics 25th anniversary volume mckinley phd student emery d. berger colleagues introduced hoard c/c++ memory allocator widely used applications apple os x hoard limits contention caused multiple threads allocate free memory time avoids false sharing due memory allocation time hoard enforces provable bounds total amount fragmentation mckinley leader dacapo research group spanned nine institutions funded nsf itr 2000-2006 project produced number innovative virtual machine technologies open source tools open source benchmarks new methodologies evaluating managed runtimes benchmarking methodologies efforts led stephen m. blackburn dacapo java benchmark suite evaluation methodologies widely used academia industry evaluate java analysis optimization testing technologies blackburn cheng mckinley first perform apples-to-apples comparison garbage collection algorithms showed free-list allocators give substantial amounts locality even though require less memory compared copying algorithms allocate contemporaneous objects contiguously work sigmetrics 2014 test time award based insight blackburn mckinley designed new class garbage collectors named mark-region immix mark-region collector manages memory hierarchically using fixed sized blocks consisting lines contiguous object allocation may cross lines noblocks immix collection mixes line marking object copying single pass design delivers substantial performance benefits due smaller heap footprints improvements locality phd student michael bond received acm sigplan outstanding doctoral dissertation award 2008 february 14 2013 mckinley testified house committee science space technology subcommittee research spoke academic industry government computing research ecosystem driving innovation economic advances almost fields 2008 named acm fellow notable awards include | [
6922,
3566,
331,
2736
] | Test |
6,660 | 9 | Comparison_of_JavaScript_engines:comparison javascript engines following tables compare standards support notable javascript/ecmascript engines used web browsers see list ecmascript engines full list | [
183,
5629,
2451,
4755,
4296,
6172,
3092,
5998,
4315,
1177,
2658,
831,
7734,
313,
1016,
3719,
2040,
6368,
3559,
237,
54,
3398,
2870,
422,
6221,
340,
3663,
5172,
6400,
3584,
7687,
7505,
4287
] | Test |
6,661 | 2 | Bitnami:bitnami bitnami library installers software packages web applications development stacks well virtual appliances bitnami sponsored bitrock company founded 2003 seville spain daniel lopez ridruejo erica brescia bitnami stacks used installing software linux windows mac os x solaris vmware acquired bitnami may 15th 2019 bitnami stacks available web applications wordpress drupal joomla redmine abantecart prestashop magento mediawiki many others addition application stacks include software required run application example wordpress stack include wordpress well mysql database manage data apache web server serve pages openssl library basic cryptographic functions phpmyadmin administer mysql bitnami installers released apache license 2.0 using automated cloud computing management bitnami offers users automated application deployments open source server apps oracle cloud amazon ec2 azure google cloud platform servers since july 2009 bitnami also offers ready-to-run virtual machines contain minimal configured linux operating system bitnami offers open source applications modules xampp package developed apache friends distinct difference installation bitnami installers native installs e.g rpms debs linux installed way prevent interference existing software libraries multiple applications installed web server considerations resolving conflicts specific ports must made february 13 2009 bitnami announced release enano cms web stack unique according bitnami enano cms project stack module first externally developed february 2010 bitnami announced release bitnami cloud hosting service allows deploying bitnami stacks amazon ec2 cloud automatic monitoring backups may 15 2019 vmware announced intent acquire bitnami | [
2961,
4295,
3559,
2988,
2255,
3652,
6835,
7969,
1260,
7848,
578,
788
] | Test |
6,662 | 2 | Bank_switching:bank switching bank switching technique used computer design increase amount usable memory beyond amount directly addressable processor used configure system differently different times example rom required start system diskette could switched longer needed video game systems bank switching allowed larger games developed play existing consoles bank switching originated minicomputer systems many modern microcontrollers microprocessors use bank switching manage random-access memory non-volatile memory input-output devices system management registers small embedded systems technique common 8-bit microcomputer systems bank-switching may also used work around limitations address bus width hardware constraint prevents straightforward addition address lines control-oriented microprocessors use bank-switching technique access internal i/o control registers limits number register address bits must used every instruction unlike memory management paging data exchanged mass storage device like disk storage data remains quiescent storage memory area currently accessible processor although may accessible video display dma controller subsystems computer bank switching considered way extending address bus processor external register example processor 16-bit external address bus address 2 65536 memory locations external latch added system could used control two sets memory devices 65536 addresses could accessed processor could change set current use setting clearing latch bit latch set cleared processor several ways particular memory address may decoded used control latch processors separately-decoded i/o addresses output address may decoded several bank-switching control bits could gathered register approximately doubling available memory spaces additional bit register external bank-selecting latch register directly connected program counter processor automatically change state program counter overflows detected external latch since program counter internal register processor extra memory seamlessly available programs internal registers processor remain original length processor directly span bank-switched memory example incrementing internal register instead processor must explicitly bank-switching operation access large memory objects limitations generally bank-switching system one block program memory common banks matter bank currently active part address space one set memory locations used area would used hold code manages transitions banks also process interrupts often single database spans several banks need arises move records banks sorting one bank accessible time would necessary move byte twice first common memory area perform bank switch destination bank actually move byte destination bank computer architecture dma engine second cpu bank access restrictions differ whichever subsystem transfer data directly banks used unlike virtual memory scheme bank-switching must explicitly managed running program operating system processor hardware automatically detect data currently mapped active bank required application program must keep track memory bank holds required piece data call bank-switching routine make bank active however bank-switching access data much faster example retrieving data disk storage processors 16-bit addressing 8080 z80 6502 6809 etc commonly used early video game consoles home computers directly address 64 kb systems memory divide address space number blocks could dynamically mapped parts larger address space bank switching used achieve larger address space organizing memory separate banks 64kb blocks various sizes switched via bank select registers similar mechanisms cromemco first microcomputer manufacturer use bank switching supporting 8 banks 64kb systems using bank switching caution required order corrupt handling subroutine calls interrupts machine stack contents memory temporarily switched cpu inaccessible processor could used hardware video display dma i/o devices etc cp/m-80 3.0 released 1983 z80-based trs-80s model 4 model ii supported bank switching allow use 64k memory 8080 z80 processor could address bank switching allowed extra memory functions added computer design without expense incompatibility switching processor wider address bus example c64 used bank switching allow full 64kb ram still provide rom memory-mapped i/o well atari 130xe could allow two processors 6502 antic access separate ram banks allowing programmers make large playfields graphic objects without using memory visible cpu microcontrollers microprocessors significant input/output hardware integrated on-chip may use bank switching example access multiple configuration registers on-chip read/write memory example pic microcontroller allows short instruction words save space routine program execution cost extra instructions required access relatively infrequently used registers used system configuration start-up 1985 companies lotus intel introduced expanded memory specification ems 3.0 use ibm pc compatible computers running ms-dos microsoft joined versions 3.2 1986 4.0 1987 specification became known lotus-intel-microsoft ems lim ems form bank switching technique allows 640 kb ram defined original ibm pc architecture letting appear piecewise 64 kb window located upper memory area 64 kb divided four 16 kb pages independently switched computer games made use though ems obsolete feature nowadays emulated later microsoft windows operating systems provide backwards compatibility programs later extended memory specification xms also obsolete standard principle simulating bank switching memory 1 mb called extended memory directly addressable real mode x86 processors ms-dos runs xms allows extended memory copied anywhere conventional memory boundaries banks fixed every way works like bank switching ems perspective program uses later versions ms-dos starting circa version 5.0 included emm386 driver simulates ems memory using xms allowing programs use extended memory even written ems microsoft windows emulates xms also programs require bank switching also used video game consoles atari 2600 instance could address 4 kb rom later 2600 game cartridges contained bank switching hardware order permit use rom thus allow sophisticated games via program code equally important larger amounts game data graphics different game stages nintendo entertainment system contained modified 6502 cartridges sometimes contained megabit rom addressed via bank switching called multi-memory controller game boy cartridges used chip called mbc memory bank controller offered rom bank switching also cartridge sram bank switching even access peripherals infrared links rumble motors bank switching still used later game systems several sega mega drive cartridges 4mb size required use technique 4mb maximum address size gp2x handheld gamepark holdings uses bank switching order control start address memory offset second processor types computer video displays related technique double buffering may used improve video performance case processor updating contents one set physical memory locations video generation hardware accessing displaying contents second set processor completed update signal video display hardware swap active banks transition visible screen free artifacts distortion case processor may access memory video display hardware bank-switched parts video memory two banks video memory contain slightly different images rapidly cycling page-flipping create animation visual effects processor might otherwise slow carry directly bank switching later supplanted segmentation many 16-bit systems turn gave way paging memory management units embedded systems however bank switching still often used simplicity low cost often better adaptation contexts general purpose computing | [
4759,
8066,
5208,
5926,
5571,
4339,
6380,
1670,
4540,
5079,
2155,
5784,
7222,
1237,
4277,
352,
5087,
1992
] | Test |
6,663 | 2 | DNF_(software):dnf software dnf dandified yum next-generation version yellowdog updater modified yum package manager .rpm-based distributions dnf introduced fedora 18 default package manager fedora since version 22 perceived deficiencies yum dnf intended address include poor performance high memory usage slowness iterative dependency resolution dnf uses libsolv external dependency resolver dnf performs package management tasks top rpm supporting libraries dnf originally written python efforts way port c move functionality python code new libdnf library libdnf already used packagekit linux distribution-agnostic package system abstraction library even though library dnf features dnf default package manager fedora since version 22 released may 2015 libdnf library used package backend packagekit dnf also available alternate package manager mageia linux since version 6 may become default sometime future | [
8055,
1621,
2091,
5545,
5017,
6609,
1723,
1260,
5726,
7619,
4675,
5912,
3366,
4778,
5571,
578,
2034,
4603,
4059,
7092,
2581,
7555,
6743,
3559,
2771,
326,
2594,
5092,
4441,
1406,
1684,
952,
4991,
523,
163,
5965,
6312,
6586,
5530,
7042,
7... | Test |
6,664 | 3 | Palamedes_(video_game):palamedes video game palamedes puzzle game requiring player match dice holding dice top screen using b button player change number his/her dice throw dice using button matches dice top screen wipes target dice screen player play solitaire mode computer another player tournament mode ai opponents six sides numbers dice making attempt match numbers screen eliminating challenge ports game published nes msx fm towns game boy hot-b japan-only sequel palamedes 2 star twinkles released 1991 nes hot-b featured basic gameplay elements original play field scrolling opposite direction release famitsu magazine scored game boy version game 22 40 | [] | Test |
6,665 | 2 | Vidix:vidix vidix video interface *nix portable programming interface unix-like operating systems allows video card drivers running user space directly access framebuffer direct graphics access extension x window system nick kurshev author vidix writes motivation creating interface resolve issue reported vladimir dergachev rfc alternative kernel multimedia api dergachev noted existing multimedia interfaces hard-coded device suggested driver developers would flexibility layer abstraction vidix born alternative linux kernel-based drivers mplayer project long time vidix lived within mplayer project later lived within mplayerxp project fork mplayer kurshev time linux many unix-like operating systems lacked quality drivers video subsystems almost technical documentation video hardware non-disclosure agreements time many programmers code drivers blindly developers became interested using vidix players asked kurshev separate mplayer project vidix became alternative set device drivers based idea direct hardware access similar microsoft directx drivers mapped accelerated video memory avoid colour-space conversion software scaling side players x window system includes direct rendering infrastructure provides similar functionality broad hardware support kurshev continued develop vidix 2007 version 1.0.0 software released | [
6984,
2744,
4096,
5571,
578,
2085
] | Test |
6,666 | 3 | Delay_insensitive_circuit:delay insensitive circuit delay-insensitive circuit type asynchronous circuit performs digital logic operation often within computing processor chip instead using clock signals global control signals sequencing computation delay-insensitive circuit determined data flow data flows one circuit element another using handshakes sequences voltage transitions indicate readiness receive data readiness offer data typically inputs circuit module indicate readiness receive acknowledged connected output sending data encoded way receiver detect validity directly data safely received receiver explicitly acknowledge allowing sender remove data thus completing handshake allowing another datum transmitted delay-insensitive circuit therefore need provide clock signal determine starting time computation instead arrival data input sub-circuit triggers computation start consequently next computation initiated immediately result first computation completed main advantage circuits ability optimize processing activities take arbitrary periods time depending data requested function example process variable time completion would mathematical division recovery data data might cache delay-insensitive di class robust asynchronous circuit delay models makes assumptions delay wires gates model transitions gates wires must acknowledged transitioning condition stops unseen transitions occurring di circuits transition input gate must seen output gate subsequent transition input allowed happen forces input states sequences become illegal example gates must never go state inputs one entry exit state seen output gate although model robust practical circuits possible due lack expressible conditionals di circuits instead quasi-delay-insensitive model smallest compromise model yet capable generating useful computing circuits reason circuits often incorrectly referred delay-insensitive quasi delay-insensitive | [
1640
] | Test |
6,667 | 2 | Linux_DM_Multipath:linux dm multipath dm-multipathing dm-mpio provides input-output i/o fail-over load-balancing using multipath i/o within linux block devices utilizing device-mapper multipathd daemon provides host-side logic use multiple paths redundant network provide continuous availability higher-bandwidth connectivity host server block-level device dm-mpio handles rerouting block i/o alternate path event path failure dm-mpio also balance i/o load across available paths typically utilized fibre channel fc iscsi san environments dm-mpio based device mapper provides basic framework maps one block device onto another utilizing linux dm-mpio datacenter operating systems multipath solutions key components path management must considered dm-mpio started patch set created joe thornber later maintained alasdair g kergon red hat included mainline linux kernel version 2.6.12 released june 17 2005 dm-mpio linux consists kernel components user-space components configuration file /etc/multipath.conf makes many dm-mpio features user-configurable multipath command kernel daemon multipathd use information found file file consulted configuration multipath devices changes must made prior running multipath command changes file afterwards require multipath executed multipath.conf five sections | [
578,
5571,
6892,
7143
] | Validation |
6,668 | 4 | Numbuster:numbuster numbuster phone community users access via mobile phone client web application developed numbuster ltd allows users find contact details phone number exchange information numbers users block calls messages client available android windows phone numbuster developed numbuster ltd privately held company founded evgeny gnutikov ilya osipov others project launched moscow business school graduates android web site february 2014 september 2014 100 000 users russia cis first launched july–august 2014 numbuster accelerated biggest startup accelerator france numa paris service global telephone directory social call-blocking functionality allows users find name unknown caller whether ’ person business also rate comment thus adding value service helping users community get information apart users block phone number in-app im sms chat available september 2014 numbuster available 13 languages english russian arabic german french chinese italian portuguese spanish polish ukrainian japanese korean upon release numbuster gathered positive feedback russian bloggers media including publication leading news web-site | [
7148,
3762,
3350,
7967,
2284,
7170,
2201,
7813,
6624,
1369,
5571,
6629,
1014,
4337,
1958,
2048,
3050,
2880,
4634,
5535
] | Validation |
6,669 | 9 | Cognitive_dimensions_of_notations:cognitive dimensions notations cognitive dimensions cognitive dimensions notations design principles notations user interfaces programming languages described researchers thomas r.g green marian petre dimensions used evaluate usability existing information artifact heuristics guide design new one cognitive dimensions designed provide lightweight approach analyse quality design rather in-depth detailed description provide common vocabulary discussing many factors notation ui programming language design also cognitive dimensions help exploring space possible designs design maneuvers changes intended improve design along one dimension thomas green originally defined 14 cognitive dimensions addition new dimensions sometimes proposed hci research field different levels adoption refinement candidate dimensions include creative ambiguity notation encourage interpreting several meanings element indexing elements guide finding specific part synopsis gestalt view whole annotated structure unevenness creation paths easier others bias expressed ideas developed artifact authors identify four main user activities interactive artifacts incrementation creation transcription modification exploratory design activity best served different trade-off usability dimension example high viscosity resistance change harmful modification exploration activities less severe one-off tasks performed transcription incrementation design maneuver change made designer notation design alter position within particular dimension dimensions created pairwise independent design altered one dimension keeping second one constant usually results trade-off dimensions modification increasing usability notation one dimension keeping second one constant typically reduce usability third dimension reflects assumption framework perfect interface trade-offs fundamental part usability design example design maneuver reducing viscosity notation adding abstraction mechanisms done incorporating style sheets abstraction represent common styling attributes items document notation item document defined individual style design maneuver made editor changes style sheet modify items eliminating repetition viscosity present need change style individual item | [
1908,
6669,
5878,
6063
] | Test |
6,670 | 4 | Personal,_Inc.:personal inc personal also referred personal.com personal inc. consumer personal data service identity management system individuals aggregate manage reuse data merged digi.me august 2017 business europe business model empowering people data combined company called digi.me one product lines collaborative data management information security solution workplace called teamdata spun new company result merger personal founded 2009 washington dc management team built map network location data mapping platform acquired nokia/navteq 2006 personal first online consumer-facing company named ambassador privacy design technical business legal commitments providing users control data store personal service called “ life management platform ” economist “ personal encrypted cloud service ” time user-centric approach data company associated infomediary model originated 1999 john hagel iii mark singer well vendor relationship management vrm model developed doc searls personal raised 30m funding develop platform products leading investors steve case ’ revolution ventures grotech ventures allen company ted leonsis neil ashe jonathan miller bill miller legg mason esther dyson edventures eric c. anderson company received recognition user agreement called owner data agreement acted like reverse license agreement data shared registered parties emphasized data ownership resides user doc searls wrote owner data agreement “ precedent modeled new legal position vendors intermediaries. ” personal early embrace “ small data ” defines “ big data benefit individuals. ” term “ small data ” may originally coined jeremie miller sing.ly mentioned talk web 2.0 summit november 2011 cited intention economy 2011 personal part first group companies join personal data ecosystem consortium startup circle small data meetup group also formed new york city bringing together technology legal business experts exchange ideas user-centric user-driven models internet products services personal included case studies ctrl-shift forrester regarding personal data stores personal identity management 2011 personal received innovator spotlight award privacy identity innovation conference pii2011 participated technology showcase pii2012 2012 techhive named personal one top five apps web services sxsw personal 2013 campus technology innovators award lone star college july 2013 personal included list executive travel magazine favorite travel apps 2013 may/june issue 2013 personal also included part nyu govlab open data 500 named j. walter thompson one 100 things watch 2014 2015 national law journal named company chief policy officer general counsel joshua p. galper one 50 cybersecurity privacy trailblazers personal platform privacy- security-by-design platform individuals manage reuse data information fill app 1-click form-filling solution web mobile logins checkouts forms data vault app served main cloud-based repository user data personal helped individuals take control benefit information knowing information data vault remained legally could used without permission personal spent two years building personal platform launching data vault product beta november 2011 following privacy design principles personal enabled users see share sensitive data files stored data vault information encrypted could decrypted user password users could choose know passwords vault personal store user passwords – therefore could reset without deleting user sensitive data files stored vault personal apps services linked user private data vault data vault featured automatic synchronization data files added device logged personal also featured “ secure share ” function created live private network allowing registered users share access data files exchange encrypted keys without risk transmitting data files non-secure direct means also allowed users immediately update data across network revoke access choose fast company called data vault “ tool simplify lives. ” personal launched android app november 30 2011 ios data vault app released may 7 2012 personal officially launched application programming interface apis october 2 2012 mashery business apis conference review cnet highlighted challenges getting people trust new service sensitive data spending time required entering enough data make useful data vault launched november 2011 mashable posed question “ never fill form ” world economic forum february 2013 report highlighted possibility saving 10 billion hours globally “ improv ing delivery public private sector services ” automated form-filling tools specifically citing personal fill app january 2013 personal launched fill beta web bookmarklet automatic form-filling june 11 2014 personal released fill web extension announced publishing index 140,000 1-click online forms www.fillit.com company also announced mobile version product launch later year according story tech cocktail launch personal “ web extension mobile app able support 1,200 different types reusable data even enabling unlock confidential information complete longer forms including patient registrations job applications event registrations school admissions insurance bank applications government forms. ” november 2014 mobile version fill launched could autofill mobile forms using apis personal form portal ultimately indexed 500,000 forms three components together allowed data captured reused across forms 1 form graph mapped individual form fields personal ontology 2 semantic layer determined data required form e.g one field vs. three fields u.s. telephone number 3 correlations graph helped individuals match specific data form without looking data value e.g knowing phone number mobile phone number address billing address person uses middle name first name forms initial public offering facebook may 2012 media interest question monetary value personal data whether tools services might emerge help consumers monetize data personal frequently cited company could potentially offer service articles pieces focusing subject appeared new york times adweek mit technology review cnn national public radio company co-founder ceo shane green quoted saying “ average american consumer would soon able realize 1,000 per year ” granting limited anonymous access data marketers figure never supported green company may 2016 personal shifted product focus teamdata focuses problem securing collaboratively managing data workplace onboardly included new collaborative teamdata solution list top 10 apps keep team track part top 50 list time best content marketing tools teamdata separate business | [
6312
] | Test |
6,671 | 9 | XOTcl:xotcl xotcl object-oriented extension tool command language created gustaf neumann uwe zdun derivative mit otcl xotcl based dynamic object system metaclasses influenced clos class method definitions completely dynamic xotcl provides language support design patterns via filters decorator mixins | [
6507,
4777,
2256,
3772,
486,
6016,
1803
] | Test |
6,672 | 4 | Signature:signature signature sign handwritten often stylized depiction someone name nickname even simple x mark person writes documents proof identity intent writer signature signatory signer similar handwritten signature signature work describes work readily identifying creator signature may confused autograph chiefly artistic signature lead confusion people autograph signature people public eye keep signatures private whilst fully publishing autograph traditional function signature permanently affix document person ’ uniquely personal undeniable self-identification physical evidence person personal witness certification content specified part document example role signature many consumer contracts solely provide evidence identity contracting party also provide evidence deliberation informed consent many countries signatures may witnessed recorded presence notary public carry additional legal force legal documents illiterate signatory make mark often x occasionally personalized symbol long document countersigned literate witness countries illiterate people place thumbprint legal documents lieu written signature united states signatures encompass marks actions sorts indicative identity intent legal rule unless statute specifically prescribes particular method making signature may made number ways include mechanical rubber stamp facsimile signature may made purported signatory alternatively someone else duly authorized signatory acting signer presence signatory direction may make signature many individuals much fanciful signatures normal cursive writing including elaborate ascenders descenders exotic flourishes much one would find calligraphic writing example final k john hancock famous signature us declaration independence loops back underline name kind flourish also known paraph paraphe term meaning flourish initial signature french paraph used graphology analyses several cultures whose languages use writing systems alphabets share western notion signatures per se signing one name results written product different result writing one name standard way languages write sign involves written characters also see calligraphy special signature machines called autopens capable automatically reproducing individual signature typically used people required sign lot printed matter celebrities heads state ceos recently members congress united states begun signature made truetype font file allows staff members congressman office easily reproduce correspondence legislation official documents east asian languages chinese japanese korean people traditionally use stamp-like objects known name-seals name carved tensho script seal script lieu handwritten signature government agencies require professional persons official reviewers sign originals copies originals authenticate personally viewed content united states prevalent architectural construction plans intent prevent mistakes fraud practice known effective e-mail newsgroup usage another type signature exists independent one language users set one lines custom text known signature block automatically appended messages text usually includes name contact information sometimes quotations ascii art shortened form signature block including one name often distinguishing prefix used simply indicate end post response web sites also allow graphics used note however type signature related electronic signatures digital signatures technical nature directly understandable humans wikipedia online wiki-based encyclopedia edited volunteers contributors sign comments talk pages username username holder right digitally affix signature signature painting work art always important item assessment art fake signatures sometimes added enhance value painting added fake painting support authenticity notorious case signature johannes vermeer fake supper emmaus made art-forger han van meegeren however fact painters signatures often vary time particularly modern contemporary periods might complicate issue signatures painters take artistic form may less value determining forgeries term signature also used mean characteristics give object piece information identity—for example shape coca-cola bottle rock music heavy metal music electric guitarists develop unique tone sound using particular settings guitar amp effects units modifications guitar pickups called signature sound wrestling wwe wrestlers known distinctive signature finishing moves golf courses signature hole aesthetically pleasing photogenic hole makes particular course unique analogy word signature may used refer characteristic expression process thing example climate phenomenon known enso el niño characteristic modes different ocean basins often referred signature icie collier signatory indicates party agreement especially international treaty convention e.g brazil signatory convention biological diversity british law appearance signatures names may protected copyright law united states copyright law titles names c ... mere variations typographic ornamentation lettering coloring eligible copyright however appearance signatures names may protected copyright law uniform commercial code §1-201 37 united states generally defines signed using symbol executed adopted present intention adopt accept writing uniform commercial code §3-401 b negotiable instruments states signature may made manually means device machine ii use name including trade assumed name word mark symbol executed adopted person present intention authenticate writing | [
4945,
5196,
3473,
209,
3963,
2079,
1078,
1037,
3794,
7120,
1266,
2287
] | Test |
6,673 | 9 | Hoc_(programming_language):hoc programming language hoc acronym high order calculator interpreted programming language used 1984 book unix programming environment demonstrate build interpreters using yacc hoc developed brian kernighan rob pike glorified interactive calculator basic functionality evaluate floating-point numerical expressions e.g. 1+2*sin 0.7 variables added conditionals loops user-defined functions simple io using syntax resembling c. improved hoc interpreter included eighth edition research unix 1985 generally adopted commercial unix systems linux distributions instead earlier calculator languages dc bc become widespread systems hoc survived continued evolve part plan 9 operating system several improved versions hoc released free software bell labs individuals see list hoc used primary scripting language neuron simulator following simple example interactive calculator session hoc text represents hoc output simple example functions flow control | [
4447,
5946,
6778,
578
] | Test |
6,674 | 9 | Gnash_(software):gnash software gnash media player playing swf files gnash available standalone player desktop computers embedded devices well plugin several browsers part gnu project free open-source alternative adobe flash player developed gameswf project gnash first announced late 2005 software developer john gilmore project maintainer rob savoye main developer web site gnash located free software foundation gnu savannah project support server gnash supports swf v7 features swf v8 v9 however swf v10 supported writing free software flash player priority gnu project time prior launch gnash gnu project asked people assist gplflash project majority previous gplflash developers moved gnash project existing gplflash codebase refocused towards supporting embedded systems primary distribution terms gnash gnu gpl however since gnash started using codebase gameswf project public domain code developed gnash project might useful gameswf placed public domain adobe provides outdated version 11.2 official player linux ia-32 amd64 developer preview release binary-only form gnash however compiled executed many architectures including x86 arm mips powerpc also supports bsd-based operating systems early port risc os never macromedia/adobe flash support beyond flash 3 exist well early port beos flash support terminated version 4 development port amigaos 4.1 also recently begun port haiku operating system also exists gnash requires one agg cairo opengl rendering contrast gnu projects typically written c gnash written c++ programming language gameswf heritage gnash play swf files version 7 80 actionscript 2.0 goal gnash developers compatible possible proprietary player including behavior bad actionscript code however gnash offers special features available adobe player possibility extend actionscript classes via shared libraries sample extensions include mysql support file system access security reasons extension mechanism must compiled-in explicitly enabled via configuration files gnash supports playback flv videos allows playing flv files youtube myspace showmedo similar websites older files sound – newer files without playing sound flv support requires ffmpeg gstreamer installed system free-software programs mplayer vlc media player players windows based ffdshow directshow codecs play back flv format file specially downloaded piped version 0.8.8 released 22 august 2010 rob savoye announced gnash work youtube videos version 0.8.8 gpu support pushed ahead proprietary adobe flash player linux flash 10.2 came hardware acceleration built gnash still suffers high cpu usage flashblock plugin installed user turning flash support case-by-case needed basis youtube video controls full screen mode functioning although version 0.8.8 bug cause youtube display invalid parameters many popular flash games work gnash 0.8.8 cygnal gnash project flash media server-compatible audio video server handles negotiating copyright metadata exchange well streaming content need handle many thousands simultaneous network connection support running large gnu/linux clusters support handling multiple streams differing content well multicast stream single data source due patent issues surrounding mp3 fact flv on2 closed formats one main goals project support free codes free protocols primary way things optional support mp3 flv on2 vp6 vp7 playing existing flash content flv vp6 vp7 codecs included ffmpeg users use ffmpeg plugin gstreamer 0.10 use proprietary codecs gnash successfully run microsoft windows darwin os x irix solaris beos os/2 haiku gnash also run following 64-bit systems powerpc itanium ultrasparc amd64 gnash ported windows plugin works best firefox 1.0.4 newer work mozilla-based browser however newer browsers plugin may become unstable inoperative newer gnash binaries windows include plugin currently newer working gnash plugin windows project financially supported commercial company lulu.com july 2010 march 2012 lead developer reported donations barely enough pay hosting project web one problem project difficulty finding developers current developers never installed adobe flash player fear anyone ever installed adobe flash player time accepted agreement modify reverse engineer flash player therefore gnash project 6 active developers november 2010 generic clauses however may national anticompetition laws used normal software license agreements may 2 2012 court justice european union ruled case c-406/10 sas institute inc v world programming ltd functionality computer program covered copyright european union contractual provisions null void forbid observing studying testing computer program order reproduce behavior second program holds long source code object code copied | [
707,
1445,
6428,
2559,
1840,
2568,
405,
5055,
5757,
6116,
7559,
3981,
761,
2599,
5786,
1895,
5787,
4017,
5091,
4020,
1152,
1154,
1523,
2985,
6876,
4390,
4759,
5103,
2639,
3368,
486,
1563,
4070,
3398,
6933,
5515,
3052,
2698,
7310,
1989,
... | Test |
6,675 | 3 | CLMUL_instruction_set:clmul instruction set carry-less multiplication clmul extension x86 instruction set used microprocessors intel amd proposed intel march 2008 made available intel westmere processors announced early 2010 mathematically instruction implements multiplication polynomials finite field gf 2 bitstring formula_1 represents polynomial formula_2 clmul instruction also allows efficient implementation closely related multiplication larger finite fields gf 2 traditional instruction set one use instructions improve speed applications block cipher encryption galois/counter mode depends finite field gf 2 multiplication another application fast calculation crc values including used implement lz77 sliding window deflate algorithm zlib pngcrush instruction computes 128-bit carry-less product two 64-bit values destination 128-bit xmm register source may another xmm register memory immediate operand specifies halves 128-bit operands multiplied mnemonics specifying specific values immediate operand also defined presence clmul instruction set checked testing one | [
2000,
2814,
3173,
2989,
4845,
3942,
3443,
4224,
6344,
6523,
5559,
6616,
4108,
1465,
5665,
5934,
742,
3717,
5669,
584,
5055,
3803,
5670,
2226,
6647,
1961,
1770,
2498,
3565,
4077,
6563,
3248,
5165,
3139,
6133,
2332,
1881,
766,
5431,
691,
... | Test |
6,676 | 8 | Automated_Logic_Corporation:automated logic corporation automated logic corporation located kennesaw georgia united states manufactures building automation systems several technological innovations include webctrl® building automation system environmental index™ tool thermographic color floor plans time-lapse™ graphics fault detection diagnostics fdd eikon uniquely powerful universal programming tool i/o hardware including controllers routers webctrl bacnet native browser-based building automation system users fully access buildings schedules setpoints trends alarms control functions virtually computer anywhere world users also control buildings webctrl wireless devices tablets cell phones webctrl supports multiple languages simultaneously includes powerful spreadsheet-based reporting tool native bacnet system webctrl interfaces lonworks modbus many protocols provide integrated solution building control needs webctrl certified bacnet testing laboratory bacnet advanced workstation software automated logic systems installed commercial office buildings industrial plants critical mission facilities healthcare facilities educational facilities government complexes hospitality/entertainment venues retail locations worldwide products sold international network dealers design engineer install support automated logic products automated logic corporation acquired carrier corporation parent united technologies corporation 2004 founding member bacnet manufacturers association automated logic one first offer products using industry ’ standard protocol – bacnet | [] | Train |
6,677 | 7 | Skillhive:skillhive skillhive enterprise social software collaborative software designed assessing finding sharing developing expertise within organizations professional associations skillhive used various purposes competence-based management development knowledge management talent management organizational learning innovation skillhive targeted medium large sized businesses organizations operating dynamic environment continuous learning knowledge sharing experts vital skillhive built concept called swarm work swarm work defined way working aims imitate swarm intelligence form collective intelligence enable decentralized groups self-organize effectively work together towards common goal without need central coordination skillhive provided software service saas cloud on-demand service software servers data maintained service provider customer gets right receive use service since need download install software saas services like skillhive seen easy deploy skilllhive web browser based works operating systems supported up-to-date web browsers service developed using html5 javascript css php technologies enables scale different mobile devices like tablets smartphones skillhive provides advanced programming interface api enables integrate information systems human resource systems intranets skillhive linkedin integration enables transfer profile information including photos cv information service skillhive developed intunex ltd finnish technology company founded janne ruohisto 2008 intunex received innovation product development fund tekes 2010 intunex launched first commercial version skillhive called xtune 2011 skillhive received awards including association finnish elearning centre interactive learning award eeemeli – best collaboration application 2012 hr tech europe finalist 2012 | [
2961,
330,
6029,
2451
] | Test |
6,678 | 4 | InMage:inmage inmage computer software company based us india markets product line called scout uses continuous data protection cdp backup replication scout consists two product lines host-offload line uses software agent protected servers fabric line uses agent fibre channel switch fabric software protects volume block level tracking write changes allows local remote protection policies first version product released 2002 scout features capacity optimized cdp repository continuous approach allows near zero backup windows point time restores second level rpos within datacenter across datacenters target volume kept updated either synchronously asynchronously based product line retention logs allow point time recovery user specified retention window scout also features application failover support disaster recovery 6.2 release scout supported microsoft windows linux solaris aix hp ux also supports vmware xenserver hyper-v solaris zones server virtualization platforms server application failover supported microsoft windows application failover supports microsoft exchange blackberry enterprise server microsoft sql server file servers microsoft sharepoint oracle mysql among others 6.2 release series supports clustered non clustered operation scout integrates traditional tape backup software enable longer term retention tape scout integrates microsoft vss apis sql exchange hyper-v consistent snapshots also integrates oracle db2 mysql postgresql consistency apis inmage founded 2001 dr. murali rajagopal kumar malvalli sv systems microsoft corporation acquired inmage 2014 | [
3076,
8054,
1254,
4295,
4759,
7619,
7715,
900,
8076,
5563,
2390,
5571,
6110,
578,
6731,
3028,
6294,
7660,
7848,
8118,
432,
6054,
3915
] | Test |
6,679 | 5 | Random-access_channel:random-access channel random-access channel rach shared channel used wireless terminals access mobile network tdma/fdma cdma based network call set-up bursty data transmission whenever mobile wants make mo mobile originating call schedules rach rach transport-layer channel corresponding physical-layer channel prach since rach shared probability two mobiles transmit time transmissions collide medium air granted access network happens limit number mobiles transmitting one rach time slot defined gsm standard collision happens mobile waits random period time transmits rach rach uses gsm 51 frame multiframe structure uplink transmit information mostly ts1 used high capacity gsm cell areas ts2 ts4 ts6 also used rach leaving ts0 mainly used broadcast frequency random-access channel like mobile phone networks also used openairmesh network cluster heads mesh routers key feature random-access channel messages scheduled compared example dedicated channel umts assigned exclusively one user time certainty single device makes connection attempt one time collisions result | [
7824
] | Test |
6,680 | 9 | Conditional_compilation:conditional compilation computer programming conditional compilation compilation implementing methods allow compiler produce differences executable program produced controlled parameters provided compilation technique commonly used differences needed run software different platforms different versions required libraries hardware many programming languages support conditional compilation typically compiler directives define undefine certain variables directives test variables modify compilation accordingly example using actual language compiler may set define macintosh undefine pc code may contain c languages similar syntax done using ifdef directive similar procedure using name conditional comment used microsoft internet explorer version 5 9 interpret html code also similar proprietary mechanism adding conditional comments within jscript known conditional compilation | [
1361,
2470,
6053,
6186,
3915,
1989,
2933,
2803,
7460,
422,
1435
] | Validation |
6,681 | 9 | OGNL:ognl object-graph navigation language ognl open-source expression language el java using simpler expressions full range supported java language allows getting setting properties defined setproperty getproperty methods found javabeans execution methods java classes also allows simpler array manipulation aimed used java ee applications taglibs expression language ognl created luke blanshard drew davidson ognl technology ognl development continued opensymphony closed 2011 ognl developed part apache commons ognl began way map associations front-end components back-end objects using property names associations gathered features drew davidson created key-value coding language kvcl luke blanshard reimplemented kvcl using antlr started using name ognl technology reimplemented using java compiler compiler javacc ognl uses java reflection introspection address object graph runtime application allows program change behavior based state object graph instead relying compile time settings also allows changes object graph due ability create change executable code ognl capable introducing critical security flaws framework uses multiple apache struts 2 versions vulnerable ognl security flaws october 2017 recommended version struts 2 2.5.13 users urged upgrade latest version older revisions documented security vulnerabilities — example struts 2 versions 2.3.5 2.3.31 2.5 2.5.10 allow remote attackers execute arbitrary code | [
865,
3915,
5571,
3967,
7931,
7374
] | Validation |
6,682 | 4 | PUM.bad.proxy:pum.bad.proxy pum.bad.proxy form malware known registry hack unauthorized alteration windows registry file specifically redirects lan settings within internet explorer popular web browser commonly installed default web browser microsoft windows first spotted users malwarebytes anti-malware security software 22 january 2011 reported malwarebytes software 200 times first day alone name assigned malwarebytes anti-malware specific name unique virus hack pum defines potentially unwanted modification bad.proxy defines modification ability search alert user potentially unwanted modifications added malware bytes november 2010 likely first day users began reporting pum.bad.proxy first day hack existed rather first time malware bytes could alert user vulnerability also fact proxy server often active malware bytes alerts user presence may indicate remnant virus hack malicious software previously removed quarantined hack alters proxy server address settings redirect web access requests back computer internal lan address 127.0.0.1 effectively cutting computer access internet origin method propagation currently unknown altered registry setting affects users internet explorer including recent version internet explorer 9 browsers firefox depend upon specific windows registry item proxy address port settings affected registry value hkey_current_user\software\microsoft\windows\currentversion\internet settings\proxyserver value set 127.0.0.1 computer internal address network card various port numbers reported | [
2173,
7151,
6515,
4759,
6419,
3426,
2733,
3698,
651,
5571,
1376,
2577,
5401,
6823,
2354,
5847,
1766,
2789,
74,
3338,
3071,
3680,
880
] | Validation |
6,683 | 3 | Socket_3:socket 3 socket 3 series cpu sockets various x86 microprocessors sometimes found alongside secondary socket designed math coprocessor chip case 487 socket 3 resulted intel creation lower voltage microprocessors upgrade socket 2 rearranged pin layout socket 3 237-pin low insertion force lif zero insertion force zif 19×19 pin grid array pga socket suitable 3.3 v 5 v 25–50 mhz intel 486 sx 486 dx 486 dx2 486 dx4 486 overdrive pentium overdrive processors well amd am486 am5x86 cyrix cx5x86 processors | [
4123,
4479,
6170,
2997,
1729,
2828,
6173,
7974,
2830,
3002,
4314,
5379,
3193,
1841,
1645,
3203,
2036,
4968,
3385,
4972,
5853,
2685,
6935,
8021,
7302,
5963,
866,
3333,
7134,
262,
352,
5886
] | Test |
6,684 | 2 | Microsoft_Management_Console:microsoft management console microsoft management console mmc component windows 2000 successors provides system administrators advanced users interface configuring monitoring system management console host component object model components called snap-ins microsoft administration tools implemented mmc snap-ins third parties also implement snap-ins using mmc application programming interfaces published microsoft developer network web site snap-ins registered codice_1 codice_2 registry keys snap-in combined mmc called management saved console file .msc extension launched using syntax codice_3 prolific mmc component computer management appears administrative tools folder control panel system security category view computer management actually consists collection mmc snap-ins including device manager disk defragmenter internet information services installed disk management event viewer local users groups except home editions windows shared folders tools computer management also pointed another windows machine altogether allowing monitoring configuration computers local network user access mmc snap-ins common use include | [
7879,
3937,
3263,
378,
2198,
6096,
1840,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
6136,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
... | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.